0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1191354388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x70}}, 0x10, 0x0}, 0x0) 00:22:42 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x9e4d4e9181b8d58d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r1, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000020c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x8, 0x47, &(0x7f0000000540)=""/71, 0x0, 0x0, [], 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000002040)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r2}, 0x78) 00:22:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xc00}}, 0x10, 0x0}, 0x0) 00:22:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x3000000) 00:22:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000280), 0x12) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000004000000000000000100000035060000ffffffff950a000000080000"], &(0x7f00000000c0)='GPL\x00', 0xffff2438, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x4, r0, 0x8, &(0x7f0000000180)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x4, 0xa6fe, 0x1}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0xe7, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000300)={0x1, 0x10, 0x7fffffff, 0xfffffffe}, &(0x7f0000000340)=0x75ae, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x4}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) socket$kcm(0x29, 0x5, 0x0) 00:22:43 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x9e4d4e9181b8d58d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r1, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 00:22:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1191454388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0xff7, 0x3}, 0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3f00}}, 0x10, 0x0}, 0x0) 00:22:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x4000000) 00:22:43 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x9e4d4e9181b8d58d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r1, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 00:22:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4000}}, 0x10, 0x0}, 0x0) 00:22:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f28fc09719a3f1884e2570342d627cf25c9719fc18092fda1498332146cb2d377ffee549abbca87fadd4e6135ad118ba2a232c229a006a618856174161e6fb2a67718c3ca870d05b23a288c51da8b2e8680963318b0dab4cf6c5f689eecaa843e80c7c268e253d829675ce582c217358c3846978d14ad284725b076de7675af974397462f230126fdf108a181875f309a57680bc59ac733472c327f642806f2b3ac65e58edec1168422d22974b41"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x4924924) 00:22:43 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x9e4d4e9181b8d58d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r1, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) 00:22:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x7000}}, 0x10, 0x0}, 0x0) 00:22:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x5000000) 00:22:44 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x9e4d4e9181b8d58d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) 00:22:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0, 0xa3}, 0xdd00) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x101d0}}, 0x10, 0x0}, 0x0) 00:22:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x6000000) 00:22:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:44 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x9e4d4e9181b8d58d, 0x0) 00:22:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r4, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x3f) write$cgroup_int(r3, &(0x7f0000000280), 0x12) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000000)=r3) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x40000}}, 0x10, 0x0}, 0x0) 00:22:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x7000000) 00:22:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 00:22:44 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) 00:22:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x8000a0}}, 0x10, 0x0}, 0x0) 00:22:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) socketpair(0x0, 0x80d, 0x1, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x7, 0x5, 0x8, 0x8, 0x0, 0x8, 0x40000, 0x816510b38d7932d1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xe3af, 0x2, @perf_config_ext={0x80, 0x5}, 0x6184, 0x0, 0x7fff, 0x0, 0x5, 0x9, 0x401}, r5, 0xffffffffffffffff, r6, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x8000000) 00:22:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 00:22:45 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) 00:22:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xc000000}}, 0x10, 0x0}, 0x0) 00:22:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x24499204) 00:22:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:45 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) 00:22:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1d8140c8}}, 0x10, 0x0}, 0x0) 00:22:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 00:22:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x33000000) 00:22:45 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 00:22:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x3f000000}}, 0x10, 0x0}, 0x0) 00:22:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) write$cgroup_int(r0, &(0x7f0000000000)=0x2, 0x12) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000100)}, 0x40001140) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:46 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x3f000000) 00:22:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x40000000}}, 0x10, 0x0}, 0x0) 00:22:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:46 executing program 3: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 00:22:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x70000000}}, 0x10, 0x0}, 0x0) 00:22:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x40000000) 00:22:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xffffffff}, 0xc) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1191c54388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:46 executing program 3: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 00:22:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xa0008000}}, 0x10, 0x0}, 0x0) 00:22:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0xa0008000) 00:22:47 executing program 3: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 00:22:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) socket$kcm(0x29, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xc840811d}}, 0x10, 0x0}, 0x0) 00:22:47 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0xff000000) 00:22:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x1d, 0x100000, 0x9, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:47 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xd0010100}}, 0x10, 0x0}, 0x0) 00:22:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0xfffffffefff) 00:22:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1191e54388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:47 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xeffdffff}}, 0x10, 0x0}, 0x0) 00:22:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00'}, 0xffffff51) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0xffffffff000) 00:22:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:48 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xf5ffffff}}, 0x10, 0x0}, 0x0) 00:22:48 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='cgroup.stet\x00') perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) openat$cgroup_ro(r1, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x8000a0ffffffff) 00:22:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xfffffdef}}, 0x10, 0x0}, 0x0) 00:22:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:48 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xffffff7f}}, 0x10, 0x0}, 0x0) 00:22:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0xf0ffffff0f0000) 00:22:49 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = socket$kcm(0x29, 0x90db6ce686108ed7, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) recvmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000080)}, {&(0x7f0000000580)=""/178, 0xb2}, {&(0x7f0000000100)=""/100, 0x64}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000300)=""/87, 0x57}, {&(0x7f0000002640)=""/90, 0x5a}], 0x7, &(0x7f0000002740)=""/126, 0x7e}, 0x10040) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r7, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000029c0)={0xd, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x1, 0x0, 0x9, 0x2, 0x1, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x60}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000002840)='GPL\x00', 0x63, 0x391, &(0x7f0000002880)=""/177, 0x1f00, 0x9, [], r7, 0x13, r8, 0x8, &(0x7f0000002940)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000002980)={0x0, 0x7, 0xfd, 0x800}, 0x10, 0xffffffffffffffff}, 0xffffffffffffff30) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002a40)={r4, r9}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xfffffff5}}, 0x10, 0x0}, 0x0) 00:22:49 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x100000000000000) 00:22:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x14014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:49 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xffffffff}}, 0x10, 0x0}, 0x0) 00:22:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x200000000000000) 00:22:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0xf, 0x0}, 0x0) 00:22:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) r4 = gettid() r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r5, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3c, 0x2, 0x1, 0x9, 0x0, 0x5, 0x2180, 0x18, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x24448, 0x4cb, 0x9f3f, 0xb1c575d3c04aff5c, 0x10001, 0xfffffffa, 0x8}, r4, 0x7, r1, 0x0) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:49 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x300000000000000) 00:22:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x20000290, 0x0}, 0x0) 00:22:50 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 00:22:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:50 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x4}, 0x0) 00:22:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x400000000000000) 00:22:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a81448ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560c0dcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2d4779bb08d8d310199970b0cf544c4a97c12a21740e95a539d1788585da718c62d3667fa5c844e12d9eecbc1bd"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xc}, 0x0) 00:22:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = socket$kcm(0x29, 0x90db6ce686108ed7, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) recvmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000080)}, {&(0x7f0000000580)=""/178, 0xb2}, {&(0x7f0000000100)=""/100, 0x64}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000300)=""/87, 0x57}, {&(0x7f0000002640)=""/90, 0x5a}], 0x7, &(0x7f0000002740)=""/126, 0x7e}, 0x10040) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r7, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000029c0)={0xd, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x1, 0x0, 0x9, 0x2, 0x1, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x60}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000002840)='GPL\x00', 0x63, 0x391, &(0x7f0000002880)=""/177, 0x1f00, 0x9, [], r7, 0x13, r8, 0x8, &(0x7f0000002940)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000002980)={0x0, 0x7, 0xfd, 0x800}, 0x10, 0xffffffffffffffff}, 0xffffffffffffff30) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002a40)={r4, r9}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x500000000000000) 00:22:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x70}, 0x0) 00:22:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff4d4daccc527fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fb9aff3166f160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x600000000000000) 00:22:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = socket$kcm(0x29, 0x90db6ce686108ed7, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) recvmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000080)}, {&(0x7f0000000580)=""/178, 0xb2}, {&(0x7f0000000100)=""/100, 0x64}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000300)=""/87, 0x57}, {&(0x7f0000002640)=""/90, 0x5a}], 0x7, &(0x7f0000002740)=""/126, 0x7e}, 0x10040) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r7, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000029c0)={0xd, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x1, 0x0, 0x9, 0x2, 0x1, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x60}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000002840)='GPL\x00', 0x63, 0x391, &(0x7f0000002880)=""/177, 0x1f00, 0x9, [], r7, 0x13, r8, 0x8, &(0x7f0000002940)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000002980)={0x0, 0x7, 0xfd, 0x800}, 0x10, 0xffffffffffffffff}, 0xffffffffffffff30) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002a40)={r4, r9}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xc00}, 0x0) 00:22:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1192854388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) sendmsg$kcm(r2, &(0x7f0000001d00)={&(0x7f0000000000)=@l2={0x1f, 0x800, {0x8, 0x5, 0x1, 0x7, 0x3, 0x4b}, 0x9, 0x88}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000100)="e9767a5d66fea8786b427cf1d04fc017c322606ed72b0a63d73983786fb1ee4013c0cb69a7c0b292c96762dbff9ac119ad5ca9813b69f496c75f8550f1db6f952dbefa296f3780ce704dc12f295cc3625aa13370da", 0x55}, {&(0x7f0000000080)="e190d13d5aedebd92bb95f3edcab292b8fccd5cc0a742c904e785a5044f9781704a84131be34", 0x26}, {&(0x7f0000000280)="921bb9fa", 0x4}, {&(0x7f0000000300)="c0ee185323125c7e95939991ccb88cb5877b5a0513a1384dd01abe67fb2664b2ebe6d4c979e3117619c375b477d195c72165c010850bebb7c6bab6c25c96eed0fa1f8de2ee5d5ac1e594", 0x4a}, {&(0x7f0000000580)="3bba9ad07fd7ec710c96e55a0318ac5b37d62ad058b0997d3ce0", 0x1a}, {&(0x7f00000005c0)="733ab93af9c355b1f302b481ca3945e447a2f8363e2882e165ee1a95517b8de80a00d0d3df455cfae6736ac4655f846c9de27b1f39e693be876350901dda2257a8c0d53733afec1b53a44364ffeb77eca0e9ff4a30d421ac9617234fe0a83485bdc17f9a9bb93a117fb4aa7d785bcae6166efbd914b20b0481fe101c85359f3e0855129cb079cdd54265cfd53f29cd01ecdfa8395aea4006be5c408bd33bdeb23c24e5e6628c23d903f8b0b62bf7a3571073a7276f87065413e11bc5237d85542c3a7481fdc5ebf30c85ab0daae1993f4a55ae441fb77eb53fbfc636797941fb73eda6609d2bdba423f1fd73fe8522232001b1f6b89ef23b7999e8a7eb9708b95921206418a4b5d9c0ba18108f99c29571b97b171f3a45bef6a4cc70e390b8583732871592403c5dbd7af583b69c613fc4af3d2e02959ddfe460f3ed1a78626b420f97513b28016da1ca1066626835acce79940383eaaec62a8cb8047581285ad51a03963d909c44e7a8f1fba5c91fafe324c0281207fbb6034f036a953c7d2b55ee99053cebec8f7cf0b0fe5d99f66aa7af15c42e7ae030b042ff91efed85768227489dd0224ac657af38b02001f9d8dcac5b66b4d3dae4092c5473188699d7c7ebadf44e5118d7916ecf069f4f37e59309e59ead8d91c0bf16f9d79ef95af48f8e4e275b2460bfe7fef398ee7e0b5cb56daf2cab5e19f4f8470459f19419bcb5ecb93dac40194c408c3b20f4bbb2c72055478517038a89a23a9d2a87a85d3749e98a10df40a006cf7cafb828aa4a6e1b93c875e58c5fc93facd74f449c310c1edfebf7c8d31475cb556c8ad2757b7b189d476e7c0b80b1071e07f014ddd1a8e787b48dc7d89ca2c9df0e823dbb6570fccd5142bebf710133013e437733b129afb3f7a06d6e02e22a6e1368c919a81a0ed00dd3ecd0aa73f2cd81cdd87ff19e2b7ce748741a9534d4f4a7fe7c67d9266081717971f2cee1dd7aff18595587b79a5c46f71feee55a98b3aacdcfe36daf45c3c4c1a759559ad5a18a553c3e8d3f3aa5a596187a62d3258fec39016bfb46d338c7a8129c2b1e1b278ac7d4cd3048819b5412b9cf371deca8fd2f5194eb292f5c1329c5b2942c2e5c515e9e7a10de0195d6454a02f6970f4e48480c20e8a78df82daac85df6dfc596b2293169a6be5bc1f466a0c03083ba3c1fd5d567bf510dcfd5a396ba0e8d0eb3fd5822db2ed59c38015f1231e4416c1f2f9789d7734261629fd3c80d9793469550f113f6149da284e2e382fb1c2f7b2884f4e0d97376d9ece1fa350a4ee6431d5b2ee02c85eb2aa52249fbed3d4b3e0234e4360d2cbf18bf806a3322e1c0c18cf81c80a5c1af416318ae0a0d37b689cf76a4e178046adb5b8459ff1aa5e9a99c1d3f094d0ec29ddfc800ad93e8d28b869fe7ef33a934ef4f6ad310f9aa12162520db2687e27e6e1cd597ca5c6382cd54d7abc8cea60df4dd0108e594b34049411c16b6eb6bb315dc51627add8a269afd63f0aed55fa3e7e73484d2dbc2b6ad0825e64266157835db2089cf281ddddeb92ea0a73cc65b2c0bee9fc4bab428cbbe96106aee23753dc70c82e4af074f1a49d4f213d4a34f2ae3bd18639dbb877b0949b63fe70fbc2ceb737f136813660ff64d799b5d652f316af9c86fe2c45cdb5277c99011e59155c4e4aacd4a7f193cb0a72ea35ca79d8871139e547c9e446945f348c108b51347cc4d4743d0c4aba0cf0f36d8e515be7d92a6d66e7b0f6ab7c813edd793a1b41dd3fcf1c701fdcf57bd05e759b2681d93abb2b5d15706db9f0d547867e0d1d4b0d698dfeea62e7f06bd239c4200ad4200e096478a993d40fdcc6c3000508540693ad520f7cbee4cf4f40febf9239ab076d99ef9bccf7760c825529f2f3b159a498d7d4dff34afe845994227523dade9b0fd843225fa4739056880026dd88447f6801da76efcd8a1d1c8eee8a5561852d251f0d13479db35ab6ba8726d24b3a4e50128081b5934cad5c35255d7288e9cb559963bdd0948d9fcc11f7fe2411cc0f125d09a88a0667f99fa284d305062f3602b677b64dbd78ecd3a08c90ad23143d68ad126d039bd0a6399dc7d1f344a1775e79f1554db630a41f0c0222ced83b742607629d28baa8a923cbdf3c64a097aa1ffcd31fc16e840edb3ece614de9e92c2b6f4aea20ea244ded4f18a8593a0ea943041cc01d066ef0cffdaa34204afeea6188fa054c150c71073714ea905ba619cee93d43b9cb497e91133193908e6388f3fda4b8da5a202e6680d41d3d87004e9b4618e47aa47c50d667568ae34bb1c0586954f8e897d148ddd1449d013e57825f888033b223c22e3eddea4d311092d2f24b36aafbf9f76330e5c5647ccc79b8c1a85fbe3dd10e2d3fbaa95bceda0c377d5e36564fae626922b62c7bba99d48ccdfc594543dc9313e2f0b933b53c69fbb6dad4c2a6c2bf1d8a22c1c9ead215c2794a334c38bc13914ad501c642ff17602e866b27d684272008f695c80921cb4213b28e60c97e786dd0a054e05acdb5f3e86a99a7c7c3025f095e18f42bc7c2604d555492a41520c8ad11cb2923ba6e7b6e278859cc57b06be1c35b28957c22c814ceffd1b642b078f236148e14abad83498e05bd6386c0c55eef98ccca12579e342f4aba29481420f3ae07422a5ac21da8293503575294e823003b7685c77bbfc9ccd1fe9cbca7ae1f90e149956544fb3fa187fce2a6f3116f3d9d8c76ec28007cd1e703a261f679b86ae8c925d6711280a67842f93c5567b1522fcd26ad650c0fc070860ab34eb8f132dd09f3ff194c8e98734902cdf9afa2c18b0e954a699f0ac3fe2c506a2d65d811499405152075d509cbe8ef85696fc67032744f2cba7d0992443bcc6423e34200e4c9e9c520edaf2d5b186721780800657359f679f3c8aa6010e76530bfd5ff95eec62740053b1d5fc2583e84cb6a5674f3ce7dd521cce55f7cd60ffd0bcf77f3e629f0c0e058cf875c188c6eebd434d172793ebc55bd801cadc72be7959bf41d40d6b6a34e72fd8f197ba45d95f1600c56607c28f41511b4e94209c64364d5dd445bc184b1dd38c3c22e03993daee5248b71a54b7f03d47cf541c83c25843490c12e0aea752c0e218ab15dd2906d0a8c88164026151c58a99ae2e7659d2bcf07ed1318e87dcd6554b9692ddc0c1c8a45cfee485b8168c50ecc357cd4fc388d8d1ebc1f382d5bda417eea1657cd5e5bad85c6608ecde21e34b809c9eda2992a7fcc015e4b6437cb3ff893ea2edd56a96e7c9f53be41eed9f862aee50a455b08b99938865075aa937f32c7aa145e39f8c15fd9984d027e8540abfb144216164f684b36cd854550534087536a272d14b61dcbff4bcc03041b5de81586f4cccc7489b1cd46f4a03e1819c4659a2e36aeea1d117cae89038bd84211bd90c51633133b357a1adaa4523caa1eb5a9ba32352830f5e9d7f45cd6ac38958860b4022fe4f9b2901d42deb891da3a58d888f17473cd5d9b305278b94b58ebb3f961f3940b01cea2611233cd359dace2358c4dc03c0a8e72ea84a8378a37534615c57a2bbd6b8f65438d46b11a5d0bbedc6fe65b661b0995a83738aa3db145115c0cd185c93466ab9ce1915e888687a1461f5563fb5a4cf2beb35773f84bc5f35728e7de898668609e7d0ac0875d31757ceeb9e82c83c83e72ffef806e919b8321c78a365b426564eeb8b2e77851398b807da1ec9671ec8a6377f25ee2978c43b78e1a6f259ad7a5b47cb9b23166664f46ff0cdd31f7e3a8473abd5aae38f1399649f43634d8d338bca3b420eb9aaa40425c3f7cb80709a35f4c9789b1b9801ea2b579aa390e6af6aab84d2c5df84121e75c9846f16772f15c63005ed53fa156406e14f591b4a4143e7ec5763854c480018f6363a051624adb552755822eefa6a888e1239d80565ff7ac51e10b4c6556df43645f5038dd34b0c2912b3e0f9ed3faf1f41aec373914701d5346dbc872a2f3fc69dc02415ab6c1a1fdf9f813797f16d34b247be86d55eb2c80ccd8a1a4e3cf533572145964a0cc1fd5cfdf5382ae4a691737753b4fe766a04bc9c1ed7bb1daff25d5d3d108d5e3bc9ac11c205af3793316dc5c62833ad5d7afcd8eeb3b667284d4b3cd922a3b54066b93aa94155b498c5a0596db2079f8bce550d9d0f0ab4df483fcf794a26b75bf1239618795be8258727ed4f34dc738a49ceada391cea35cfda2fc7f4fdb6c2bdcc587a361dd826b4291cd0b324b9e60ca1187899953b74871d0f02a331429d420aadc84a12655527c276aee5db8d257fb763ff90d49950eabe0954936a2e445472fe1990d4c61ae173594912d8fa878f7b32f56868775cfc7667e849c26966f8c6ae9fb77c6c04f78074ddd0f3bbd9057f33979505befb6493872efa5b57da83541b042bf7caa9498ef2ed93ceb83e02d0f02ceb126f1e30b48d428ed0e82eaf4a898b16fed7beac74ef0a4a7c95b7851b235793d19102ce971226996531fe3d4ba80954de829f6a536e3a3602b8a86ed6e2e0ec199239f37476996f09a369e83d53e265641262c82aef3f6cf9912438969a8a9b13162c343508f0b18db14f3af38f82668cc478503effca9f9ab2337c6ffdced08564d723915b04b45b6be4a3574f4179c33b8578bd41d7d5ebede64162f648629a54c184947a8da8893ad9ccf9691d8faf874eda94e717cf8a14e69170d0f66ac2bc12a33874b0cc04256d87de5062a6cea8d571e2082c9c5e00e83c7eff0364478dfb785b30d6401bcf10f05af152774bbe37ec882107755a53043c746f576982d71e1da8df2bcad87f7adf3e0effcbbf0d61025ba0c47b9350f571e61641fdb9f2c42878872064f14e47b57f0346c102f8745de302fa83ff405e7efa2459be48ade5d4ec67c7aed6ced88e3ea646739a63fb513ae9b1d9466043b5b1ff316e173f1198adfeb04832ed4dcef9b2cae59e8c494300917b73ec5388ef08826acddd0f595d03fc91e4dafeb89f001a91e42bdee131393826352e5428da042120421511301975b4e68a4161ad088ad47dde212cbd33f3796ddb7fc1df66b7d3922a69e557290a5cec15765cd2b2e9fb071442e9703bb00937d575fa320e9056fa07e2332fe270e4bb5ddefb42e2da474915c99ca5bdfefa16a1dd313ec8645a923700ac98f5f5ecb471a39ea7772a8e002c2f9dc89176f1e204c55ffef602237758331bf9d76a33fa96e4fa49bc2075ddce69ceea54ad56681420ca43c6e906a85c700e5d07d5020d45ebc9d3b289fe404178f1f764c7ca0b866704d1a98e5b9158e2a894bfee7d6892b1650f9e3f4d063035d5eb9677b8493cddfa6258f241469c86914ae055273ad0a5da90d48711d749406c69bcbb4e22a4ad835d8f81f106ab7665d255a7c2972fd8984c562df696846487e95af8b511e01b759a4393157f90f44d50f24cf42aeb8cbf0cc2f63a3a2efed2358618c4ec86c7a9d942a0b8cb9c791a1d1196c4cd83416a9d895de1c0cd4367bbdd3458caa74bc54cb5e912a9d37a8b114a287ca2afdca70e282171da31ce5f772ded0dac4e869a20285820f8c2e84240f11627bde62a22d7dd5664ca35f1189debef86c04897dd36c8bb23da155c5537358573a683e331caaeb84b8df40ab7eae528ec8757a8eff64811e157c328970f9043f394e3f5e1e40fa87e27506643baf050a2f90be3b6e6f5b4714ac022fa0e642da81d4a7b25afe16c39025994faff2de34fbb2a1104598af8e0c02ff73631562472fd097376118c35c864910f61b70d4f699bdd902c4dfe556", 0x1000}, {&(0x7f00000015c0)="376108759b8fd54cd593493f66dfb0e1d4d806193b868174f15ae055560f8072e583f4982bab9c7758048d95d429cf76b6a4b4649bd09fbe76a3491ba8e23e5de738121922ad31c18e8ddc78a66f0daf037bf14b396581261ac1db60bc3ac44271578717ac91322ab594d1a135f353bbc688e010a4e0d23d06c217824407cbc79210b1ec09ae4af43eab0010ff44993a1f213263f9c1583c5120a3f094a828e90a3add0d1ed5e2ae6506720d6121d8760e128768225f85a33e4e7e6332fd65a6c502b15244b39ddf63d73076b823fa48f0d4ebbca85cc3e14ceec98f", 0xdc}, {&(0x7f00000016c0)="257f1f2c43fe095a6f3f4b6d38939224911ee9af9103009541e451f9fe7d7214749a421958ab7fc5d42afca7d3b6b9f8a93bf0c884f92e5db4f3fb226d54d0a71af582de598ce891df1efea35172cba48639804ea97b55f5", 0x58}, {&(0x7f0000001740)="fdada53fe135d3dcff308d0ece28423c052985102887dc7ce89d6b40aee81b33c70dcf9f7e528513a0c18ee81d4c16e7f0", 0x31}, {&(0x7f0000001780)="2ab166cab8136674feadc74abfdd2eefbbe55c97a14c5c7d15e8e7df58f69f50db024250e3f679b4220748090a923b9d7c41ec34c3ba2d23bf22ac34a2bb0d38c40de07c19aee8e3bd4b51678bf51dee505d9a1e23eae301c227d1bc23e4b0", 0x5f}], 0xa, &(0x7f00000018c0)=[{0xe0, 0x102, 0x8, "63e3b35a78c09b642d42f6119af7fef6da4d47608904a42e72ba0b7483e86fa3cd8b4e10c4ad0117eeeeca513ff35f254c81e0f27879af494724873b3d01429957efe762bb284a2133a305ced50f0ff112e6fe7a69f7c9e86112553f8aa224b7ad315d74ca17e94fe396d84cec2cd6c6f55933ef50d75143b0f6ca4be7d0ec22215b1ed1ed60e8e5f2832c408d847b64732ded8080532a8c2cdc470f5d0ea6f73c474e84d20f345a62e4be03ec56b155df9306fe65728910fb3d1cfb3b8b8b31fa00d9ddaec23a556906a4aa75b194"}, {0x90, 0x6, 0x0, "fd1fae4adae487945ff5d17a35646894c6401a0d73e02209c1e870a916e57a2ec7cab63fc8eae83f67ec7b9def87e190ca580a3e7bc6b3df63274d9498e1cec726044e4deb17a1e66ff66f4a933f823b9190ee23e9efe1b12ead2786d3bf8980114e50f57e42dd897e7e46993e7b619c8cd7251ba1d8730f1013e2aaacfd35"}, {0xc0, 0x82, 0x20, "afc9ed92ef40c38106e80199e0e6966e8dd17ecfc572cc4863ea1a6b9c5c75901f11cd94f6d815177a2851b169ecb189f5807f9dd1c8fd949a76d508e5b8c4d9ee7b0c4a48af12f30b0b908304de39b4789a88ae0285d3e734384e8941894bea247ec8915a801101648a3f22f2d446529290e45c32514f809ad2935e9f0ee53dfb61c2d5c698be1f83e1ff1d7cfb3a3ec7d5bd9fff38b0a45505ae87c78a44df9f27a742dedeb8c77de03f6ad7097f"}, {0xe0, 0x117, 0x7ff, "a589f44ac371f91fba5cf4a7ba7d2b10583023744e3a74517ad7ce1dfd8421f1e37464121077c63a65c23954dbbdc9e13c0c5bd61540ce703b57c36a8ca246102a77d5ed99c0ad18d826c8f4b85b451789b138d4a0981e6dbb1d3e51882f0800ef88ab38d661edf6cb50a66444c21334618f2397b39162aa2583de3ad140c44a84546fba879905719183d042668c645f361b3af84f7b1332ba7ba624dc0bf55a731adc2a25e14e607d08367423bf857cff7f0bd533bb10a0e9ed7951fe624d6f32a61f15d4d60df458891fd2cf"}, {0x110, 0x6609893a3e6ccc31, 0x0, "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"}], 0x420}, 0x200000d0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x700000000000000) 00:22:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x3f00}, 0x0) 00:22:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = socket$kcm(0x29, 0x90db6ce686108ed7, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) recvmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000080)}, {&(0x7f0000000580)=""/178, 0xb2}, {&(0x7f0000000100)=""/100, 0x64}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000300)=""/87, 0x57}, {&(0x7f0000002640)=""/90, 0x5a}], 0x7, &(0x7f0000002740)=""/126, 0x7e}, 0x10040) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r7, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000029c0)={0xd, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x1, 0x0, 0x9, 0x2, 0x1, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x60}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000002840)='GPL\x00', 0x63, 0x391, &(0x7f0000002880)=""/177, 0x1f00, 0x9, [], r7, 0x13, r8, 0x8, &(0x7f0000002940)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000002980)={0x0, 0x7, 0xfd, 0x800}, 0x10, 0xffffffffffffffff}, 0xffffffffffffff30) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002a40)={r4, r9}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x800000000000000) 00:22:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x4000}, 0x0) 00:22:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1, r4}) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1192a54388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x2449920400000000) 00:22:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x7000}, 0x0) 00:22:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:52 executing program 2: r0 = gettid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10b0, 0x7, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x9, 0xf, 0x0, 0x0, 0xfff9}, r0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r6, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r7, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000080)={r7, r8}) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_subtree(r9, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) setsockopt$sock_attach_bpf(r9, 0x107, 0x12, 0x0, 0x2a0) 00:22:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x101d0}, 0x0) 00:22:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x3300000000000000) 00:22:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x40000}, 0x0) 00:22:53 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xda56, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x1}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x3, 0x5, 0x2}, &(0x7f0000000140)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r0, 0x0, 0xd, &(0x7f0000000000)='/dev/net/tun\x00', r5}, 0x30) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x3f00000000000000) 00:22:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x8000a0}, 0x0) 00:22:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00'}, 0xffffff51) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x598) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x4000000000000000) [ 267.501144][ T27] audit: type=1800 audit(1576628573.645:52): pid=16202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="memory.events" dev="sda1" ino=16518 res=0 00:22:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r1, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0xc, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x40) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r7, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000280), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r9, 0x0, 0x5, &(0x7f0000000100)='user\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x4, 0x0, 0xc1, 0x24, 0x0, 0x6, 0x100, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x7}, 0x38410, 0x7, 0x1, 0x9, 0x2, 0x0, 0xffff}, r5, 0xe, r10, 0x2) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xc000000}, 0x0) 00:22:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x59a) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:54 executing program 3: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x9e4d4e9181b8d58d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r1, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 00:22:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0xff00000000000000) 00:22:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x1d8140c8}, 0x0) 00:22:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:54 executing program 3 (fault-call:0 fault-nth:0): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r1, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x1, 0x4, 0x7, 0x8, 0x0, 0x3, 0x19000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x2, @perf_config_ext={0x100000000}, 0xc000, 0x9, 0x9, 0x0, 0x8, 0x7fff, 0x1000}, r1, 0xd, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="4cc09d3e09f220c5268a10320224be4613259b4c4799a618837ea050c1a571e07cc801cdb4fee1bfd69d3a3b6256d7f2afe6380be9cd480d74a0b3735b16a498ac0fc6139432ae315c781ff9c32e120e"], 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000280), 0xfffffffffffffddb) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x474280e2cf3580a2, 0x1, 0x5}, 0x20) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000080)=r2) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0xffffff69, 0x0, 0x0, 0x0, 0xfffffffffffffefd}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0xffefffffff0f0000) 00:22:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xb38) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x3f000000}, 0x0) [ 268.521727][T16272] FAULT_INJECTION: forcing a failure. [ 268.521727][T16272] name failslab, interval 1, probability 0, space 0, times 0 [ 268.577597][T16272] CPU: 1 PID: 16272 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 268.586328][T16272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.596437][T16272] Call Trace: [ 268.599892][T16272] dump_stack+0x197/0x210 [ 268.604263][T16272] should_fail.cold+0xa/0x15 [ 268.608901][T16272] ? fault_create_debugfs_attr+0x180/0x180 [ 268.615541][T16272] ? ___might_sleep+0x163/0x2c0 [ 268.620448][T16272] __should_failslab+0x121/0x190 [ 268.626392][T16272] should_failslab+0x9/0x14 [ 268.630931][T16272] kmem_cache_alloc_node_trace+0x274/0x750 [ 268.636773][T16272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.643040][T16272] ? cap_capable+0x205/0x270 [ 268.648469][T16272] __kmalloc_node+0x3d/0x70 [ 268.653001][T16272] __bpf_map_area_alloc+0xbd/0xf0 [ 268.658068][T16272] bpf_map_area_alloc+0x20/0x30 [ 268.662943][T16272] array_map_alloc+0x4bc/0x7d0 [ 268.667728][T16272] ? array_of_map_free+0x50/0x50 [ 268.667749][T16272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.667763][T16272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.667778][T16272] ? array_of_map_free+0x50/0x50 [ 268.667794][T16272] __do_sys_bpf+0x478/0x3810 [ 268.667812][T16272] ? bpf_prog_load+0x18f0/0x18f0 [ 268.667828][T16272] ? __kasan_check_write+0x14/0x20 [ 268.667846][T16272] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 268.667866][T16272] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 268.716317][T16272] ? wait_for_completion+0x440/0x440 [ 268.721644][T16272] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 00:22:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0xffffffffa0008000) 00:22:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x40000000}, 0x0) [ 268.727935][T16272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 268.733431][T16272] ? do_syscall_64+0x26/0x790 [ 268.738142][T16272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.744252][T16272] ? do_syscall_64+0x26/0x790 [ 268.749482][T16272] __x64_sys_bpf+0x73/0xb0 [ 268.753939][T16272] do_syscall_64+0xfa/0x790 [ 268.758473][T16272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.764379][T16272] RIP: 0033:0x45a919 [ 268.768303][T16272] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.790024][T16272] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 268.798458][T16272] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 268.806461][T16272] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 268.806470][T16272] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 268.806477][T16272] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 268.806485][T16272] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:22:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x10d8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x70000000}, 0x0) 00:22:55 executing program 1: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="ff10000000000000"], 0x8) write$cgroup_pid(r1, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000040)) 00:22:55 executing program 3 (fault-call:0 fault-nth:1): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb6774d975430ab775f1d15f64c78f940eed556c43c9e0f9daf7ef91845c8e8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af0000000000"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xa0008000}, 0x0) 00:22:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="65a419e413a00c34"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:22:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1678) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 269.490803][T16322] FAULT_INJECTION: forcing a failure. [ 269.490803][T16322] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:22:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 269.566223][T16322] CPU: 1 PID: 16322 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 269.575388][T16322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.586859][T16322] Call Trace: [ 269.590401][T16322] dump_stack+0x197/0x210 [ 269.595550][T16322] should_fail.cold+0xa/0x15 [ 269.600180][T16322] ? fault_create_debugfs_attr+0x180/0x180 [ 269.606017][T16322] ? ___might_sleep+0x163/0x2c0 [ 269.610908][T16322] should_fail_alloc_page+0x50/0x60 [ 269.616136][T16322] __alloc_pages_nodemask+0x1a1/0x910 [ 269.616219][T16322] ? __alloc_pages_slowpath+0x2920/0x2920 [ 269.616242][T16322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.616256][T16322] ? find_next_bit+0x107/0x130 [ 269.616278][T16322] pcpu_populate_chunk+0xf8/0x940 [ 269.627791][T16322] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 269.627806][T16322] ? find_next_bit+0x107/0x130 [ 269.627828][T16322] pcpu_alloc+0xd5b/0x1380 [ 269.627852][T16322] ? pcpu_alloc_area+0x820/0x820 [ 269.627880][T16322] __alloc_percpu_gfp+0x28/0x30 [ 269.627896][T16322] array_map_alloc+0x698/0x7d0 [ 269.627916][T16322] ? array_of_map_free+0x50/0x50 [ 269.678472][T16322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.685087][T16322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.692790][T16322] ? array_of_map_free+0x50/0x50 [ 269.697755][T16322] __do_sys_bpf+0x478/0x3810 [ 269.702370][T16322] ? bpf_prog_load+0x18f0/0x18f0 [ 269.707329][T16322] ? __kasan_check_write+0x14/0x20 [ 269.712472][T16322] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 269.718043][T16322] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 269.723352][T16322] ? wait_for_completion+0x440/0x440 [ 269.728737][T16322] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 269.735017][T16322] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 269.740500][T16322] ? do_syscall_64+0x26/0x790 [ 269.745197][T16322] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.752247][T16322] ? do_syscall_64+0x26/0x790 [ 269.756974][T16322] __x64_sys_bpf+0x73/0xb0 [ 269.763767][T16322] do_syscall_64+0xfa/0x790 [ 269.768306][T16322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.774232][T16322] RIP: 0033:0x45a919 [ 269.778232][T16322] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.798222][T16322] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 269.806655][T16322] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:22:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 269.814803][T16322] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 269.822794][T16322] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 269.830783][T16322] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 269.839297][T16322] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:22:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) socketpair(0x4, 0x5, 0x1, &(0x7f0000000000)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0xb8fbcc373f3ce313, 0x6, [@dev={[], 0x14}, @dev={[], 0x14}, @dev={[], 0x21}, @empty, @random="66143ffa3d6f", @random="7b37af7b92b1"]}) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r3, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x3, 0x6, 0x6, 0xce, 0x0, 0x7f, 0x1, 0xb, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, @perf_config_ext={0x6, 0x3f}, 0x1000, 0xffffffffffffffff, 0xe44, 0xc36dac6375a0f3f9, 0x1, 0x2, 0x8}, r2, 0x10, r5, 0x1a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:22:56 executing program 3 (fault-call:0 fault-nth:2): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xc840811d}, 0x0) 00:22:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 270.264033][T16361] FAULT_INJECTION: forcing a failure. [ 270.264033][T16361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.349798][T16361] CPU: 0 PID: 16361 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 270.358549][T16361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.368821][T16361] Call Trace: [ 270.372147][T16361] dump_stack+0x197/0x210 [ 270.376522][T16361] should_fail.cold+0xa/0x15 [ 270.381135][T16361] ? fault_create_debugfs_attr+0x180/0x180 [ 270.389035][T16361] ? ___might_sleep+0x163/0x2c0 [ 270.389067][T16361] should_fail_alloc_page+0x50/0x60 [ 270.389083][T16361] __alloc_pages_nodemask+0x1a1/0x910 [ 270.389099][T16361] ? __alloc_pages_slowpath+0x2920/0x2920 [ 270.389121][T16361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.389142][T16361] ? find_next_bit+0x107/0x130 [ 270.422711][T16361] pcpu_populate_chunk+0xf8/0x940 [ 270.427770][T16361] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.433551][T16361] ? find_next_bit+0x107/0x130 [ 270.438383][T16361] pcpu_alloc+0xd5b/0x1380 [ 270.443071][T16361] ? pcpu_alloc_area+0x820/0x820 [ 270.448393][T16361] __alloc_percpu_gfp+0x28/0x30 [ 270.453286][T16361] array_map_alloc+0x698/0x7d0 [ 270.458089][T16361] ? array_of_map_free+0x50/0x50 [ 270.463065][T16361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.469672][T16361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.475964][T16361] ? array_of_map_free+0x50/0x50 [ 270.480933][T16361] __do_sys_bpf+0x478/0x3810 [ 270.485559][T16361] ? bpf_prog_load+0x18f0/0x18f0 [ 270.490527][T16361] ? __kasan_check_write+0x14/0x20 [ 270.495669][T16361] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 270.501244][T16361] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 270.506559][T16361] ? wait_for_completion+0x440/0x440 [ 270.511876][T16361] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 270.518151][T16361] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 270.523643][T16361] ? do_syscall_64+0x26/0x790 [ 270.528330][T16361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.528344][T16361] ? do_syscall_64+0x26/0x790 [ 270.528364][T16361] __x64_sys_bpf+0x73/0xb0 [ 270.528381][T16361] do_syscall_64+0xfa/0x790 [ 270.528404][T16361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.557219][T16361] RIP: 0033:0x45a919 [ 270.561133][T16361] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.582758][T16361] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.591183][T16361] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:22:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0x1c18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0x21b8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) sendmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000000)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000580)="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", 0xfa}, {&(0x7f0000000100)="8ff21a8dc42a94fe7d89b0c783a0cf11cfe53c92aafca5e711e6edee26c24d8d2776666a231b42dac7ed553b7e80ccbdf2dfe79d4b323584a5605bee5c1f08efebff857a4d354633bed12a13f40a6212ad11333abf0bbc0dc5", 0x59}], 0x2, &(0x7f0000000680)=[{0x38, 0x118, 0x9, "7d9542359c3b8c4bcd6d77fb055c38a4948e424f850fca3ef96afd0b733f3327b1fe3555a46a22f6"}, {0x1010, 0x14e4e9bb9d389f5d, 0x1, "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"}, {0x60, 0x110, 0x0, "4363df6001a41b94dfac3393c8b87da3e3980d7b24194a2df3b9b155b2c242bfd500e374bd095d68ec4ad6a38da22bffa1cd22bd74c72472d6eeaeb078dd142e30750637fc6930db5577"}, {0x100, 0xff, 0x0, "e3899bcaf58ef74ee18014b5243dc9b04981e8108bbc928188f5966f6507e32bed865aa977299fb870947421baa0751b36c40ce0fa5449d1960c76e50b729118d1e657b02d21c9468283cc9b762c05041749b0934344859bd556350f4731e408bccac1e2d87ac328c458cf38cdce5fcc80e72142ab8e59cf68da38804fa084e62c338cd3160759e75aba4188e928e013c3d7c4501e43eb0f55f77cc0ab5a85cab431f3fa2bf41ccbd57dc825529c80842a28eb5285a02b135cbc0022c596a52d8e2954d41084d2e6c70e184e63418aec5e195855d75336a7b6504949255e7e5a5ef5b8967723010e1ded39e14b"}, {0x40, 0x113, 0x2, "f22f6f22809af961eb5423ea4220ba2a9fc573261c5142e4b62a05df7f42e5780c608ce779aaf226842385197af7"}], 0x11e8}, 0x404c004) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 270.599262][T16361] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 270.607966][T16361] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 270.615960][T16361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 270.623951][T16361] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:22:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xd0010100}, 0x0) 00:22:56 executing program 3 (fault-call:0 fault-nth:3): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 270.832127][T16389] FAULT_INJECTION: forcing a failure. [ 270.832127][T16389] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.876236][T16389] CPU: 1 PID: 16389 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 270.885055][T16389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.895400][T16389] Call Trace: [ 270.898723][T16389] dump_stack+0x197/0x210 [ 270.903119][T16389] should_fail.cold+0xa/0x15 [ 270.907749][T16389] ? fault_create_debugfs_attr+0x180/0x180 [ 270.913674][T16389] ? ___might_sleep+0x163/0x2c0 [ 270.918664][T16389] should_fail_alloc_page+0x50/0x60 [ 270.923918][T16389] __alloc_pages_nodemask+0x1a1/0x910 [ 270.929323][T16389] ? __alloc_pages_slowpath+0x2920/0x2920 [ 270.935102][T16389] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.941375][T16389] ? find_next_bit+0x107/0x130 [ 270.946168][T16389] pcpu_populate_chunk+0xf8/0x940 [ 270.951215][T16389] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.956957][T16389] ? find_next_bit+0x107/0x130 [ 270.961844][T16389] pcpu_alloc+0xd5b/0x1380 [ 270.966386][T16389] ? pcpu_alloc_area+0x820/0x820 [ 270.971450][T16389] __alloc_percpu_gfp+0x28/0x30 00:22:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x2758) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 270.976335][T16389] array_map_alloc+0x698/0x7d0 [ 270.981127][T16389] ? array_of_map_free+0x50/0x50 [ 270.986097][T16389] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.992386][T16389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.999610][T16389] ? array_of_map_free+0x50/0x50 [ 271.004581][T16389] __do_sys_bpf+0x478/0x3810 [ 271.010344][T16389] ? bpf_prog_load+0x18f0/0x18f0 [ 271.016273][T16389] ? __kasan_check_write+0x14/0x20 [ 271.021448][T16389] ? __mutex_unlock_slowpath+0xf0/0x6a0 00:22:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xeffdffff}, 0x0) [ 271.027148][T16389] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 271.032471][T16389] ? wait_for_completion+0x440/0x440 [ 271.037797][T16389] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 271.044078][T16389] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 271.049564][T16389] ? do_syscall_64+0x26/0x790 [ 271.054301][T16389] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.060390][T16389] ? do_syscall_64+0x26/0x790 [ 271.065109][T16389] __x64_sys_bpf+0x73/0xb0 [ 271.069570][T16389] do_syscall_64+0xfa/0x790 [ 271.074103][T16389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.080025][T16389] RIP: 0033:0x45a919 [ 271.080041][T16389] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.080049][T16389] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.080069][T16389] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:22:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, &(0x7f0000000200)=0x300000000000000) 00:22:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a80)={r2}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58ce4918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f27585a81ea8b821e86b2c470d11d4b8163e"], 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) openat$cgroup_subtree(r3, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000040)=@caif=@rfm, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1}, 0x100) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 271.103559][T16389] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 271.103568][T16389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 271.103577][T16389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 271.103584][T16389] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:22:57 executing program 3 (fault-call:0 fault-nth:4): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xf5ffffff}, 0x0) 00:22:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 271.356512][T16411] FAULT_INJECTION: forcing a failure. [ 271.356512][T16411] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 271.412509][T16411] CPU: 1 PID: 16411 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 271.421240][T16411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.421262][T16411] Call Trace: [ 271.421291][T16411] dump_stack+0x197/0x210 [ 271.421319][T16411] should_fail.cold+0xa/0x15 [ 271.421340][T16411] ? fault_create_debugfs_attr+0x180/0x180 [ 271.421356][T16411] ? ___might_sleep+0x163/0x2c0 [ 271.421381][T16411] should_fail_alloc_page+0x50/0x60 [ 271.421395][T16411] __alloc_pages_nodemask+0x1a1/0x910 [ 271.421413][T16411] ? __alloc_pages_slowpath+0x2920/0x2920 [ 271.421434][T16411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.421448][T16411] ? find_next_bit+0x107/0x130 [ 271.421470][T16411] pcpu_populate_chunk+0xf8/0x940 [ 271.486721][T16411] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 271.486738][T16411] ? find_next_bit+0x107/0x130 [ 271.486762][T16411] pcpu_alloc+0xd5b/0x1380 [ 271.486785][T16411] ? pcpu_alloc_area+0x820/0x820 [ 271.486813][T16411] __alloc_percpu_gfp+0x28/0x30 00:22:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x2cf8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xfffffdef}, 0x0) [ 271.486830][T16411] array_map_alloc+0x698/0x7d0 [ 271.486850][T16411] ? array_of_map_free+0x50/0x50 [ 271.486872][T16411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.497344][T16411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.497362][T16411] ? array_of_map_free+0x50/0x50 [ 271.497379][T16411] __do_sys_bpf+0x478/0x3810 [ 271.497399][T16411] ? bpf_prog_load+0x18f0/0x18f0 [ 271.497418][T16411] ? __kasan_check_write+0x14/0x20 [ 271.506761][T16411] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 271.506777][T16411] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 271.506794][T16411] ? wait_for_completion+0x440/0x440 [ 271.506817][T16411] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 271.506844][T16411] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 271.506864][T16411] ? do_syscall_64+0x26/0x790 [ 271.516487][T16411] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.516505][T16411] ? do_syscall_64+0x26/0x790 [ 271.516527][T16411] __x64_sys_bpf+0x73/0xb0 [ 271.516544][T16411] do_syscall_64+0xfa/0x790 [ 271.516563][T16411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.516574][T16411] RIP: 0033:0x45a919 [ 271.516589][T16411] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.516596][T16411] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.516610][T16411] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 271.516618][T16411] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 00:22:57 executing program 3 (fault-call:0 fault-nth:5): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.events\x00') write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 271.516625][T16411] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 271.516639][T16411] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 271.528160][T16411] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:22:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 271.755792][T16427] FAULT_INJECTION: forcing a failure. [ 271.755792][T16427] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:22:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xffffff7f}, 0x0) 00:22:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000440)='cgroup.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r5, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r6 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xc9, 0x4, 0x5, 0x0, 0x0, 0x58c, 0x100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0xa77d4d263f6ccd74}, 0x14040, 0x5, 0xe34a, 0x6, 0xdb, 0x10000, 0x9}, r4, 0x8, r5, 0xb) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x58d8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000a00)={&(0x7f0000000580)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000600)=""/144, 0x90}, {&(0x7f00000006c0)=""/43, 0x2b}, {&(0x7f0000000700)=""/209, 0xd1}, {&(0x7f0000000800)=""/230, 0xe6}, {&(0x7f0000000900)=""/59, 0x3b}], 0x5, &(0x7f00000009c0)=""/8, 0x8}, 0x60012140) r8 = getpid() perf_event_open(&(0x7f0000000ac0)={0x0, 0x70, 0x8, 0x7e, 0x2, 0x1, 0x0, 0x8001, 0x400, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x5, @perf_bp={&(0x7f0000000a80), 0x2}, 0x20000, 0xff, 0x7, 0x0, 0x8001, 0x562, 0x401}, r8, 0x7, r6, 0x2) r9 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r9, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r9, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000a40)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x616e44b0899dd6e1, 0x70, 0x9, 0x3, 0x3f, 0x7b, 0x0, 0x9, 0x7, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x2000, 0x3, 0x32, 0x6, 0x2, 0x9bc2, 0x4}, r9, 0xd, r1, 0x6) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 271.837156][T16427] CPU: 0 PID: 16427 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 271.845893][T16427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.855965][T16427] Call Trace: [ 271.859286][T16427] dump_stack+0x197/0x210 [ 271.863636][T16427] should_fail.cold+0xa/0x15 [ 271.869244][T16427] ? fault_create_debugfs_attr+0x180/0x180 [ 271.869263][T16427] ? ___might_sleep+0x163/0x2c0 [ 271.869292][T16427] should_fail_alloc_page+0x50/0x60 [ 271.869314][T16427] __alloc_pages_nodemask+0x1a1/0x910 [ 271.891375][T16427] ? __alloc_pages_slowpath+0x2920/0x2920 [ 271.898016][T16427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.905059][T16427] ? find_next_bit+0x107/0x130 [ 271.905084][T16427] pcpu_populate_chunk+0xf8/0x940 [ 271.905101][T16427] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 271.905114][T16427] ? find_next_bit+0x107/0x130 [ 271.905139][T16427] pcpu_alloc+0xd5b/0x1380 [ 271.930188][T16427] ? pcpu_alloc_area+0x820/0x820 [ 271.930220][T16427] __alloc_percpu_gfp+0x28/0x30 [ 271.930240][T16427] array_map_alloc+0x698/0x7d0 [ 271.930261][T16427] ? array_of_map_free+0x50/0x50 [ 271.944832][T16427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.944849][T16427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.944868][T16427] ? array_of_map_free+0x50/0x50 [ 271.944887][T16427] __do_sys_bpf+0x478/0x3810 [ 271.944906][T16427] ? bpf_prog_load+0x18f0/0x18f0 [ 271.944921][T16427] ? __kasan_check_write+0x14/0x20 [ 271.944939][T16427] ? __mutex_unlock_slowpath+0xf0/0x6a0 00:22:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x3298) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 271.944956][T16427] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 271.944974][T16427] ? wait_for_completion+0x440/0x440 [ 271.944997][T16427] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 271.945025][T16427] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 271.945045][T16427] ? do_syscall_64+0x26/0x790 [ 271.956256][T16427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.956326][T16427] ? do_syscall_64+0x26/0x790 [ 271.956356][T16427] __x64_sys_bpf+0x73/0xb0 [ 271.956377][T16427] do_syscall_64+0xfa/0x790 [ 271.956397][T16427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.956410][T16427] RIP: 0033:0x45a919 [ 271.956425][T16427] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.956432][T16427] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.956447][T16427] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 271.956455][T16427] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 271.956463][T16427] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 271.956472][T16427] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 271.956479][T16427] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:22:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f728020adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db80b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b99d1b8bf49ada7d2a821961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e4990600000000000000b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x11) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:58 executing program 3 (fault-call:0 fault-nth:6): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0x3838) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 272.252335][T16450] FAULT_INJECTION: forcing a failure. [ 272.252335][T16450] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 272.274149][T16450] CPU: 1 PID: 16450 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 272.282869][T16450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.292938][T16450] Call Trace: [ 272.296348][T16450] dump_stack+0x197/0x210 00:22:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xfffffff5}, 0x0) [ 272.300798][T16450] should_fail.cold+0xa/0x15 [ 272.305422][T16450] ? fault_create_debugfs_attr+0x180/0x180 [ 272.311352][T16450] ? ___might_sleep+0x163/0x2c0 [ 272.316318][T16450] should_fail_alloc_page+0x50/0x60 [ 272.321686][T16450] __alloc_pages_nodemask+0x1a1/0x910 [ 272.327098][T16450] ? __alloc_pages_slowpath+0x2920/0x2920 [ 272.332870][T16450] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.339137][T16450] ? find_next_bit+0x107/0x130 [ 272.344179][T16450] pcpu_populate_chunk+0xf8/0x940 [ 272.349230][T16450] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 272.355096][T16450] ? find_next_bit+0x107/0x130 [ 272.359883][T16450] pcpu_alloc+0xd5b/0x1380 [ 272.364346][T16450] ? pcpu_alloc_area+0x820/0x820 [ 272.369341][T16450] __alloc_percpu_gfp+0x28/0x30 [ 272.374572][T16450] array_map_alloc+0x698/0x7d0 [ 272.379362][T16450] ? array_of_map_free+0x50/0x50 [ 272.384865][T16450] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.391132][T16450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.397599][T16450] ? array_of_map_free+0x50/0x50 [ 272.402663][T16450] __do_sys_bpf+0x478/0x3810 [ 272.408078][T16450] ? bpf_prog_load+0x18f0/0x18f0 [ 272.413064][T16450] ? __kasan_check_write+0x14/0x20 [ 272.418205][T16450] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 272.423771][T16450] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 272.429082][T16450] ? wait_for_completion+0x440/0x440 [ 272.434392][T16450] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.440806][T16450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 272.446298][T16450] ? do_syscall_64+0x26/0x790 [ 272.451437][T16450] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.457570][T16450] ? do_syscall_64+0x26/0x790 [ 272.462364][T16450] __x64_sys_bpf+0x73/0xb0 [ 272.466978][T16450] do_syscall_64+0xfa/0x790 [ 272.472288][T16450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.478892][T16450] RIP: 0033:0x45a919 [ 272.483495][T16450] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.504705][T16450] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 272.513137][T16450] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 272.521391][T16450] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 272.529382][T16450] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 272.538240][T16450] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 272.546315][T16450] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:22:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:58 executing program 3 (fault-call:0 fault-nth:7): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x77, 0xf8, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:22:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x4000000000000}, 0x0) 00:22:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0x3dd8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 272.925962][T16485] FAULT_INJECTION: forcing a failure. [ 272.925962][T16485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 273.042748][T16485] CPU: 0 PID: 16485 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 273.051473][T16485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.062607][T16485] Call Trace: [ 273.065973][T16485] dump_stack+0x197/0x210 [ 273.070421][T16485] should_fail.cold+0xa/0x15 [ 273.075395][T16485] ? fault_create_debugfs_attr+0x180/0x180 [ 273.081936][T16485] ? ___might_sleep+0x163/0x2c0 [ 273.087026][T16485] should_fail_alloc_page+0x50/0x60 [ 273.092280][T16485] __alloc_pages_nodemask+0x1a1/0x910 [ 273.097962][T16485] ? lockdep_hardirqs_on+0x421/0x5e0 [ 273.103534][T16485] ? __alloc_pages_slowpath+0x2920/0x2920 [ 273.109806][T16485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.116663][T16485] ? find_next_bit+0x107/0x130 [ 273.121765][T16485] pcpu_populate_chunk+0xf8/0x940 [ 273.127738][T16485] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 273.134101][T16485] ? find_next_bit+0x107/0x130 [ 273.142166][T16485] pcpu_alloc+0xd5b/0x1380 [ 273.146620][T16485] ? pcpu_alloc_area+0x820/0x820 [ 273.152261][T16485] __alloc_percpu_gfp+0x28/0x30 [ 273.157433][T16485] array_map_alloc+0x698/0x7d0 [ 273.162221][T16485] ? array_of_map_free+0x50/0x50 [ 273.167203][T16485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.174090][T16485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.180617][T16485] ? array_of_map_free+0x50/0x50 [ 273.185768][T16485] __do_sys_bpf+0x478/0x3810 [ 273.191322][T16485] ? bpf_prog_load+0x18f0/0x18f0 [ 273.196393][T16485] ? __kasan_check_write+0x14/0x20 [ 273.202573][T16485] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 273.208152][T16485] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 273.213556][T16485] ? wait_for_completion+0x440/0x440 [ 273.218971][T16485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 273.225339][T16485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 273.230979][T16485] ? do_syscall_64+0x26/0x790 [ 273.235771][T16485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.241961][T16485] ? do_syscall_64+0x26/0x790 [ 273.246758][T16485] __x64_sys_bpf+0x73/0xb0 [ 273.251305][T16485] do_syscall_64+0xfa/0x790 [ 273.256201][T16485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.262720][T16485] RIP: 0033:0x45a919 [ 273.267668][T16485] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:22:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x8000a0ffffffff}, 0x0) 00:22:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 273.267677][T16485] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.267690][T16485] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 273.267698][T16485] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 273.267707][T16485] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 273.267715][T16485] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 273.267729][T16485] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:22:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000280), 0x12) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r6, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.swap.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) write$cgroup_subtree(r5, &(0x7f0000000380)=ANY=[@ANYRES32=r6, @ANYRES64=r3, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES32=r7, @ANYPTR], @ANYPTR], 0xfffffffffffffe88) write$cgroup_pid(r2, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000040)) 00:22:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:59 executing program 3 (fault-call:0 fault-nth:8): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:22:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xc00000000000000}, 0x0) [ 273.788965][T16529] FAULT_INJECTION: forcing a failure. [ 273.788965][T16529] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 273.854690][T16529] CPU: 0 PID: 16529 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 273.863526][T16529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.874382][T16529] Call Trace: [ 273.878129][T16529] dump_stack+0x197/0x210 [ 273.882637][T16529] should_fail.cold+0xa/0x15 [ 273.887534][T16529] ? fault_create_debugfs_attr+0x180/0x180 [ 273.893409][T16529] ? ___might_sleep+0x163/0x2c0 [ 273.898482][T16529] should_fail_alloc_page+0x50/0x60 [ 273.904112][T16529] __alloc_pages_nodemask+0x1a1/0x910 [ 273.909608][T16529] ? __alloc_pages_slowpath+0x2920/0x2920 [ 273.909632][T16529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.909652][T16529] ? find_next_bit+0x107/0x130 [ 273.909677][T16529] pcpu_populate_chunk+0xf8/0x940 [ 273.909690][T16529] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 273.909711][T16529] ? find_next_bit+0x107/0x130 [ 273.944282][T16529] pcpu_alloc+0xd5b/0x1380 [ 273.948855][T16529] ? pcpu_alloc_area+0x820/0x820 [ 273.954056][T16529] __alloc_percpu_gfp+0x28/0x30 [ 273.959008][T16529] array_map_alloc+0x698/0x7d0 [ 273.959028][T16529] ? array_of_map_free+0x50/0x50 [ 273.959047][T16529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.959061][T16529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.959075][T16529] ? array_of_map_free+0x50/0x50 [ 273.959099][T16529] __do_sys_bpf+0x478/0x3810 [ 273.994103][T16529] ? bpf_prog_load+0x18f0/0x18f0 [ 273.999360][T16529] ? __kasan_check_write+0x14/0x20 [ 274.005197][T16529] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 274.011280][T16529] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 274.016606][T16529] ? wait_for_completion+0x440/0x440 [ 274.022205][T16529] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 274.028655][T16529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 274.034738][T16529] ? do_syscall_64+0x26/0x790 [ 274.039782][T16529] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.039796][T16529] ? do_syscall_64+0x26/0x790 [ 274.039816][T16529] __x64_sys_bpf+0x73/0xb0 [ 274.039833][T16529] do_syscall_64+0xfa/0x790 [ 274.039850][T16529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.039869][T16529] RIP: 0033:0x45a919 [ 274.069520][T16529] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.090095][T16529] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x4378) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x3f00000000000000}, 0x0) 00:23:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 274.098521][T16529] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 274.106506][T16529] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 274.114515][T16529] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 274.122499][T16529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 274.130481][T16529] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:00 executing program 3 (fault-call:0 fault-nth:9): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x3, 0x70, 0x0, 0x1f, 0xbe, 0xcd, 0x0, 0xffffffffffff3f52, 0x2000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x11, 0xfffffffffffff801, 0x0, 0x8, 0x3, 0x3, 0x9}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x4000000000000000}, 0x0) [ 274.398684][T16555] FAULT_INJECTION: forcing a failure. [ 274.398684][T16555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 274.448790][T16555] CPU: 0 PID: 16555 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 274.457513][T16555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.457520][T16555] Call Trace: [ 274.457544][T16555] dump_stack+0x197/0x210 [ 274.457566][T16555] should_fail.cold+0xa/0x15 [ 274.457594][T16555] ? fault_create_debugfs_attr+0x180/0x180 [ 274.487043][T16555] ? ___might_sleep+0x163/0x2c0 [ 274.492057][T16555] should_fail_alloc_page+0x50/0x60 [ 274.497280][T16555] __alloc_pages_nodemask+0x1a1/0x910 [ 274.503136][T16555] ? __alloc_pages_slowpath+0x2920/0x2920 [ 274.508892][T16555] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 274.515165][T16555] ? find_next_bit+0x107/0x130 [ 274.520102][T16555] pcpu_populate_chunk+0xf8/0x940 [ 274.525246][T16555] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 274.531096][T16555] ? find_next_bit+0x107/0x130 [ 274.536076][T16555] pcpu_alloc+0xd5b/0x1380 [ 274.540544][T16555] ? pcpu_alloc_area+0x820/0x820 [ 274.545699][T16555] __alloc_percpu_gfp+0x28/0x30 [ 274.550600][T16555] array_map_alloc+0x698/0x7d0 [ 274.555409][T16555] ? array_of_map_free+0x50/0x50 [ 274.560383][T16555] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 274.566762][T16555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.573988][T16555] ? array_of_map_free+0x50/0x50 [ 274.579298][T16555] __do_sys_bpf+0x478/0x3810 [ 274.583922][T16555] ? bpf_prog_load+0x18f0/0x18f0 [ 274.588947][T16555] ? __kasan_check_write+0x14/0x20 [ 274.588966][T16555] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 274.588983][T16555] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 274.589000][T16555] ? wait_for_completion+0x440/0x440 [ 274.589026][T16555] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 274.616607][T16555] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 274.622095][T16555] ? do_syscall_64+0x26/0x790 [ 274.627144][T16555] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.633238][T16555] ? do_syscall_64+0x26/0x790 [ 274.637954][T16555] __x64_sys_bpf+0x73/0xb0 [ 274.642939][T16555] do_syscall_64+0xfa/0x790 00:23:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="dbe56983d1861cfa"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 274.647739][T16555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.653865][T16555] RIP: 0033:0x45a919 [ 274.658000][T16555] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.678224][T16555] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 274.678240][T16555] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:23:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000280), 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) perf_event_open(0x0, 0xffffffffffffffff, 0xc, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r5 = openat$cgroup_ro(r4, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x96) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd20) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) openat$cgroup_ro(r2, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x2) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000280), 0x12) ioctl$TUNDETACHFILTER(r7, 0x401054d6, 0x0) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 274.678248][T16555] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 274.678255][T16555] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 274.678263][T16555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 274.678271][T16555] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:00 executing program 3 (fault-call:0 fault-nth:10): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x7000000000000000}, 0x0) 00:23:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x4918) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r4, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYRESOCT=r2, @ANYRES64=r0, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRES32=r0, @ANYRES16=r1, @ANYRES32=r1, @ANYBLOB="2cc452d5999d005eaec894c6c9306eff2cc8f021d1679aeff72865f446b2999fec3b5e2586c5242f51b27441994c69ee5b576054da5056fb9e41033af41357da9293d33fd72fef99a3", @ANYRES16=0x0, @ANYRESHEX=r3, @ANYRESOCT=r1], @ANYPTR=&(0x7f0000000080)=ANY=[], @ANYRES64, @ANYRES16=r4], 0x39) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 274.954077][T16578] FAULT_INJECTION: forcing a failure. [ 274.954077][T16578] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 275.056177][T16578] CPU: 0 PID: 16578 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 275.064908][T16578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.075165][T16578] Call Trace: [ 275.078481][T16578] dump_stack+0x197/0x210 [ 275.083042][T16578] should_fail.cold+0xa/0x15 [ 275.087662][T16578] ? fault_create_debugfs_attr+0x180/0x180 [ 275.094102][T16578] ? ___might_sleep+0x163/0x2c0 [ 275.099081][T16578] should_fail_alloc_page+0x50/0x60 [ 275.104416][T16578] __alloc_pages_nodemask+0x1a1/0x910 [ 275.109823][T16578] ? __alloc_pages_slowpath+0x2920/0x2920 [ 275.118001][T16578] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.124534][T16578] ? find_next_bit+0x107/0x130 [ 275.129330][T16578] pcpu_populate_chunk+0xf8/0x940 [ 275.134473][T16578] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.141171][T16578] ? find_next_bit+0x107/0x130 [ 275.146170][T16578] pcpu_alloc+0xd5b/0x1380 [ 275.150630][T16578] ? pcpu_alloc_area+0x820/0x820 [ 275.156401][T16578] __alloc_percpu_gfp+0x28/0x30 [ 275.161714][T16578] array_map_alloc+0x698/0x7d0 [ 275.167761][T16578] ? array_of_map_free+0x50/0x50 [ 275.172731][T16578] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.179003][T16578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.185414][T16578] ? array_of_map_free+0x50/0x50 [ 275.190387][T16578] __do_sys_bpf+0x478/0x3810 [ 275.195899][T16578] ? bpf_prog_load+0x18f0/0x18f0 [ 275.200961][T16578] ? __kasan_check_write+0x14/0x20 [ 275.207675][T16578] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 275.213342][T16578] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 275.219912][T16578] ? wait_for_completion+0x440/0x440 [ 275.225411][T16578] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.232560][T16578] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 275.238069][T16578] ? do_syscall_64+0x26/0x790 [ 275.242855][T16578] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.249187][T16578] ? do_syscall_64+0x26/0x790 [ 275.249210][T16578] __x64_sys_bpf+0x73/0xb0 [ 275.249227][T16578] do_syscall_64+0xfa/0x790 [ 275.249245][T16578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.249261][T16578] RIP: 0033:0x45a919 [ 275.275362][T16578] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.295856][T16578] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xc840811d00000000}, 0x0) 00:23:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='pwds.eve\xac\xdf\xb3\x1e\x9a\xd73|;Ld\xfb\xf8\x00\x00\x00\x00\x00\x00[<\"\xab5\xe4\x87P\x97\\\x187\xbe\xf6\x9eH7\xfaFe\xec\x98\x1fk\x84\x9c\x19\x1a\xcb\x19\x8d\xea\xbe\xa0\xdfiI:\xe6\x98\xca\f\x8a\xa4\x13$\x03eh\xa6_\x84\xcf%)aR\xb4\x89\x00\x00\x00\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0000a28da53c1b03bc65a3a4cd"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 275.304524][T16578] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 275.312600][T16578] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 275.322331][T16578] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 275.331014][T16578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 275.339907][T16578] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:01 executing program 3 (fault-call:0 fault-nth:11): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xd001010000000000}, 0x0) 00:23:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0x8) write$cgroup_pid(r1, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000040)) 00:23:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x4eb8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r1}) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x4, 0x81, 0x7, 0x0, 0xbc0, 0x8000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000080), 0xb}, 0x562a7c9cae5e46db, 0x8, 0x3d9, 0xa, 0x7ff, 0xffffffff, 0x7fa}, r4, 0x5, 0xffffffffffffffff, 0x2) [ 275.841247][T16624] FAULT_INJECTION: forcing a failure. [ 275.841247][T16624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 275.896813][T16624] CPU: 0 PID: 16624 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 275.906643][T16624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.918590][T16624] Call Trace: [ 275.922081][T16624] dump_stack+0x197/0x210 [ 275.926455][T16624] should_fail.cold+0xa/0x15 [ 275.931081][T16624] ? fault_create_debugfs_attr+0x180/0x180 [ 275.937370][T16624] ? ___might_sleep+0x163/0x2c0 [ 275.942356][T16624] should_fail_alloc_page+0x50/0x60 [ 275.947806][T16624] __alloc_pages_nodemask+0x1a1/0x910 [ 275.953484][T16624] ? __alloc_pages_slowpath+0x2920/0x2920 [ 275.959674][T16624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.966023][T16624] ? find_next_bit+0x107/0x130 [ 275.970843][T16624] pcpu_populate_chunk+0xf8/0x940 [ 275.975983][T16624] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.981783][T16624] ? find_next_bit+0x107/0x130 [ 275.986580][T16624] pcpu_alloc+0xd5b/0x1380 [ 275.991031][T16624] ? pcpu_alloc_area+0x820/0x820 [ 275.996001][T16624] __alloc_percpu_gfp+0x28/0x30 [ 276.001846][T16624] array_map_alloc+0x698/0x7d0 [ 276.006626][T16624] ? array_of_map_free+0x50/0x50 [ 276.006647][T16624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.006667][T16624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.017881][T16624] ? array_of_map_free+0x50/0x50 [ 276.017898][T16624] __do_sys_bpf+0x478/0x3810 [ 276.017916][T16624] ? bpf_prog_load+0x18f0/0x18f0 [ 276.017932][T16624] ? __kasan_check_write+0x14/0x20 [ 276.017949][T16624] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 276.017963][T16624] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 276.017980][T16624] ? wait_for_completion+0x440/0x440 [ 276.018003][T16624] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 276.066536][T16624] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 276.072022][T16624] ? do_syscall_64+0x26/0x790 [ 276.076848][T16624] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.082939][T16624] ? do_syscall_64+0x26/0x790 [ 276.087907][T16624] __x64_sys_bpf+0x73/0xb0 [ 276.092487][T16624] do_syscall_64+0xfa/0x790 00:23:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x4, 0x2}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='posix_acl_accessselinux$\x00') 00:23:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xeffdffff00000000}, 0x0) [ 276.097046][T16624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.102961][T16624] RIP: 0033:0x45a919 [ 276.106884][T16624] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.126510][T16624] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 276.126526][T16624] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 276.126534][T16624] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 276.126542][T16624] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 276.126550][T16624] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 276.126558][T16624] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x5458) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:02 executing program 3 (fault-call:0 fault-nth:12): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7e7b02486cdf3726"], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000280), 0x12) write$cgroup_pid(r2, &(0x7f0000000480), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) write$cgroup_int(r3, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)='memory.events\x00') 00:23:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xf5ffffff00000000}, 0x0) [ 276.357824][T16649] FAULT_INJECTION: forcing a failure. [ 276.357824][T16649] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 276.464349][T16649] CPU: 1 PID: 16649 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 276.473175][T16649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.483232][T16649] Call Trace: [ 276.483258][T16649] dump_stack+0x197/0x210 [ 276.483282][T16649] should_fail.cold+0xa/0x15 [ 276.483300][T16649] ? fault_create_debugfs_attr+0x180/0x180 [ 276.483316][T16649] ? ___might_sleep+0x163/0x2c0 [ 276.483342][T16649] should_fail_alloc_page+0x50/0x60 [ 276.483359][T16649] __alloc_pages_nodemask+0x1a1/0x910 [ 276.483378][T16649] ? __alloc_pages_slowpath+0x2920/0x2920 [ 276.483402][T16649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.483416][T16649] ? find_next_bit+0x107/0x130 [ 276.483436][T16649] pcpu_populate_chunk+0xf8/0x940 [ 276.483451][T16649] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 276.483464][T16649] ? find_next_bit+0x107/0x130 [ 276.483484][T16649] pcpu_alloc+0xd5b/0x1380 [ 276.483519][T16649] ? pcpu_alloc_area+0x820/0x820 [ 276.529280][T16649] __alloc_percpu_gfp+0x28/0x30 00:23:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 276.529300][T16649] array_map_alloc+0x698/0x7d0 [ 276.529321][T16649] ? array_of_map_free+0x50/0x50 [ 276.529341][T16649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.529355][T16649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.529371][T16649] ? array_of_map_free+0x50/0x50 [ 276.529389][T16649] __do_sys_bpf+0x478/0x3810 [ 276.529408][T16649] ? bpf_prog_load+0x18f0/0x18f0 [ 276.529423][T16649] ? __kasan_check_write+0x14/0x20 [ 276.529439][T16649] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 276.529455][T16649] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 276.529470][T16649] ? wait_for_completion+0x440/0x440 [ 276.529492][T16649] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 276.629129][T16649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 276.634625][T16649] ? do_syscall_64+0x26/0x790 [ 276.639337][T16649] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.645424][T16649] ? do_syscall_64+0x26/0x790 [ 276.650138][T16649] __x64_sys_bpf+0x73/0xb0 [ 276.654594][T16649] do_syscall_64+0xfa/0x790 [ 276.659134][T16649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.665041][T16649] RIP: 0033:0x45a919 [ 276.669140][T16649] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.690067][T16649] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 276.699024][T16649] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 276.707260][T16649] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 276.715509][T16649] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 276.723491][T16649] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 276.731569][T16649] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:02 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x18bde13c316563e7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='H'], 0x1) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYRESOCT=r0], 0x98c1ab68) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:03 executing program 3 (fault-call:0 fault-nth:13): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xffffff7f00000000}, 0x0) 00:23:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x59f8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 277.028189][T16680] FAULT_INJECTION: forcing a failure. [ 277.028189][T16680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 277.069448][T16680] CPU: 1 PID: 16680 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 277.078514][T16680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.088973][T16680] Call Trace: [ 277.092477][T16680] dump_stack+0x197/0x210 [ 277.096842][T16680] should_fail.cold+0xa/0x15 [ 277.101473][T16680] ? fault_create_debugfs_attr+0x180/0x180 [ 277.107447][T16680] ? ___might_sleep+0x163/0x2c0 [ 277.112339][T16680] should_fail_alloc_page+0x50/0x60 [ 277.117553][T16680] __alloc_pages_nodemask+0x1a1/0x910 [ 277.117573][T16680] ? __alloc_pages_slowpath+0x2920/0x2920 [ 277.117597][T16680] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.117610][T16680] ? find_next_bit+0x107/0x130 [ 277.117633][T16680] pcpu_populate_chunk+0xf8/0x940 [ 277.117649][T16680] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 277.117661][T16680] ? find_next_bit+0x107/0x130 [ 277.117688][T16680] pcpu_alloc+0xd5b/0x1380 [ 277.128813][T16680] ? pcpu_alloc_area+0x820/0x820 [ 277.128840][T16680] __alloc_percpu_gfp+0x28/0x30 [ 277.128857][T16680] array_map_alloc+0x698/0x7d0 [ 277.128876][T16680] ? array_of_map_free+0x50/0x50 [ 277.128896][T16680] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.128911][T16680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.128925][T16680] ? array_of_map_free+0x50/0x50 [ 277.128945][T16680] __do_sys_bpf+0x478/0x3810 [ 277.191998][T16680] ? bpf_prog_load+0x18f0/0x18f0 [ 277.206472][T16680] ? __kasan_check_write+0x14/0x20 [ 277.211601][T16680] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 277.217133][T16680] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 277.222928][T16680] ? wait_for_completion+0x440/0x440 [ 277.228221][T16680] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 277.234458][T16680] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 277.239919][T16680] ? do_syscall_64+0x26/0x790 [ 277.244769][T16680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.251019][T16680] ? do_syscall_64+0x26/0x790 [ 277.255700][T16680] __x64_sys_bpf+0x73/0xb0 [ 277.260763][T16680] do_syscall_64+0xfa/0x790 [ 277.265300][T16680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.271207][T16680] RIP: 0033:0x45a919 [ 277.275096][T16680] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.294712][T16680] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 277.303115][T16680] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 277.311085][T16680] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 00:23:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) openat$cgroup_ro(r1, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 277.319059][T16680] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 277.327035][T16680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 277.335024][T16680] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)={r0}) recvmsg$kcm(r0, &(0x7f0000000880)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)=""/141, 0x8d}, {&(0x7f0000000300)=""/107, 0x6b}, {&(0x7f0000000640)=""/240, 0xf0}, {&(0x7f0000000740)=""/171, 0xab}], 0x4, &(0x7f0000000800)=""/77, 0x4d}, 0x2) sendmsg$kcm(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="87146b9a76faac", 0x7}, {&(0x7f0000000900)="2964c3302a993009d7297b72d3939d63ed01a52609fa73311ba1278e9da07d09ac4bba138cf3a766856c5151c6a7e8ac52f0268819b0354ffff4b1d493334bacb176d621e304ac54f5f0e072d9731f3036d81a83b2b3b0280ebeb1e80ca151e757ec675d7f0f4acd848236279dee5a2587da76f6611c0df518e90a8296dd7743ce0f0fd2e34cc918cdf187d566b0c1d5051e1c8c9505ae17ec420cc9f8c62ce21e6b", 0xa2}], 0x2, &(0x7f0000000a00)=[{0x70, 0x11, 0x8, "d7ff04015e823e65a2e967b9eac190958b914eb6846cf03884a674f8d442bf9955bbf9f90acad04e2ef643e05d9f46d225719e9cbff076848342d581248c3f5b5691874dd418979b88782e729e48fdfcd0bff38a6e8fcac5923216576ca7"}, {0x48, 0x104, 0xffffffff, "12e9e3a54b499c5c03c73517527adf796bc3dd600b6dee7f32d01c0cdea679b6bd5a42d097c1f0b5ef9a37401d0527642cb2"}], 0xb8}, 0x8044) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000000)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25d8c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0xffffffffa0008000}, 0x0) 00:23:03 executing program 3 (fault-call:0 fault-nth:14): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000140)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x4}, 0x0) [ 277.654654][T16708] FAULT_INJECTION: forcing a failure. [ 277.654654][T16708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 277.714312][T16708] CPU: 0 PID: 16708 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 277.723057][T16708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.733121][T16708] Call Trace: [ 277.736444][T16708] dump_stack+0x197/0x210 [ 277.740816][T16708] should_fail.cold+0xa/0x15 [ 277.745463][T16708] ? fault_create_debugfs_attr+0x180/0x180 [ 277.751840][T16708] ? ___might_sleep+0x163/0x2c0 [ 277.756852][T16708] should_fail_alloc_page+0x50/0x60 [ 277.762083][T16708] __alloc_pages_nodemask+0x1a1/0x910 [ 277.767489][T16708] ? __alloc_pages_slowpath+0x2920/0x2920 [ 277.773241][T16708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.779514][T16708] ? find_next_bit+0x107/0x130 [ 277.779539][T16708] pcpu_populate_chunk+0xf8/0x940 [ 277.779553][T16708] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 277.779566][T16708] ? find_next_bit+0x107/0x130 [ 277.779591][T16708] pcpu_alloc+0xd5b/0x1380 [ 277.789408][T16708] ? pcpu_alloc_area+0x820/0x820 [ 277.789434][T16708] __alloc_percpu_gfp+0x28/0x30 00:23:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x5f98) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7, 0x2, 0x5, 0xbe, 0x0, 0x4, 0x100048, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffffa, 0x3}, 0x180, 0xffff, 0x4, 0x0, 0x3, 0xffffff81, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x80, 0x0, 0x4, 0x6, 0x0, 0x5a, 0x9008c, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x800, 0x6}, 0x20001, 0x0, 0x7f, 0x1, 0x1, 0x0, 0x7fff}, r1, 0xf, r2, 0x2) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000180)) r5 = openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)={[{0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2b, 'rdma'}]}, 0x11) [ 277.789450][T16708] array_map_alloc+0x698/0x7d0 [ 277.789472][T16708] ? array_of_map_free+0x50/0x50 [ 277.789493][T16708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.789508][T16708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.789524][T16708] ? array_of_map_free+0x50/0x50 [ 277.789540][T16708] __do_sys_bpf+0x478/0x3810 [ 277.789564][T16708] ? bpf_prog_load+0x18f0/0x18f0 [ 277.800063][T16708] ? __kasan_check_write+0x14/0x20 [ 277.800084][T16708] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 277.800099][T16708] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 277.800116][T16708] ? wait_for_completion+0x440/0x440 [ 277.800141][T16708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 277.800172][T16708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 277.800187][T16708] ? do_syscall_64+0x26/0x790 [ 277.800207][T16708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.809577][T16708] ? do_syscall_64+0x26/0x790 [ 277.809601][T16708] __x64_sys_bpf+0x73/0xb0 [ 277.809617][T16708] do_syscall_64+0xfa/0x790 [ 277.809640][T16708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.809651][T16708] RIP: 0033:0x45a919 [ 277.809665][T16708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.809672][T16708] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 277.809686][T16708] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 277.809700][T16708] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 277.857642][T16708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 277.857652][T16708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 277.857660][T16708] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:04 executing program 3 (fault-call:0 fault-nth:15): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) 00:23:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xc}, 0x0) 00:23:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0x6538) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 278.263608][T16735] FAULT_INJECTION: forcing a failure. [ 278.263608][T16735] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 278.352955][T16735] CPU: 1 PID: 16735 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 278.361882][T16735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.373085][T16735] Call Trace: [ 278.376402][T16735] dump_stack+0x197/0x210 [ 278.380766][T16735] should_fail.cold+0xa/0x15 [ 278.385397][T16735] ? fault_create_debugfs_attr+0x180/0x180 [ 278.391320][T16735] ? ___might_sleep+0x163/0x2c0 [ 278.396299][T16735] should_fail_alloc_page+0x50/0x60 [ 278.401527][T16735] __alloc_pages_nodemask+0x1a1/0x910 [ 278.406933][T16735] ? __alloc_pages_slowpath+0x2920/0x2920 [ 278.412849][T16735] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 278.419218][T16735] ? find_next_bit+0x107/0x130 [ 278.424016][T16735] pcpu_populate_chunk+0xf8/0x940 [ 278.429151][T16735] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 278.434896][T16735] ? find_next_bit+0x107/0x130 [ 278.439691][T16735] pcpu_alloc+0xd5b/0x1380 [ 278.444139][T16735] ? pcpu_alloc_area+0x820/0x820 [ 278.449110][T16735] __alloc_percpu_gfp+0x28/0x30 [ 278.453987][T16735] array_map_alloc+0x698/0x7d0 [ 278.458782][T16735] ? array_of_map_free+0x50/0x50 [ 278.463753][T16735] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 278.470019][T16735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.476295][T16735] ? array_of_map_free+0x50/0x50 [ 278.481254][T16735] __do_sys_bpf+0x478/0x3810 [ 278.485871][T16735] ? bpf_prog_load+0x18f0/0x18f0 [ 278.490841][T16735] ? __kasan_check_write+0x14/0x20 [ 278.495960][T16735] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 278.495976][T16735] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 278.495992][T16735] ? wait_for_completion+0x440/0x440 [ 278.496015][T16735] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 278.496042][T16735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 278.496062][T16735] ? do_syscall_64+0x26/0x790 [ 278.529012][T16735] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.535112][T16735] ? do_syscall_64+0x26/0x790 [ 278.539837][T16735] __x64_sys_bpf+0x73/0xb0 [ 278.544273][T16735] do_syscall_64+0xfa/0x790 00:23:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x70}, 0x0) 00:23:04 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="66f284be2f2d89e406e6d659d596a2f9b9d30b8b6c1db721fe5463fe1a66d672f1fb817fc0ee6b", 0x27}, {&(0x7f0000000580)="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", 0x1000}], 0x2, &(0x7f0000001580)=[{0x30, 0x119, 0x802000, "a9765b933854201bfab429e5fcd91e1c43247a60c3bac6359e06da9fdacb"}, {0xd8, 0x1, 0x6402df51, "d9cc916ae91d959bcc2f2d50b6d5cdcedd5f275e0b15addac2ba4c47b909cd3062f15f8b8a0e6fe09fc2a32328f22562bb997905a15f981309c28206b5f11d4b472a249d7dbfed57879a6f24b3f5af3b3ee4779f0cdcf1757adb0b11ef2bcb9438c64c0e58fac4cc28bde2074e606050e48fdd28e89dc149f821e53b116b1931db8facd90294ba058abee43c5a86720ab03efaeae27bcf4108ea33c3e6c07fd86ce3d69045e49a1466a57078c6c75108c5850b8b2aa57b3d322a4d1b7ee4746ddcfa96f8b79b82ba"}, {0x20, 0xe84ff63d64854db1, 0x0, "de543d92eedf6896ec902eee"}], 0x128}, 0x800) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) openat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 278.548787][T16735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.548799][T16735] RIP: 0033:0x45a919 [ 278.548813][T16735] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.548820][T16735] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 278.548834][T16735] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 278.548842][T16735] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 00:23:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 278.548850][T16735] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 278.548858][T16735] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 278.548872][T16735] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:04 executing program 3 (fault-call:0 fault-nth:16): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:04 executing program 1: perf_event_open(0x0, 0x0, 0x400000000000, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x12, 0x23, 0x4, 0x1}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000200)={'erspan0\x00', 0x200}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xda00) write$cgroup_pid(r1, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x800000) 00:23:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xc00}, 0x0) 00:23:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x6ad8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 278.887028][T16771] FAULT_INJECTION: forcing a failure. [ 278.887028][T16771] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 278.926189][T16771] CPU: 0 PID: 16771 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 278.934923][T16771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.945162][T16771] Call Trace: [ 278.945188][T16771] dump_stack+0x197/0x210 [ 278.945220][T16771] should_fail.cold+0xa/0x15 [ 278.952985][T16771] ? fault_create_debugfs_attr+0x180/0x180 [ 278.963369][T16771] ? ___might_sleep+0x163/0x2c0 [ 278.968739][T16771] should_fail_alloc_page+0x50/0x60 [ 278.968754][T16771] __alloc_pages_nodemask+0x1a1/0x910 [ 278.968773][T16771] ? __alloc_pages_slowpath+0x2920/0x2920 [ 278.968789][T16771] ? __sched_text_start+0x8/0x8 [ 278.968812][T16771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 278.968826][T16771] ? find_next_bit+0x107/0x130 [ 278.968844][T16771] pcpu_populate_chunk+0xf8/0x940 [ 278.968858][T16771] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 278.968868][T16771] ? find_next_bit+0x107/0x130 [ 278.968890][T16771] pcpu_alloc+0xd5b/0x1380 [ 278.979490][T16771] ? pcpu_alloc_area+0x820/0x820 [ 278.979518][T16771] __alloc_percpu_gfp+0x28/0x30 [ 278.979540][T16771] array_map_alloc+0x698/0x7d0 00:23:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x30a, 0x4}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x10}, 0x0, 0x800, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r5, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r6}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r6, 0x9, 0x4}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r7, 0x28, &(0x7f0000000340)}, 0x86) [ 278.991075][T16771] ? array_of_map_free+0x50/0x50 [ 278.991097][T16771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 278.991110][T16771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.991125][T16771] ? array_of_map_free+0x50/0x50 [ 278.991142][T16771] __do_sys_bpf+0x478/0x3810 [ 278.991162][T16771] ? bpf_prog_load+0x18f0/0x18f0 [ 278.991176][T16771] ? __kasan_check_write+0x14/0x20 [ 278.991191][T16771] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 278.991212][T16771] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 279.064274][T16771] ? wait_for_completion+0x440/0x440 [ 279.074469][T16771] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.074499][T16771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 279.074520][T16771] ? do_syscall_64+0x26/0x790 [ 279.107048][T16771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.113271][T16771] ? do_syscall_64+0x26/0x790 [ 279.118083][T16771] __x64_sys_bpf+0x73/0xb0 [ 279.122530][T16771] do_syscall_64+0xfa/0x790 [ 279.127067][T16771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.132974][T16771] RIP: 0033:0x45a919 [ 279.136906][T16771] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.156519][T16771] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 279.165065][T16771] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 279.173054][T16771] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 00:23:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 279.173124][T16771] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 279.189208][T16771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 279.189217][T16771] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x3f00}, 0x0) 00:23:05 executing program 3 (fault-call:0 fault-nth:17): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='mem\xff\x0f\x00\x00\x00\x00\x00\x00t\xf1\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000180)=0x1000) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="806d256d00027920a56a32bb7775b93112934655968a6c1b49576d4f34d610889beffad675c45d500f9f1df87eb74179ef652ff4525bc159a6ea61031280dfb2cac69c81e46a07270b5ae8fd744a6f0f47320c2d76abec95a1743ba775de357b6ef8f6372bac5bde30effafa748ab6db00ddf4efac80c7"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x4000}, 0x0) 00:23:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0x7078) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 279.598713][T16805] FAULT_INJECTION: forcing a failure. [ 279.598713][T16805] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 279.670536][T16805] CPU: 1 PID: 16805 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 279.679265][T16805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.689442][T16805] Call Trace: [ 279.692758][T16805] dump_stack+0x197/0x210 [ 279.697266][T16805] should_fail.cold+0xa/0x15 [ 279.701892][T16805] ? fault_create_debugfs_attr+0x180/0x180 [ 279.707720][T16805] ? ___might_sleep+0x163/0x2c0 [ 279.713220][T16805] should_fail_alloc_page+0x50/0x60 [ 279.718446][T16805] __alloc_pages_nodemask+0x1a1/0x910 [ 279.723847][T16805] ? __alloc_pages_slowpath+0x2920/0x2920 [ 279.729605][T16805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.735866][T16805] ? find_next_bit+0x107/0x130 [ 279.740675][T16805] pcpu_populate_chunk+0xf8/0x940 [ 279.745724][T16805] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 279.752009][T16805] ? find_next_bit+0x107/0x130 [ 279.756802][T16805] pcpu_alloc+0xd5b/0x1380 [ 279.761246][T16805] ? pcpu_alloc_area+0x820/0x820 [ 279.766228][T16805] __alloc_percpu_gfp+0x28/0x30 [ 279.771116][T16805] array_map_alloc+0x698/0x7d0 [ 279.775905][T16805] ? array_of_map_free+0x50/0x50 [ 279.780868][T16805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.787132][T16805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.787151][T16805] ? array_of_map_free+0x50/0x50 [ 279.787166][T16805] __do_sys_bpf+0x478/0x3810 [ 279.787184][T16805] ? bpf_prog_load+0x18f0/0x18f0 [ 279.787199][T16805] ? __kasan_check_write+0x14/0x20 [ 279.787222][T16805] ? __mutex_unlock_slowpath+0xf0/0x6a0 00:23:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff03000000000000"], 0x8) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="65017173781b4ca1", 0x8}, {&(0x7f00000006c0)="bd47988e033cada8bf788c5132fc22c2cc4d42ca4a494fafd822933550e3c44c0131c55528406db55fffd18479e47f9f5e2ead66cba595464551c9201eaea3d7c98b39b96d1c435f3d8e66572c89c8f05fecc2a6286fcee725a4d57ab11bdea4f98effaab48983c7899267a1e19388fd2b5ce60a481ce83ad30d312103462d8a934cdd1792b3aafe4b1088e597ca86d17ce2420527da9f5eed1f0a192956fb2968d016b8501e1027fbe08d3f3daa2dcf9490eb954961b791", 0xb8}, {&(0x7f0000000780)="ae095a9db2e5f2fda845f203161449b186320c70d93c6c739b9b6ad3306b76ce5c88ed6cb375f86456c9872781bc4a5fedaea9ee132cf0062454a14217a39b2346ba8bee8a2677614d48844c7e67b42616b205e259ba2864689d020711ca012ffe525a97bf4e4fd2046b998d514096e77e22bd6c76aeab1e01791763023a76907a771152f03a9cb9e8bca59568148bb5b9b19535a3d17ca404068eaf866fb8b90fab54bb81d0d3596fc27f74442ab6b99a57c9891aaf7a0badb93a05e3287dcedd0c1946d2933bb71d8198fc12538fedb927ea72f8da1275cde3eb759a58403e62d794edffd80ba27e598b1667286a412ae9b55806332840979488aa07dd4b461a61b66aa42fcab8d6ebfec518d6b28b09a2c845ab53349a19cb88f22c451a3899eaa9ed2c0193680378761df0a628e3722584c185b50404473632fa742c0f21a4baeedcc9a05d156e3ba8020e3fd69c31af00d1ec611759f78e8617b4c97e0a4c1c92682e48232f5e8550ed4974d20bac4f5e88d09e4d742f05b507f3d70be36f48b06348ccda7e4baee99d48578fc5001a07689a85a771c24ebe1708e030d856fe504df2ea690aa740b4376efffb0aec0ccd1788ce139ea4b8122e4d66beeb0a7e1b168b4b75d034ed27ef65e3fa0147c28bb8a40140a282c217df41641caf0c67cbc23b8414cbe2ea274bb228bf976aeba0854deb9bb2caee28733b0bfde5f345c85a529432d3f5201850339a44ec27ade9b3960015d400f2d438982507d38f50d053d8f8314c2dcd75863e3dcd00cf63707a6a0e439890de18d40b0fb0420cc821ad2a55cbbd5565465af655ba4f5f4fe7be71598bf25fd0f33a126b3485a68c4cb3b7df5fc09ee9919c2cfd7a043d598d6ca49abbbfcbc8588158c0422e949abc12fdc902a33db72c37c33d37f8911937c48f39d3fed2ecf10040e37ad67f8b09918f11e6f5b9469a3d7fbc06478a5be0a9071b4fd2a8aa48c501702efa5d46a38c65d7a117093d46646fe34d3d0ec7eb92c5366a764a4c51292adb73757959157cf340ba295e285880f3cd19d660a19d6e93b72919d17199aeba6be2ce42bfa7215521450b7549636c9ef2c5983cbdcee20acda0df8d2f26fc78b16822f840f4bc46d1b7335699efe68b2813c0fb79c2c82deb6dfe2f184210df7e7b2fd864516f5376b1c2f11bf480fd7651da2cc22127e153956352dd0f4e37419bd4b015ba8bed3c1262de5d950b10c4f73e276ed1f807ec79788b26dcbee2463514efe646ba6d3703bf3841e6492881a3b554185b41c702cd49d970b2a163d35fdcb380f60065ec4e42397befff3f1780ac85805df5f3a66add833f5e4f06fdc653631dc40ef22b4bad57f9979139d47cdb4abbce742bb24bd01cbf44393b7ac6bd85bf2a345f9fb4b52533e99981b9a0738f80c2af019ab17c771d3f606024a56fd4b1ee9059fdc2d05985a808adb575cedb10d62ff069bfe9c38778b0d25cddcf1758d3592e7f9dd5cdb41f8bdf73b2b0e484f998bd87743af66e78314aa8d71f28c63cfd4d41b650e85764f4389e15e61b78e99f5bee287bb11a8f308cfb5b451ff41d73bc14278b846a2d43e87b2dc2829ac8508c03111355b2962e311898868ef8c1aaf03838a64601ac1afcb04705786060b0c9b1d0939e5116f159d9c4b07e76c6859693bf23af20caa8f61e22be2b9a3e675af0dfad122db5016b749c2638d23314d4526608c714dc8a4c810104acf18968a9adeb1676b07bf0527c02107506cdcc3d2d56898849f60877737258d6bd84ba6d329d87a216332a7cfb901ffe981251c0e88f6bc3125abe1c676b30cbb55bf6aba8cf6a7ba24baa78dcb0d2147e9d3b069181c8260aebe7931f99ec9702eb988f98f6e7211ede496752e82c0afa00ecd978b0d2634eee6cfe637e38c0c634cfb5765a88c182051e601a6d58a5c29a3fc0a0f99ec414862d2252949802eed727415df4b4baaa66a6f4519d260376570f22443667ac4499215644d9930051c0ef955e3768bf88118c9877e01f69c9cfb4277a73c1af92d11367aab3f0729f9da8d92cf61100be6e01ea91f2d3d3e5262ba36c52be0ba839c6c563b3c4950aca3b014ecbf22fa3d3bfd18295f1eaf3abf7a0ac6d24585cf9a372f5325728d04795cf0b772ff93aea5adbd64f26d8ccbde9a7bc75d70292167341fda815a05c8e05f72bc613ab216161bce3bbcf4e8fc44e22f75527631334857ef5b7fa8ee3f2c8ee52619e876b4327615adc1facc2364a38444e1b1a0bb75f0307c677accca902868bf527f0a2ae4f90a4d353eaaf568ecd7847b40d6a8ab2d4d5e948687cf28aa87f8abd253cc558890022abf1d64705a6de32c168da36451aa70282aafc0f1596967f2cd52575e4ca2e63025a3c4f0e314cae20bf237c4a2aad5efb9852692ba350f525dc3ec35e0fc3f0d3e58f135abc00b77a7c2e02567d1754746e9c36b32fb47fa771a1d66adf5eea42bc57b5bb7439f511f3dcbecf6f18880d514ba474a870400b756e4d527c36a6b0cdef56dd288e2e2650c4e3e178fd947bc0173317da866a8804b89382e8dd24e0e8d47063585e348d2787abaee2bee767c0d8f86dfb0e0dcbd7de03860181052c005bb02ff544dceae77e73bb9ad4b2b2dc307ca47dd5cbf1324e35345b9327c410be1d6aea16f6b83a4a61cab6fcd59f0846a602369ce2c2565914038f84a8fdc605b7f81b2948b1c81124587823edb9addd6fd79e9cc654df46249d9802d30c7cabe9e88d4669e27ac3917448486724c88f0c05858cd470a2c442dd65970503be329229cc9deeba3a626be5b0a35cf3c2bdb754b7b0b47125e2d5f6a71b3d58eac5ab58f8651c2bec0ac32daeb9f1ea937d464a19aba1b599046856474f38f1d721ffcbee1c32ef9e4782b5fd3026194f6b972f091fa02fe5bec6cd736bd06861e743d6842c4575303d7f59e59ba2b9ebb30f72b123506331fb467d3178afd15b6bcf991969326628d082757c33d82efd48f17f3b6d74d624d2d94e91eafa8b7e9a192460f3adce8348c1763103a9c7219ec41595b029a1da9cac1dad72cb242ecc94c8f98cc345d58ade92f9467f36e1b9cda64b7dc7d01c0c3885b35443997ce328a71cecb8e05f97a627a55e7a7fd926ae7074836e5984291322181b9b51d41e1dd97dcc40e2da2d7717b24ee06e7fb0bc3aa9565a13f7ffbaf5e6d24e4dca0ac25d33ea721d4c5c28ef9daa9ee755f9da42ee7792f15161ee8d5b12bb4c27e38b7797c8cb61d9164e9304a54bd044404ca21be4410e2e61a69278ed040ca963c65330c09a1c5de71543e5c7df3e04979a728b03d4b61707a75fb7d0dd5e10a06e84aba735433fefcab596b986001dffdf78095974a8d47523feab22e4a61d5426190e6993c49a08b3514c2666bba2b2b2f3aaca7bb18717caa95456e4919b91011c73ca3e5129854a8fdb95da8bfc27398fd707589b24d911e013fe73809291e8c3ea2767af4f8fc7d35a650720c9f987a57de8ddea2f94cb01bbcc238a3ef79098866a3ba9a4e6f3c91eeebaa4977a2154765f8f973bee31069c5a4ca67337a9d864f20723241b583218d38cfc2a39e161f9f93f526470fac1f270b61a933ee2688958590cb5e2d536d6c33684dc34e811036b386e251bf3b32b0aa90903d66a1940099e7c7099475635d4e1c6c960b87e04e432c0ff33debd5e2220ca04b0f093d7a72fc0c1da345618a9ba71db57eb882f4d5cce48a8461205ceab5e211ccace943c4912ef572a202fd23b3411b5842f39ae98798360d626bc1c8ec8a2e5893620f040abef0770b045f60fcf44ab04b340c42d704d70037c088a6735f7ccc053f9096d806ba64e8d14ec2d70c8831024305efe8c8128dd58be54f086bae31de8982ab66132f00bfd0465944429030c2649b00c16455003a13ce912e9702b431be03aa565221a812a4d1b902d5f41ddf5552cc2242f5da10b875b6c09e053e1fe4eb1da9ee90a989f1f6cf0904141ae56ebf7b2de35c805ee5272140ba2f90e65dd444e129c9d33a6010b7829babf1113709a1d957c2b8f2d298422abd08cbdeb6877027f1c27227b67fc0a76c4def2df0a6a998022b0689068d4f6e25567cf8250fbae36e5963b4ab7509ef09e6ebfe6b2d64b777495e9a30e33dee497d709b4f0d3cbf66198a4bbee9c5b925f3d57143af5a757b2976628802354206fb32faf5b75076d60172699358e8a8434d744caad6db142f68fa5faaff8924bc5ee9c1e8dc42399943579297e241092386dd7c8b314dc3e78fd9a5f53e8f630d62b2080f08802359b8fe0de3716750e11aabb1a2238d5ca3e33fa9529c09b22be4804c81dbcdb11b3f630fb718e7b360268f85fe62b9b0933b50b536c43f72f87d1da35c127a056c4299223dc0d16ac85c44d85c56ddc8901cda4cf004db1eb616398750678be42b1d45ea800b6814de4b2edb7e5a7c966ef16e814ec1e179db5a6477b3764764e63f7e73e539f58d2173d78d3ee886ad451d94a6654615aa2c60987fff05052bc11bbec1f78eff9a8444f550d992393ca293f5502de0f66604250d12fbb6ab56831e7ee7ed23b9430785a3b5ffdb8445016a62a2b67e0ecaca1ffa5d807f680a19a21afd4cdea2ca300491ed5cd263da6fa6b5c36460cecb378c2a3f8b8f3bfcc45e8aedf5663b73bdcdadf61441df94fa59e0be8699e4b6cdbd2fdb42390b841708dc00e81563164a6cf6c34271b495d39914eef4f621536191f5091899c8dcefa3fb210b80087213394f723e6cd3de5a7c8cbcf0deef787d8c8df2ebf6bd2ffa383f8f1ea917b112c3f58eda1c99ced9f52e0e5036dbf61a0c6b03b69bf46b37188b50881ddae58de64fd3372e942ac1768e63ab068aafacc26a356183c9b0672847f4c71cd8a1461d81cf79a0de6cee7a0e816a39a9aca34023bbe859ba2aff24cbbbdffe8852a3f342fdb9954ebd71999775653c81ee99847dd8b5babee2ae651f1e17c06d08b1a61e558af526df43783c4be08accfc37b09fd0fa9981d9e3e9e264ad2a29f4cf1cfd6deed5f4a7263ab112f02aa8427ef0b8a3ad64c8b5a67cb384176f32280441f9daa22d5d3afd01688700713a2f65343eefaf84ab4de93b3bacd135ff54ea3f1e803a566db05cc949e06f9af315e4c5315e7ace803d97587a702e582fd083293e20166943511339e1821b186b43a5a310776aa7dda4fe3d04d52747fa3c2c99925966705c87a687ddb224c790c362ab899be5a134007d6aa8cc347c71430bf1aab69c3f4c59dd41654809923b8eb78f94d2370584f97a34648e9cd25e77f7c22b920664e0192c6db60a7db17863ad186b0663f10a34ecf00d8cbf6ab9a3627111acb14c5803f0331b84642d6a89794a161d5a8010f7fb024a33cad02541313d11796323c6246de94a1045a3902e19cc2ff9248a3c87c59512ae36b97dbfc822a6b87f21b9ca10191f79f2263a0c37fe9f8a4a1a3776dd080ea555a33b7a23f7118bc2136f0ae49efe901d900126d1047e9a0f7653220ee7a74f56ab1eb0d382cb45a05a637a978817010a031efd8db2f4806921fd5a69ef3ac9978e3eb5a09c6652e91f3da14e031bf9db489b6bde21a2aae33f4d3c2b91b8d9422d39a40cb21dc808c98f9e7cfa27999b13f4fecf89e486ad496f46920cc073e121535e52ad1e7efec0c46eeea842b4c578c8688452d5d22dfac01731a7be3e2848a6f659eceb9235082bdbbb7b63a8933a1a6675ccb673207b0ccf2c4837d2a13cceb0a6fb199fce38fd0f720993a47d648cc89", 0x1000}, {&(0x7f0000001780)="9c31d5ec54929952a0eddf644216cc9d98e7337be116d1a87dac898173435fb6c733e04583f3f27273a6f3eeba256541a7f70f98aff1943ef2012af733ac3d80c2543ed52f4d6f3abca4784d033de625d60042d796ccffaa77a0eed8db19c3668ba790009f75b0c2e704c3b134f878da6bdb66cea6bc2764b3ad1ad93e9df8c15e7945d16dc89bfed3fdaad759aeca", 0x8f}], 0x4, &(0x7f0000000280)}, 0x619a6a584d0dd4f2) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000000)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x117) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 279.819835][T16805] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 279.825132][T16805] ? wait_for_completion+0x440/0x440 [ 279.830655][T16805] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.838348][T16805] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 279.838364][T16805] ? do_syscall_64+0x26/0x790 [ 279.838380][T16805] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.838394][T16805] ? do_syscall_64+0x26/0x790 [ 279.838416][T16805] __x64_sys_bpf+0x73/0xb0 [ 279.838434][T16805] do_syscall_64+0xfa/0x790 [ 279.838454][T16805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.838467][T16805] RIP: 0033:0x45a919 [ 279.838482][T16805] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.838490][T16805] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 279.838504][T16805] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:23:06 executing program 3 (fault-call:0 fault-nth:18): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 279.838513][T16805] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 279.838522][T16805] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 279.838531][T16805] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 279.838539][T16805] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x7000}, 0x0) [ 280.104681][T16831] FAULT_INJECTION: forcing a failure. [ 280.104681][T16831] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 280.152966][T16831] CPU: 1 PID: 16831 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 280.161769][T16831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.161776][T16831] Call Trace: [ 280.161799][T16831] dump_stack+0x197/0x210 [ 280.161823][T16831] should_fail.cold+0xa/0x15 [ 280.161845][T16831] ? fault_create_debugfs_attr+0x180/0x180 [ 280.161860][T16831] ? ___might_sleep+0x163/0x2c0 [ 280.161886][T16831] should_fail_alloc_page+0x50/0x60 [ 280.161900][T16831] __alloc_pages_nodemask+0x1a1/0x910 [ 280.161920][T16831] ? __alloc_pages_slowpath+0x2920/0x2920 [ 280.161942][T16831] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.161955][T16831] ? find_next_bit+0x107/0x130 [ 280.161973][T16831] pcpu_populate_chunk+0xf8/0x940 [ 280.161992][T16831] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 280.218577][T16831] ? find_next_bit+0x107/0x130 [ 280.218600][T16831] pcpu_alloc+0xd5b/0x1380 [ 280.218625][T16831] ? pcpu_alloc_area+0x820/0x820 [ 280.218653][T16831] __alloc_percpu_gfp+0x28/0x30 [ 280.218672][T16831] array_map_alloc+0x698/0x7d0 [ 280.218694][T16831] ? array_of_map_free+0x50/0x50 [ 280.218716][T16831] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.238943][T16831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.238962][T16831] ? array_of_map_free+0x50/0x50 [ 280.238978][T16831] __do_sys_bpf+0x478/0x3810 [ 280.238998][T16831] ? bpf_prog_load+0x18f0/0x18f0 [ 280.239013][T16831] ? __kasan_check_write+0x14/0x20 [ 280.239031][T16831] ? __mutex_unlock_slowpath+0xf0/0x6a0 00:23:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001a00), 0x8}, 0x0, 0x3, 0x2009, 0x0, 0x0, 0xfffffffc}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000001a00)=ANY=[], 0x0) write$cgroup_subtree(r4, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) sendmsg(r3, &(0x7f0000000340)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x2, 0x0, 0x4, 0x2, {0xa, 0x4e22, 0x40, @mcast1, 0x7}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000580)="60097248fe73578fbb330af03d61ee8bf53290f228daa4b8033ede02c2fc33509bca994233f756f8ea481a4c4b3f15018bf68510d5331cb30f3abc0ef3a58e8267d8b644b132fe2ebcf35ec71e858122c450bfabd06f842e5f007f3f21ade79aed33444054e379dcbdf112f0db9e5e61e5a2d321dfa4fe59605df18a8d45f13d07a5350ad638b5e7d48e76456e5d251b13e621f35ac37296e1419d872a50804beffa2ecc5492feb2103b2e509ee575eef346eda500c5cedb", 0xb8}, {&(0x7f0000000640)="b6e07423bf2a6bfcd5938d7b7257fcf8d22fdcc479335821c576e58e51418bea0d04723222dce82c272fb7a61b9263ea11442301ccdee73208c329a9afe71dad7a0a9743346f3dd6e333a9a71452a64f626a00d46abf38d0c46f38b6c66fe6ceff6185aa471f8fe3df74dae192c718334b18ad1f0ee7cb77951892b1703f8e8527e08a640ffc272c0cb2ed2ff7f21e1422ccd33c85d7115d1c0eea24d90ec19c86906c67a3b7196d39d13ae76e768cf3158786734063ce73952457f1a7def3a5291d12f3a7445305a38a7caec90a89ebfc7fe1d96959c0defdc3ebed031fa6d719291aa46506dffdc21948da1d07b707db4cd0c9992b0abf90f4e69f", 0xfc}, {&(0x7f0000000100)="28131dba06c389de76638d0fe1d3f1efe64986c1aeaf4bc04a4f91f81b6c9ecc93f5ce46bd81a25a6723c58b6271b1f214561945f498fa9e44cb7b9244c171e2", 0x40}, {&(0x7f0000000740)="97e7f77e92475b5f4e759bb02511ef88417ca5db3d28799081a10d11ef1d57e718ef549a002c3f199afe60b52394add67694dc046ec84e3def88ac035c489749001f94689eb0a288e80421e9f83f12a95f0905c1f5b4b6caee1a8a10db9d0b49a28b9c8f495a5c8f667ae00c19b1d9e77ff75dd6470c961375f2eaac548eb611bad60f0bfd11a78c7a50dcf0f93ff06833137e9eca64dbd6a62fbe03c797dfa10e6441420f058f30c219aaf77d6df59fab3c69b5c68bcd319d763a1d87f72988336bb7cc704a13746ec35c", 0xcb}, {&(0x7f0000000140)="04b17c1cec665cff56078b684131e37a738e78feb55480cb218746dff0fb14110253f462d168c34ec1e7382244b24f79", 0x30}, {&(0x7f0000000840)="90e392296b995e794454fda033ecad4185db3e6c3748212e2ada5eaddcf164ab01a711d712bc070bf3f90909c14c33ac9122acbbc5a324a7eb40eca0319820099870c43096f805e30b1b10ee6d8cba4bccfe7b9aa673cc3198ec3f977349aaec94784298d8e85f71026d30603e070b1e0c4bd55f0ec995452deac6da19135f92c617edb9278070f508ba02df9fa66331c8beda839229393eeb8f", 0x9a}, {&(0x7f0000000280)="207acd4210a5cad716c8069d21dd17ea64b2dd943b53a02b137a549c286b9404", 0x20}, {&(0x7f0000000300)="4ef38222ff5c08", 0x7}], 0x8, &(0x7f0000000980)=[{0x50, 0x100, 0x2, "056f6b6516a250ff3d4d16a42460406cff8ad2b65473ca1cdff95568e25876327d8e0d754afe96d22e3a1cf75968b165866709c1552afcba2ac5107033bced"}, {0x1010, 0xf5820ffdbb02aa0a, 0x7a30, "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"}], 0x1060}, 0x48084) 00:23:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 280.239048][T16831] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 280.239066][T16831] ? wait_for_completion+0x440/0x440 [ 280.239089][T16831] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.239118][T16831] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 280.239137][T16831] ? do_syscall_64+0x26/0x790 [ 280.248572][T16831] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.248587][T16831] ? do_syscall_64+0x26/0x790 [ 280.248610][T16831] __x64_sys_bpf+0x73/0xb0 [ 280.248629][T16831] do_syscall_64+0xfa/0x790 [ 280.248648][T16831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.248662][T16831] RIP: 0033:0x45a919 [ 280.248684][T16831] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.248692][T16831] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 280.248706][T16831] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 280.248721][T16831] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 280.263250][T16831] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 280.307531][T16831] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 280.307541][T16831] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000280), 0x12) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r2) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x101d0}, 0x0) 00:23:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x7618) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:06 executing program 3 (fault-call:0 fault-nth:19): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x1, 0x9, 0x20, 0x0, 0x5, 0x80, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x5, @perf_config_ext={0x800, 0xcb86}, 0x20000, 0xcbb, 0xff, 0xb, 0x5, 0x7, 0x4}, r2, 0xb, r3, 0x2) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0xa, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r6, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r7 = openat$cgroup_ro(r6, 0xffffffffffffffff, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) openat$cgroup_ro(r7, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x40000}, 0x0) [ 280.626730][T16856] FAULT_INJECTION: forcing a failure. [ 280.626730][T16856] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 280.661820][T16856] CPU: 0 PID: 16856 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 280.670545][T16856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.681714][T16856] Call Trace: [ 280.685038][T16856] dump_stack+0x197/0x210 [ 280.689393][T16856] should_fail.cold+0xa/0x15 [ 280.694038][T16856] ? fault_create_debugfs_attr+0x180/0x180 [ 280.699873][T16856] ? ___might_sleep+0x163/0x2c0 [ 280.704754][T16856] should_fail_alloc_page+0x50/0x60 [ 280.709979][T16856] __alloc_pages_nodemask+0x1a1/0x910 [ 280.715388][T16856] ? __alloc_pages_slowpath+0x2920/0x2920 [ 280.721140][T16856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.727400][T16856] ? find_next_bit+0x107/0x130 [ 280.732199][T16856] pcpu_populate_chunk+0xf8/0x940 [ 280.737414][T16856] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 280.743156][T16856] ? find_next_bit+0x107/0x130 [ 280.747954][T16856] pcpu_alloc+0xd5b/0x1380 [ 280.752401][T16856] ? pcpu_alloc_area+0x820/0x820 [ 280.757526][T16856] __alloc_percpu_gfp+0x28/0x30 [ 280.762410][T16856] array_map_alloc+0x698/0x7d0 [ 280.767395][T16856] ? array_of_map_free+0x50/0x50 00:23:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 280.772391][T16856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.778656][T16856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.784935][T16856] ? array_of_map_free+0x50/0x50 [ 280.790178][T16856] __do_sys_bpf+0x478/0x3810 [ 280.795048][T16856] ? bpf_prog_load+0x18f0/0x18f0 [ 280.805371][T16856] ? __kasan_check_write+0x14/0x20 [ 280.811264][T16856] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 280.817013][T16856] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 280.822425][T16856] ? wait_for_completion+0x440/0x440 [ 280.828097][T16856] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.834552][T16856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 280.840146][T16856] ? do_syscall_64+0x26/0x790 [ 280.844903][T16856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.851079][T16856] ? do_syscall_64+0x26/0x790 [ 280.855819][T16856] __x64_sys_bpf+0x73/0xb0 [ 280.860370][T16856] do_syscall_64+0xfa/0x790 [ 280.865884][T16856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.871903][T16856] RIP: 0033:0x45a919 [ 280.876059][T16856] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.896307][T16856] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 280.904739][T16856] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 280.913106][T16856] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 00:23:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0x7bb8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 280.921218][T16856] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 280.921228][T16856] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 280.921237][T16856] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000740)=r4, 0x4) write$cgroup_subtree(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='cpuset.effective_mems\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffff52, 0x9}, 0x1}, 0x0, 0x0, r1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) r6 = gettid() r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) socketpair(0x1d, 0x1, 0x3f, &(0x7f0000000700)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r6, r7, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000280), 0x12) openat$cgroup_ro(r9, &(0x7f00000006c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000480)=r6, 0x12) recvmsg$kcm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/179, 0xb3}, {&(0x7f0000000200)=""/129, 0x81}, {&(0x7f00000002c0)=""/148, 0x9f}, {&(0x7f0000000380)=""/131, 0xffffffffffffff52}], 0x4, &(0x7f00000004c0)=""/232, 0xe8}, 0x82ff707c2d4f3969) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)=0x3) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_type(r10, &(0x7f0000000600)='cgroup.type\x00', 0x2, 0x0) 00:23:07 executing program 3 (fault-call:0 fault-nth:20): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x8000a0}, 0x0) 00:23:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a2761a9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6206008930f200000000000000"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2000}) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r3, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 281.410965][T16892] FAULT_INJECTION: forcing a failure. [ 281.410965][T16892] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.436135][T16892] CPU: 1 PID: 16892 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 281.445246][T16892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.455312][T16892] Call Trace: [ 281.458619][T16892] dump_stack+0x197/0x210 [ 281.463243][T16892] should_fail.cold+0xa/0x15 [ 281.467862][T16892] ? fault_create_debugfs_attr+0x180/0x180 [ 281.474660][T16892] ? ___might_sleep+0x163/0x2c0 [ 281.479982][T16892] should_fail_alloc_page+0x50/0x60 [ 281.485725][T16892] __alloc_pages_nodemask+0x1a1/0x910 [ 281.491127][T16892] ? __alloc_pages_slowpath+0x2920/0x2920 [ 281.497128][T16892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.503666][T16892] ? find_next_bit+0x107/0x130 00:23:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x8158) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xc000000}, 0x0) [ 281.508456][T16892] pcpu_populate_chunk+0xf8/0x940 [ 281.513596][T16892] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 281.519343][T16892] ? find_next_bit+0x107/0x130 [ 281.524247][T16892] pcpu_alloc+0xd5b/0x1380 [ 281.528790][T16892] ? pcpu_alloc_area+0x820/0x820 [ 281.534130][T16892] __alloc_percpu_gfp+0x28/0x30 [ 281.539013][T16892] array_map_alloc+0x698/0x7d0 [ 281.544851][T16892] ? array_of_map_free+0x50/0x50 [ 281.549818][T16892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.556178][T16892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.562434][T16892] ? array_of_map_free+0x50/0x50 [ 281.567933][T16892] __do_sys_bpf+0x478/0x3810 [ 281.572921][T16892] ? bpf_prog_load+0x18f0/0x18f0 [ 281.577991][T16892] ? __kasan_check_write+0x14/0x20 [ 281.584016][T16892] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 281.589711][T16892] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 281.595132][T16892] ? wait_for_completion+0x440/0x440 [ 281.600701][T16892] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 281.607065][T16892] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 281.614625][T16892] ? do_syscall_64+0x26/0x790 [ 281.619299][T16892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.625817][T16892] ? do_syscall_64+0x26/0x790 [ 281.625842][T16892] __x64_sys_bpf+0x73/0xb0 [ 281.625861][T16892] do_syscall_64+0xfa/0x790 [ 281.625882][T16892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.625894][T16892] RIP: 0033:0x45a919 [ 281.625909][T16892] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.625917][T16892] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 281.625931][T16892] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 281.625939][T16892] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 281.625947][T16892] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:23:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 281.625956][T16892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 281.625965][T16892] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:07 executing program 3 (fault-call:0 fault-nth:21): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x1d8140c8}, 0x0) [ 281.916505][T16911] FAULT_INJECTION: forcing a failure. [ 281.916505][T16911] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.955139][T16911] CPU: 1 PID: 16911 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 00:23:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x86f8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r2, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x9e51cee21ae858a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8000}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r4, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x3, 0x1f, 0x7, 0x5, 0x0, 0x800000, 0x2000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1f, 0x6, @perf_bp={&(0x7f0000000080), 0x118c6b681e09647e}, 0x2, 0xfffffffffffffc9f, 0x1, 0xf811da5a73cc9cf8, 0x5, 0x1, 0x1ff}, r4, 0xd, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000280)={0x0, 0xfff}, 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 281.963862][T16911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.974307][T16911] Call Trace: [ 281.977885][T16911] dump_stack+0x197/0x210 [ 281.982244][T16911] should_fail.cold+0xa/0x15 [ 281.986859][T16911] ? fault_create_debugfs_attr+0x180/0x180 [ 281.992702][T16911] ? ___might_sleep+0x163/0x2c0 [ 281.997572][T16911] should_fail_alloc_page+0x50/0x60 [ 282.003066][T16911] __alloc_pages_nodemask+0x1a1/0x910 [ 282.009192][T16911] ? __alloc_pages_slowpath+0x2920/0x2920 [ 282.014951][T16911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.021214][T16911] ? find_next_bit+0x107/0x130 [ 282.026007][T16911] pcpu_populate_chunk+0xf8/0x940 [ 282.031145][T16911] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 282.036991][T16911] ? find_next_bit+0x107/0x130 [ 282.041791][T16911] pcpu_alloc+0xd5b/0x1380 [ 282.047316][T16911] ? pcpu_alloc_area+0x820/0x820 [ 282.052289][T16911] __alloc_percpu_gfp+0x28/0x30 [ 282.057207][T16911] array_map_alloc+0x698/0x7d0 [ 282.062271][T16911] ? array_of_map_free+0x50/0x50 [ 282.067235][T16911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.073753][T16911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.080170][T16911] ? array_of_map_free+0x50/0x50 [ 282.080186][T16911] __do_sys_bpf+0x478/0x3810 [ 282.080204][T16911] ? bpf_prog_load+0x18f0/0x18f0 [ 282.080219][T16911] ? __kasan_check_write+0x14/0x20 [ 282.080235][T16911] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 282.080251][T16911] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 282.080269][T16911] ? wait_for_completion+0x440/0x440 [ 282.080298][T16911] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 282.123488][T16911] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 282.128960][T16911] ? do_syscall_64+0x26/0x790 [ 282.128976][T16911] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.128988][T16911] ? do_syscall_64+0x26/0x790 [ 282.129009][T16911] __x64_sys_bpf+0x73/0xb0 [ 282.129023][T16911] do_syscall_64+0xfa/0x790 [ 282.129047][T16911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.153949][T16911] RIP: 0033:0x45a919 [ 282.153966][T16911] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.153982][T16911] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 282.183604][T16911] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 282.199968][T16911] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 282.207939][T16911] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:23:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000007027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r4, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRES32=r4, @ANYRES64, @ANYRESHEX=r3, @ANYRESDEC=0x0, @ANYRESHEX, @ANYRESHEX], 0x5a) write$cgroup_subtree(r3, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) write$cgroup_subtree(r5, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'cpu'}, {0x2d, 'rdma'}]}, 0x13) r6 = gettid() r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x4, 0x20, 0x5, 0x0, 0x3, 0x2004, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0xf, @perf_bp={&(0x7f0000000200)}, 0x240, 0x100, 0x7, 0x9, 0x7, 0xffff}, r6, 0x5, r7, 0x2) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000140)=r3) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r8, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r8, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x2ef1, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000400)={0x5, 0x8, 0x0, 0x3dc}, &(0x7f0000000440)=0x8001, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x1}}, 0x10) 00:23:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e27, @rand_addr=0xb33}, 0x80, 0x0, 0xfffffffffffffe72}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x3f) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) recvmsg(r4, &(0x7f0000000100)={&(0x7f0000000000)=@hci, 0x80, &(0x7f0000002780)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/161, 0xa1}, {&(0x7f0000000300)=""/73, 0x49}, {&(0x7f0000001640)=""/65, 0x41}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/165, 0xa5}], 0x6, &(0x7f0000000080)}, 0x120) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 282.207953][T16911] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 282.224017][T16911] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:08 executing program 3 (fault-call:0 fault-nth:22): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x3f000000}, 0x0) 00:23:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 282.650455][T16946] FAULT_INJECTION: forcing a failure. [ 282.650455][T16946] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x8c98) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x10e) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 282.771640][T16946] CPU: 0 PID: 16946 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 282.780944][T16946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.793675][T16946] Call Trace: [ 282.793706][T16946] dump_stack+0x197/0x210 [ 282.793730][T16946] should_fail.cold+0xa/0x15 [ 282.793757][T16946] ? fault_create_debugfs_attr+0x180/0x180 [ 282.812831][T16946] ? ___might_sleep+0x163/0x2c0 [ 282.817821][T16946] should_fail_alloc_page+0x50/0x60 [ 282.823594][T16946] __alloc_pages_nodemask+0x1a1/0x910 [ 282.829517][T16946] ? __alloc_pages_slowpath+0x2920/0x2920 [ 282.835620][T16946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.842052][T16946] ? find_next_bit+0x107/0x130 [ 282.846956][T16946] pcpu_populate_chunk+0xf8/0x940 [ 282.852016][T16946] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 282.857925][T16946] ? find_next_bit+0x107/0x130 [ 282.862755][T16946] pcpu_alloc+0xd5b/0x1380 [ 282.867202][T16946] ? pcpu_alloc_area+0x820/0x820 [ 282.872176][T16946] __alloc_percpu_gfp+0x28/0x30 [ 282.877052][T16946] array_map_alloc+0x698/0x7d0 [ 282.881936][T16946] ? array_of_map_free+0x50/0x50 [ 282.887101][T16946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.893739][T16946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.900019][T16946] ? array_of_map_free+0x50/0x50 [ 282.906053][T16946] __do_sys_bpf+0x478/0x3810 [ 282.910695][T16946] ? bpf_prog_load+0x18f0/0x18f0 [ 282.915676][T16946] ? __kasan_check_write+0x14/0x20 [ 282.921078][T16946] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 282.927523][T16946] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 282.927543][T16946] ? wait_for_completion+0x440/0x440 [ 282.927565][T16946] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 282.927597][T16946] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 282.948497][T16946] ? do_syscall_64+0x26/0x790 [ 282.948520][T16946] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.948541][T16946] ? do_syscall_64+0x26/0x790 [ 282.971014][T16946] __x64_sys_bpf+0x73/0xb0 [ 282.975455][T16946] do_syscall_64+0xfa/0x790 [ 282.980314][T16946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.980326][T16946] RIP: 0033:0x45a919 [ 282.980342][T16946] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.980350][T16946] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x3, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000000c0)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000280), 0x12) mkdirat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffebe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xeb058c2f72bfd1bd}, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="3b3d8f08a64cefb7"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 282.980371][T16946] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 283.026993][T16946] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 283.035314][T16946] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.035324][T16946] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 283.035333][T16946] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x40000000}, 0x0) 00:23:09 executing program 3 (fault-call:0 fault-nth:23): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0x97a8) r3 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r3, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) r5 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r5, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r5, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r6, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r6, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r4, &(0x7f0000000200)=r6, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)=r0) 00:23:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x70000000}, 0x0) [ 283.324577][T16976] FAULT_INJECTION: forcing a failure. [ 283.324577][T16976] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x9238) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 283.392263][T16976] CPU: 0 PID: 16976 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 283.401109][T16976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.411196][T16976] Call Trace: [ 283.414511][T16976] dump_stack+0x197/0x210 [ 283.418899][T16976] should_fail.cold+0xa/0x15 [ 283.423532][T16976] ? fault_create_debugfs_attr+0x180/0x180 [ 283.430079][T16976] ? ___might_sleep+0x163/0x2c0 [ 283.434982][T16976] should_fail_alloc_page+0x50/0x60 [ 283.440205][T16976] __alloc_pages_nodemask+0x1a1/0x910 [ 283.446824][T16976] ? __alloc_pages_slowpath+0x2920/0x2920 [ 283.452681][T16976] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.458944][T16976] ? find_next_bit+0x107/0x130 [ 283.463732][T16976] pcpu_populate_chunk+0xf8/0x940 [ 283.468782][T16976] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 283.474522][T16976] ? find_next_bit+0x107/0x130 [ 283.479321][T16976] pcpu_alloc+0xd5b/0x1380 [ 283.483772][T16976] ? pcpu_alloc_area+0x820/0x820 00:23:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) openat$cgroup_ro(r1, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRESOCT=r3, @ANYRESHEX, @ANYRESHEX=r0]], 0x8) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x100000001) [ 283.488750][T16976] __alloc_percpu_gfp+0x28/0x30 [ 283.493629][T16976] array_map_alloc+0x698/0x7d0 [ 283.498430][T16976] ? array_of_map_free+0x50/0x50 [ 283.503400][T16976] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.509949][T16976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.516212][T16976] ? array_of_map_free+0x50/0x50 [ 283.521177][T16976] __do_sys_bpf+0x478/0x3810 [ 283.525796][T16976] ? bpf_prog_load+0x18f0/0x18f0 [ 283.530753][T16976] ? __kasan_check_write+0x14/0x20 [ 283.536061][T16976] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 283.541632][T16976] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 283.546936][T16976] ? wait_for_completion+0x440/0x440 [ 283.546960][T16976] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.546989][T16976] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 283.558495][T16976] ? do_syscall_64+0x26/0x790 [ 283.558513][T16976] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.558527][T16976] ? do_syscall_64+0x26/0x790 [ 283.558553][T16976] __x64_sys_bpf+0x73/0xb0 [ 283.558568][T16976] do_syscall_64+0xfa/0x790 [ 283.558589][T16976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.594972][T16976] RIP: 0033:0x45a919 [ 283.598901][T16976] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.619331][T16976] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 283.629258][T16976] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:23:09 executing program 1: socketpair(0x10, 0x5, 0x4c, &(0x7f0000000180)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2c066, 0x0, 0x0, 0x0, 0x137}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000280), 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x14) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x80, 0x0) r5 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x0, 0x0, 0x4}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r5, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r6}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r6}, 0xc) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r6}, 0xc) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r7) 00:23:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 283.637249][T16976] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 283.645227][T16976] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.653207][T16976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 283.661194][T16976] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:09 executing program 3 (fault-call:0 fault-nth:24): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 283.756668][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 283.763018][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:23:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xa0008000}, 0x0) 00:23:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000280), 0x12) openat$cgroup_subtree(r5, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 00:23:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x14}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 284.007455][T17012] FAULT_INJECTION: forcing a failure. [ 284.007455][T17012] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.041574][T17012] CPU: 0 PID: 17012 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 284.050307][T17012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.050322][T17012] Call Trace: [ 284.063969][T17012] dump_stack+0x197/0x210 [ 284.068339][T17012] should_fail.cold+0xa/0x15 [ 284.072995][T17012] ? fault_create_debugfs_attr+0x180/0x180 [ 284.078818][T17012] ? ___might_sleep+0x163/0x2c0 [ 284.083772][T17012] should_fail_alloc_page+0x50/0x60 [ 284.088979][T17012] __alloc_pages_nodemask+0x1a1/0x910 [ 284.094373][T17012] ? __alloc_pages_slowpath+0x2920/0x2920 [ 284.100127][T17012] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.106393][T17012] ? find_next_bit+0x107/0x130 [ 284.111192][T17012] pcpu_populate_chunk+0xf8/0x940 [ 284.116330][T17012] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 284.122157][T17012] ? find_next_bit+0x107/0x130 [ 284.126952][T17012] pcpu_alloc+0xd5b/0x1380 [ 284.131398][T17012] ? pcpu_alloc_area+0x820/0x820 [ 284.136370][T17012] __alloc_percpu_gfp+0x28/0x30 [ 284.141250][T17012] array_map_alloc+0x698/0x7d0 [ 284.146050][T17012] ? array_of_map_free+0x50/0x50 [ 284.151102][T17012] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.157445][T17012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.157464][T17012] ? array_of_map_free+0x50/0x50 [ 284.157482][T17012] __do_sys_bpf+0x478/0x3810 [ 284.157507][T17012] ? bpf_prog_load+0x18f0/0x18f0 [ 284.157528][T17012] ? __kasan_check_write+0x14/0x20 [ 284.183758][T17012] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 284.189333][T17012] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 284.194709][T17012] ? wait_for_completion+0x440/0x440 [ 284.200170][T17012] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 284.206627][T17012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 284.212453][T17012] ? do_syscall_64+0x26/0x790 [ 284.217160][T17012] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.223480][T17012] ? do_syscall_64+0x26/0x790 [ 284.228197][T17012] __x64_sys_bpf+0x73/0xb0 [ 284.232757][T17012] do_syscall_64+0xfa/0x790 [ 284.237292][T17012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.243200][T17012] RIP: 0033:0x45a919 [ 284.248197][T17012] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.268157][T17012] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 284.276673][T17012] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 284.284665][T17012] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 284.293034][T17012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:23:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x97d8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0xc}, 0xa401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x97, 0x40, 0x43, 0x3f, 0x0, 0x5, 0x80000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x800, 0x1, @perf_config_ext={0x6, 0x7fff}, 0x10008, 0x1, 0x7, 0x0, 0x7, 0x8, 0x9}, 0x0, 0x2, r1, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) openat$cgroup_ro(r4, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x70, 0x9, 0x2, 0x0, 0x6, 0x0, 0x7fffffff, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1ff, 0x4, @perf_config_ext={0x8a, 0x8}, 0x4060, 0xfff, 0x5f, 0x9, 0x7a, 0x7, 0x8}, r2, 0x5, r3, 0x5) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2b, 'rdma'}]}, 0x11) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x0) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xc840811d}, 0x0) [ 284.301123][T17012] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 284.309111][T17012] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0xa, 0x3, &(0x7f0000000000)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:10 executing program 3 (fault-call:0 fault-nth:25): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 284.541867][T17042] FAULT_INJECTION: forcing a failure. [ 284.541867][T17042] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.586160][T17042] CPU: 0 PID: 17042 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 284.594884][T17042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.604953][T17042] Call Trace: [ 284.608372][T17042] dump_stack+0x197/0x210 [ 284.612735][T17042] should_fail.cold+0xa/0x15 [ 284.617356][T17042] ? fault_create_debugfs_attr+0x180/0x180 [ 284.623189][T17042] ? ___might_sleep+0x163/0x2c0 [ 284.628075][T17042] should_fail_alloc_page+0x50/0x60 [ 284.633407][T17042] __alloc_pages_nodemask+0x1a1/0x910 [ 284.638812][T17042] ? __alloc_pages_slowpath+0x2920/0x2920 [ 284.644569][T17042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.650830][T17042] ? find_next_bit+0x107/0x130 [ 284.656148][T17042] pcpu_populate_chunk+0xf8/0x940 [ 284.661188][T17042] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 284.666937][T17042] ? find_next_bit+0x107/0x130 [ 284.671808][T17042] pcpu_alloc+0xd5b/0x1380 [ 284.676258][T17042] ? pcpu_alloc_area+0x820/0x820 [ 284.681425][T17042] __alloc_percpu_gfp+0x28/0x30 [ 284.687273][T17042] array_map_alloc+0x698/0x7d0 [ 284.692082][T17042] ? array_of_map_free+0x50/0x50 [ 284.697030][T17042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.697045][T17042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.697061][T17042] ? array_of_map_free+0x50/0x50 [ 284.697078][T17042] __do_sys_bpf+0x478/0x3810 [ 284.697099][T17042] ? bpf_prog_load+0x18f0/0x18f0 [ 284.710309][T17042] ? __kasan_check_write+0x14/0x20 [ 284.710328][T17042] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 284.710345][T17042] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 284.710362][T17042] ? wait_for_completion+0x440/0x440 [ 284.710385][T17042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 284.710417][T17042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 284.710430][T17042] ? do_syscall_64+0x26/0x790 [ 284.710444][T17042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.710463][T17042] ? do_syscall_64+0x26/0x790 [ 284.774303][T17042] __x64_sys_bpf+0x73/0xb0 [ 284.778773][T17042] do_syscall_64+0xfa/0x790 00:23:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x101440, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x70, 0x4, 0x8, 0x5, 0x9, 0x0, 0x974, 0x90080, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x200, 0xbfe8}, 0x4, 0x3, 0x1, 0x0, 0xc8d, 0x5}, r3, 0xb, r4, 0x7) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000bfc0)={&(0x7f000000ba00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f000000bec0)=[{&(0x7f000000ba80)=""/44, 0x2c}, {&(0x7f000000bac0)=""/235, 0xeb}, {&(0x7f000000bbc0)=""/245, 0xf5}, {&(0x7f000000bcc0)=""/173, 0xad}, {&(0x7f000000bd80)=""/229, 0xe5}, {&(0x7f000000be80)=""/53, 0x35}], 0x6, &(0x7f000000bf40)=""/110, 0x6e}, 0x20) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f000000c000)=r5) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r3, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x4, 0x6e, 0x7, 0x80, 0x0, 0x9, 0x80000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x8, 0x800, 0x1ff, 0x4, 0x6, 0x7, 0x101}, r2, 0xb, r3, 0x2) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 284.783313][T17042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.789229][T17042] RIP: 0033:0x45a919 [ 284.793317][T17042] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.813189][T17042] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 284.821626][T17042] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:23:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xd0010100}, 0x0) [ 284.829613][T17042] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 284.829622][T17042] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.829630][T17042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 284.829638][T17042] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0x9d78) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:11 executing program 3 (fault-call:0 fault-nth:26): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r0, 0x0, 0x4000828) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYRESOCT=r2], 0x17) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x280200, 0x0) ioctl$TUNSETLINK(r5, 0x400454cd, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000040)={r2}) 00:23:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xeffdffff}, 0x0) 00:23:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x2, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) socketpair(0x11, 0xa, 0x6, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="3c958e9aebe2562656b38cdfcde54b8011bce72ec8d186a6948158eca0030e97fd9552357e46804d3a1fb562c27f8add454e281721bc55bd20cabb372ce856700fafcf9dff5d295f9f880e6438ceff6c33f0bca19c12f642a76866074ba686482edc255071e01234c24f5983197565e2c261e8f756a92c3b79b5f413f8ad07133f4b835f50"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 285.230060][T17082] FAULT_INJECTION: forcing a failure. [ 285.230060][T17082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 285.304312][T17082] CPU: 1 PID: 17082 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 285.313045][T17082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.323594][T17082] Call Trace: [ 285.326911][T17082] dump_stack+0x197/0x210 [ 285.331270][T17082] should_fail.cold+0xa/0x15 [ 285.335900][T17082] ? fault_create_debugfs_attr+0x180/0x180 [ 285.341912][T17082] ? ___might_sleep+0x163/0x2c0 [ 285.346808][T17082] should_fail_alloc_page+0x50/0x60 [ 285.352115][T17082] __alloc_pages_nodemask+0x1a1/0x910 [ 285.357522][T17082] ? __alloc_pages_slowpath+0x2920/0x2920 [ 285.363276][T17082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.369538][T17082] ? find_next_bit+0x107/0x130 [ 285.374331][T17082] pcpu_populate_chunk+0xf8/0x940 [ 285.379376][T17082] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 285.393985][T17082] ? find_next_bit+0x107/0x130 [ 285.398780][T17082] pcpu_alloc+0xd5b/0x1380 [ 285.403222][T17082] ? pcpu_alloc_area+0x820/0x820 [ 285.408192][T17082] __alloc_percpu_gfp+0x28/0x30 [ 285.413702][T17082] array_map_alloc+0x698/0x7d0 [ 285.418860][T17082] ? array_of_map_free+0x50/0x50 [ 285.423847][T17082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.430229][T17082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.437193][T17082] ? array_of_map_free+0x50/0x50 [ 285.442162][T17082] __do_sys_bpf+0x478/0x3810 [ 285.446793][T17082] ? bpf_prog_load+0x18f0/0x18f0 00:23:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xf5ffffff}, 0x0) 00:23:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 285.451751][T17082] ? __kasan_check_write+0x14/0x20 [ 285.456976][T17082] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 285.462538][T17082] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 285.467868][T17082] ? wait_for_completion+0x440/0x440 [ 285.473178][T17082] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 285.479971][T17082] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 285.485450][T17082] ? do_syscall_64+0x26/0x790 [ 285.490155][T17082] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.496251][T17082] ? do_syscall_64+0x26/0x790 [ 285.500949][T17082] __x64_sys_bpf+0x73/0xb0 00:23:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa318) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x117) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 285.505379][T17082] do_syscall_64+0xfa/0x790 [ 285.509900][T17082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.516151][T17082] RIP: 0033:0x45a919 [ 285.520064][T17082] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.540387][T17082] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 285.548945][T17082] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 285.556933][T17082] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 285.564919][T17082] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.572912][T17082] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 285.580903][T17082] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:11 executing program 3 (fault-call:0 fault-nth:27): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xfffffdef}, 0x0) [ 285.825526][T17114] FAULT_INJECTION: forcing a failure. [ 285.825526][T17114] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:12 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x402001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="806d256d00027920ee718e4fe7fb6078650637590709151a9e78e711b679337aef05c2aec6e2b4f0b3fe3fee6a"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000180)) [ 285.931159][T17114] CPU: 1 PID: 17114 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 285.939913][T17114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.939920][T17114] Call Trace: [ 285.939948][T17114] dump_stack+0x197/0x210 [ 285.939970][T17114] should_fail.cold+0xa/0x15 [ 285.939992][T17114] ? fault_create_debugfs_attr+0x180/0x180 [ 285.940008][T17114] ? ___might_sleep+0x163/0x2c0 [ 285.940036][T17114] should_fail_alloc_page+0x50/0x60 00:23:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x436d328fbb885fac, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xdb) socket$kcm(0x29, 0x5, 0x0) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa8b8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 285.940050][T17114] __alloc_pages_nodemask+0x1a1/0x910 [ 285.940072][T17114] ? __alloc_pages_slowpath+0x2920/0x2920 [ 285.940098][T17114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.940112][T17114] ? find_next_bit+0x107/0x130 [ 285.940141][T17114] pcpu_populate_chunk+0xf8/0x940 [ 286.005456][T17114] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 286.011188][T17114] ? find_next_bit+0x107/0x130 [ 286.015974][T17114] pcpu_alloc+0xd5b/0x1380 [ 286.020423][T17114] ? pcpu_alloc_area+0x820/0x820 [ 286.025391][T17114] __alloc_percpu_gfp+0x28/0x30 [ 286.031206][T17114] array_map_alloc+0x698/0x7d0 [ 286.035995][T17114] ? array_of_map_free+0x50/0x50 [ 286.036015][T17114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.036029][T17114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.036044][T17114] ? array_of_map_free+0x50/0x50 [ 286.036060][T17114] __do_sys_bpf+0x478/0x3810 [ 286.036082][T17114] ? bpf_prog_load+0x18f0/0x18f0 [ 286.068217][T17114] ? __kasan_check_write+0x14/0x20 [ 286.073341][T17114] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 286.078888][T17114] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 286.078906][T17114] ? wait_for_completion+0x440/0x440 [ 286.078933][T17114] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.078961][T17114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 286.078976][T17114] ? do_syscall_64+0x26/0x790 [ 286.078991][T17114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.079010][T17114] ? do_syscall_64+0x26/0x790 [ 286.116702][T17114] __x64_sys_bpf+0x73/0xb0 [ 286.116722][T17114] do_syscall_64+0xfa/0x790 [ 286.116758][T17114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.116770][T17114] RIP: 0033:0x45a919 [ 286.116784][T17114] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.116792][T17114] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.116806][T17114] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 286.116814][T17114] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 00:23:12 executing program 3 (fault-call:0 fault-nth:28): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 286.116828][T17114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.155896][T17114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 286.155906][T17114] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) [ 286.317892][T17136] FAULT_INJECTION: forcing a failure. [ 286.317892][T17136] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 286.366558][T17136] CPU: 1 PID: 17136 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 286.375290][T17136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.385358][T17136] Call Trace: [ 286.388670][T17136] dump_stack+0x197/0x210 [ 286.393036][T17136] should_fail.cold+0xa/0x15 [ 286.397670][T17136] ? fault_create_debugfs_attr+0x180/0x180 [ 286.403502][T17136] ? ___might_sleep+0x163/0x2c0 [ 286.408386][T17136] should_fail_alloc_page+0x50/0x60 [ 286.413622][T17136] __alloc_pages_nodemask+0x1a1/0x910 [ 286.419280][T17136] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 286.424865][T17136] ? __alloc_pages_slowpath+0x2920/0x2920 [ 286.431753][T17136] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 286.438020][T17136] alloc_pages_current+0x107/0x210 [ 286.443152][T17136] ? ___might_sleep+0x163/0x2c0 [ 286.448035][T17136] __vmalloc_node_range+0x4f8/0x810 [ 286.453347][T17136] __vmalloc+0x44/0x50 [ 286.457449][T17136] ? pcpu_mem_zalloc+0x8a/0xf0 [ 286.462240][T17136] pcpu_mem_zalloc+0x8a/0xf0 [ 286.466851][T17136] pcpu_create_chunk+0xe0/0x7f0 [ 286.471709][T17136] pcpu_alloc+0x10f3/0x1380 [ 286.476222][T17136] ? pcpu_alloc_area+0x820/0x820 [ 286.476249][T17136] __alloc_percpu_gfp+0x28/0x30 [ 286.476265][T17136] array_map_alloc+0x698/0x7d0 [ 286.476284][T17136] ? array_of_map_free+0x50/0x50 [ 286.476305][T17136] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.476321][T17136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.476335][T17136] ? array_of_map_free+0x50/0x50 [ 286.476359][T17136] __do_sys_bpf+0x478/0x3810 [ 286.513714][T17136] ? bpf_prog_load+0x18f0/0x18f0 [ 286.523304][T17136] ? __kasan_check_write+0x14/0x20 [ 286.528426][T17136] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 286.528443][T17136] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 286.528460][T17136] ? wait_for_completion+0x440/0x440 [ 286.528482][T17136] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.528511][T17136] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 286.528527][T17136] ? do_syscall_64+0x26/0x790 00:23:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xae58) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7caaa55f85cbdc0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0xfecc, 0x0}, 0xfd00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x6, 0x5, 0x62, 0x7, 0x0, 0xf6e, 0x4c00, 0x10, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x0, @perf_config_ext={0x2, 0xffffffffffffff7a}, 0x4200, 0x20, 0x6, 0x7, 0x2484e006, 0x6d, 0x8001}, r4, 0x1, r0, 0x1) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2080, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="802000f8ff0000ed"], 0xda00) r7 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x0, 0x0, 0x4}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r7, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r8}, 0xc) write$cgroup_subtree(r6, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x80, 0x7, 0x40, 0x76, 0x0, 0x6, 0xab47c48222f3771c, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0xffffffff}, 0x8044, 0x82a, 0x5, 0x2, 0xfffffffffffff4b2, 0x6, 0x3f}, r6, 0x4, r5, 0x4) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) socket$kcm(0x29, 0x7, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x107, 0x12, 0x0, 0x0) [ 286.528542][T17136] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.528556][T17136] ? do_syscall_64+0x26/0x790 [ 286.528578][T17136] __x64_sys_bpf+0x73/0xb0 [ 286.539424][T17136] do_syscall_64+0xfa/0x790 [ 286.550928][T17136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.550941][T17136] RIP: 0033:0x45a919 [ 286.550955][T17136] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:23:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 286.550963][T17136] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.550977][T17136] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 286.550984][T17136] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 286.550992][T17136] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.551000][T17136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 286.551009][T17136] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:12 executing program 3 (fault-call:0 fault-nth:29): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xfffffff5}, 0x0) 00:23:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="806d256d000279302f6b8503dd68e1b2654f63b18a7c02f4e40045ce3081ed64f6a2e8eba613020193b2e87554856114f381335a8421ac7ee1d1a12f0af531f52796ccf3a26a546e2124085ab4e49973aca0396f2d6474807cfe0142b73f670bd05502e0e65f0a9111bf8a353cfcfdfdbd3065bd"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r2}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'netpci0\x00', @dev={[], 0x24}}) [ 286.843495][T17163] FAULT_INJECTION: forcing a failure. [ 286.843495][T17163] name failslab, interval 1, probability 0, space 0, times 0 00:23:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e25, @multicast1}, 0x80, 0x0, 0xfffffea0, 0x0, 0xfffffffffffffd45}, 0x800) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 286.896061][T17163] CPU: 0 PID: 17163 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 286.904888][T17163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.916518][T17163] Call Trace: [ 286.919844][T17163] dump_stack+0x197/0x210 [ 286.924216][T17163] should_fail.cold+0xa/0x15 [ 286.930510][T17163] ? fault_create_debugfs_attr+0x180/0x180 [ 286.936722][T17163] ? ___might_sleep+0x163/0x2c0 [ 286.943026][T17163] __should_failslab+0x121/0x190 [ 286.947990][T17163] should_failslab+0x9/0x14 [ 286.952861][T17163] kmem_cache_alloc_node_trace+0x274/0x750 [ 286.958738][T17163] ? do_raw_spin_unlock+0x178/0x270 [ 286.965201][T17163] __kmalloc_node+0x3d/0x70 [ 286.969739][T17163] __vmalloc_node_range+0x1db/0x810 [ 286.974980][T17163] __vmalloc+0x44/0x50 [ 286.979344][T17163] ? pcpu_mem_zalloc+0x8a/0xf0 [ 286.984485][T17163] pcpu_mem_zalloc+0x8a/0xf0 [ 286.989104][T17163] pcpu_create_chunk+0x196/0x7f0 00:23:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) [ 286.994153][T17163] pcpu_alloc+0x10f3/0x1380 [ 286.998785][T17163] ? pcpu_alloc_area+0x820/0x820 [ 287.003772][T17163] __alloc_percpu_gfp+0x28/0x30 [ 287.008922][T17163] array_map_alloc+0x698/0x7d0 [ 287.014078][T17163] ? array_of_map_free+0x50/0x50 [ 287.019214][T17163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.026016][T17163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.032727][T17163] ? array_of_map_free+0x50/0x50 [ 287.038913][T17163] __do_sys_bpf+0x478/0x3810 00:23:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 287.043797][T17163] ? bpf_prog_load+0x18f0/0x18f0 [ 287.049319][T17163] ? __kasan_check_write+0x14/0x20 [ 287.054463][T17163] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 287.060165][T17163] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 287.065492][T17163] ? wait_for_completion+0x440/0x440 [ 287.070809][T17163] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 287.077414][T17163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 287.082908][T17163] ? do_syscall_64+0x26/0x790 [ 287.087630][T17163] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.093738][T17163] ? do_syscall_64+0x26/0x790 [ 287.098454][T17163] __x64_sys_bpf+0x73/0xb0 [ 287.102905][T17163] do_syscall_64+0xfa/0x790 [ 287.107443][T17163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.113358][T17163] RIP: 0033:0x45a919 [ 287.117277][T17163] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.136911][T17163] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256dff017920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000280), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r4, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000280), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x80000000, 0x0, 0x3ff, 0x1, r2, 0x800, [], r4, r5, 0x5, 0x4}, 0x3c) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xb3f8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 287.145341][T17163] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 287.153338][T17163] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 287.161332][T17163] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.169327][T17163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 287.177313][T17163] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x0, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/16], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41f00, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x0, 0xf}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x8, 0x6, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xf2e}, @call]}, &(0x7f0000000340)='syzkaller\x00', 0x3428351d, 0xf5, &(0x7f0000001740)=""/245, 0x40f00, 0x0, [], r4, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xa, 0xfff, 0xfffffff8}, 0x10}, 0x78) sendmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000000)=@can={0x1d, r4}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000580)="ed370250c616db018ee751fe0763b65386d15488ef2b8e80a34995d92edc342f013ab17f031f7f90ba54fc6c45f6e82905fb9ab78a18cca8ee652679ea85cc1b060f8832f6d9635a138ccdd7862e8a741447f14732e2da3230e7f128acfbd2772e9e9683f45fc95757ac9bd536ed791afa5a1fb5709fe8f1f71966ecd19fe1aa1d3e0ea382d0f6be20477e3ad019c9f0464c829a94", 0x95}, {&(0x7f0000000100)="9f273c9be5e2de014167ff23dc5cc3a2b6c43ad86d2752b312e51eb52099a3e65bcff1ab7ff0cb414d9b9215fddc36405a47a3d1ef5067557e2ab36a8be19774d3cd6aa8c89495ee8874d52acdca63434c2a32bae3f6a5c426c40401e7dde845ffbe4f63394ea889f76fe5", 0x6b}, {&(0x7f0000000080)="444857ed16051527cc64bc3a2d691df277b4", 0x12}, {&(0x7f0000000300)="a6262e589c2921830bf6b1d34a8b8e10a17e34f163ed4b15dfe0ced5123ad231d09f2043347d983c9c0abe44e0dfb10f746cec820db3799b7d7da6607aaad822fe124b6b5f0faf37820c8c9e1a3e39bc68c8b9b9a74b268c497f6276101dd4f2ec333abea28de12b54e56c", 0x6b}], 0x4, &(0x7f0000000640)=[{0xa0, 0x109, 0x2, "17df5607eeb6d9f5f2ca8aee21bb88163fd05bb88c10456b2a17e32d8474e0c1353fb56617f9ce4051eb04051e5c9fdd35957e785c67e099ab38777c992cee34a2444c7a16e700c75ebbd2f61652235583f225bd0d87721b92f4b63d590cc7eb294371a17608738a1c802488eba187e616af69b2be5c7de5fb7b52f18b64697878d8601f85f83de88d4d4e69022655"}, {0xd0, 0x109, 0x6, "88b79301fb9990cef6d058885d962efb9c70841f5e12f359fe72b2c8b8db5b32b10f85527eae38982f7be294365378853da4817044b6ca619458a7ef61fbd62a62c99ff230633827ad9a0d4263d412ea45fde9bae1fda69068fef230651a4137e31c63c39d2898b66db115147fe4795fb53cc84e0a67f485f142b11b7a83b07c2055fe0269add04822aa8ee974016e1825e95a5b230b64b595080dbec494a3773f641f00787b554dd47e706f76cecd6b4b1a229ad73a91b6723a0a"}], 0x170}, 0x40000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r6, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000800)={0xffffffffffffffff, r6, 0xc, 0x2}, 0x10) 00:23:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0) 00:23:13 executing program 3 (fault-call:0 fault-nth:30): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x200, 0x1}, 0xc) 00:23:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xb998) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x8000a0ffffffff}, 0x0) 00:23:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) r4 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0xb, &(0x7f0000000040), 0x4) sendmsg$kcm(r4, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000001c00), 0x64}, 0x0) recvmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x10102) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r6, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) 00:23:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xc00000000000000}, 0x0) [ 287.993196][T17230] FAULT_INJECTION: forcing a failure. [ 287.993196][T17230] name failslab, interval 1, probability 0, space 0, times 0 00:23:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000280), 0x12) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x70, 0x7, 0x20, 0x0, 0x5, 0x0, 0x4, 0x406, 0xeb0a1a892fa81063, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000180), 0x7ca6825db1e40355}, 0x400, 0xfffffffffffffff9, 0x6, 0xc611a876e3679386, 0x5, 0x2, 0x6}, r1, 0x2, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) openat$cgroup_ro(r4, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000480)=ANY=[@ANYBLOB="02"], 0x1) openat$cgroup_ro(r8, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000000540)=ANY=[@ANYBLOB="0070807b6629689528f426b369647320b1572e0e4d2d019357fa44f58eb44bd13854101ef2c550b0bc60401d54a7ee3f6358c7604371f3d9a0a8d9bd1edad92dff757edbf2d9b5c2c3b7de98e37fc5c7f8448202df5d0cf9dbe51bdc36a042e439e455c8864a927a3c81691092854d3d505b10c8a228aee29c8e1508fe9b975128cc2f0ff7b92809c62714b9f7ca239d850b14802a1971a15f2f28a9833531c0c96e0998d56b23ff95f2e7384b5b76280f9abcaac618edfa561a77750d2c691b3571b2d89e2c4289be7942f30787ca8eca9420ce8774543525e86bd45426387b4d65833230524c336ee5"], 0x6) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="c1f2e42e", @ANYRESHEX, @ANYRESHEX=r3, @ANYRES32, @ANYRESOCT=r2, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESDEC=r0, @ANYRESOCT, @ANYRESOCT=r3, @ANYRES16=r4, @ANYRESHEX, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES32=r5, @ANYRESDEC, @ANYRESDEC], @ANYRESDEC=r6, @ANYBLOB="868d338c9ded1f944b9dd353120024003641f7f57405578b902170cc6372ce4fe7a08453b4c9f6e2014d7613bc7a7c8650b08d8d853eb7ea05502cd690d15a6fd1aa3e1f7126d130949a0e7ff42e4d7d821d96f888b6b6651a875b2a7a1fb2835531ce30ea2d52cb2586448e4a8af9c4930f5d3f092dd76dc263d299ac436c902f26c171dd27cd38283566e716e55ccd1d7b57c0880566ff81af95ac7430a7a85baae95a23173b7582c1d7057a85d1"], @ANYRESDEC=r7], 0x5f) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_subtree(r9, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) ioctl$TUNGETDEVNETNS(r9, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 288.096057][T17230] CPU: 0 PID: 17230 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 288.104788][T17230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.114861][T17230] Call Trace: [ 288.118181][T17230] dump_stack+0x197/0x210 [ 288.122545][T17230] should_fail.cold+0xa/0x15 [ 288.127165][T17230] ? fault_create_debugfs_attr+0x180/0x180 [ 288.133018][T17230] ? ___might_sleep+0x163/0x2c0 [ 288.137922][T17230] __should_failslab+0x121/0x190 [ 288.142894][T17230] should_failslab+0x9/0x14 [ 288.147418][T17230] kmem_cache_alloc_node_trace+0x274/0x750 [ 288.153251][T17230] ? do_raw_spin_unlock+0x178/0x270 [ 288.158482][T17230] __kmalloc_node+0x3d/0x70 [ 288.168312][T17230] __vmalloc_node_range+0x1db/0x810 [ 288.173552][T17230] __vmalloc+0x44/0x50 [ 288.177641][T17230] ? pcpu_mem_zalloc+0x8a/0xf0 [ 288.182424][T17230] pcpu_mem_zalloc+0x8a/0xf0 [ 288.187033][T17230] pcpu_create_chunk+0x196/0x7f0 [ 288.192002][T17230] pcpu_alloc+0x10f3/0x1380 00:23:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 288.196540][T17230] ? pcpu_alloc_area+0x820/0x820 [ 288.201515][T17230] __alloc_percpu_gfp+0x28/0x30 [ 288.206401][T17230] array_map_alloc+0x698/0x7d0 [ 288.211197][T17230] ? array_of_map_free+0x50/0x50 [ 288.216282][T17230] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.222547][T17230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.229333][T17230] ? array_of_map_free+0x50/0x50 [ 288.234295][T17230] __do_sys_bpf+0x478/0x3810 [ 288.238913][T17230] ? bpf_prog_load+0x18f0/0x18f0 [ 288.243971][T17230] ? __kasan_check_write+0x14/0x20 [ 288.249110][T17230] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 288.254685][T17230] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 288.259992][T17230] ? wait_for_completion+0x440/0x440 [ 288.265355][T17230] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.271659][T17230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.277147][T17230] ? do_syscall_64+0x26/0x790 [ 288.281855][T17230] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.288118][T17230] ? do_syscall_64+0x26/0x790 [ 288.292840][T17230] __x64_sys_bpf+0x73/0xb0 [ 288.297280][T17230] do_syscall_64+0xfa/0x790 [ 288.303377][T17230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.309286][T17230] RIP: 0033:0x45a919 [ 288.313199][T17230] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.333797][T17230] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xbf38) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 288.342231][T17230] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 288.350229][T17230] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 288.358224][T17230] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 288.366216][T17230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 288.374214][T17230] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:14 executing program 3 (fault-call:0 fault-nth:31): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000280), 0x12) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x2d, 'pids'}, {0x2b, 'pids'}, {0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2d, 'io'}, {0x2d, 'cpu'}, {0x2d, 'memory'}]}, 0x33) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x0) [ 288.632138][T17260] FAULT_INJECTION: forcing a failure. [ 288.632138][T17260] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.686609][T17260] CPU: 0 PID: 17260 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 288.695353][T17260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.705602][T17260] Call Trace: [ 288.708915][T17260] dump_stack+0x197/0x210 [ 288.713279][T17260] should_fail.cold+0xa/0x15 [ 288.717916][T17260] ? fault_create_debugfs_attr+0x180/0x180 [ 288.723753][T17260] ? ___might_sleep+0x163/0x2c0 [ 288.728647][T17260] should_fail_alloc_page+0x50/0x60 [ 288.733960][T17260] __alloc_pages_nodemask+0x1a1/0x910 [ 288.740758][T17260] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 288.746434][T17260] ? __alloc_pages_slowpath+0x2920/0x2920 [ 288.752211][T17260] ? kasan_unpoison_shadow+0x35/0x50 [ 288.757522][T17260] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 288.763788][T17260] alloc_pages_current+0x107/0x210 [ 288.768918][T17260] __vmalloc_node_range+0x4f8/0x810 [ 288.774141][T17260] __vmalloc+0x44/0x50 [ 288.778395][T17260] ? pcpu_mem_zalloc+0x8a/0xf0 [ 288.783191][T17260] pcpu_mem_zalloc+0x8a/0xf0 00:23:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 288.787812][T17260] pcpu_create_chunk+0x196/0x7f0 [ 288.792779][T17260] pcpu_alloc+0x10f3/0x1380 [ 288.797324][T17260] ? pcpu_alloc_area+0x820/0x820 [ 288.802671][T17260] __alloc_percpu_gfp+0x28/0x30 [ 288.807549][T17260] array_map_alloc+0x698/0x7d0 [ 288.812399][T17260] ? array_of_map_free+0x50/0x50 [ 288.817531][T17260] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.823788][T17260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.830059][T17260] ? array_of_map_free+0x50/0x50 [ 288.835022][T17260] __do_sys_bpf+0x478/0x3810 [ 288.839616][T17260] ? bpf_prog_load+0x18f0/0x18f0 [ 288.839632][T17260] ? __kasan_check_write+0x14/0x20 [ 288.839648][T17260] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 288.839663][T17260] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 288.839680][T17260] ? wait_for_completion+0x440/0x440 [ 288.839709][T17260] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.872946][T17260] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.878528][T17260] ? do_syscall_64+0x26/0x790 [ 288.883250][T17260] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.890132][T17260] ? do_syscall_64+0x26/0x790 [ 288.894848][T17260] __x64_sys_bpf+0x73/0xb0 [ 288.902074][T17260] do_syscall_64+0xfa/0x790 [ 288.906633][T17260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.912860][T17260] RIP: 0033:0x45a919 [ 288.917144][T17260] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:23:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 288.938768][T17260] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 288.947816][T17260] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 288.957283][T17260] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 288.965672][T17260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 288.975138][T17260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 288.984158][T17260] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xc4d8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:15 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x79b3, 0x8}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) r5 = perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x70, 0x40, 0x0, 0x3f, 0x9, 0x0, 0x7, 0xee3d01936c1e0c99, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x88cc, 0x3, @perf_bp={&(0x7f0000000080), 0x4}, 0x800, 0x2, 0x3, 0x5, 0x80000001, 0x8, 0x5}, r4, 0x4, r0, 0xc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r7 = perf_event_open$cgroup(&(0x7f0000000580)={0x2f89c80efa85094a, 0x70, 0x1, 0x5, 0x0, 0xf7, 0x0, 0x1, 0x6004, 0xe620abfbc2883663, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0xd}, 0x20, 0x8, 0x3, 0x0, 0xf66, 0xfec4, 0x3}, r6, 0xd, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x24) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0) 00:23:15 executing program 3 (fault-call:0 fault-nth:32): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xca78) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 289.510447][T17303] FAULT_INJECTION: forcing a failure. [ 289.510447][T17303] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 289.591772][T17303] CPU: 1 PID: 17303 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 289.600976][T17303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.613746][T17303] Call Trace: [ 289.617641][T17303] dump_stack+0x197/0x210 [ 289.622041][T17303] should_fail.cold+0xa/0x15 [ 289.626746][T17303] ? fault_create_debugfs_attr+0x180/0x180 [ 289.632851][T17303] ? ___might_sleep+0x163/0x2c0 [ 289.638020][T17303] should_fail_alloc_page+0x50/0x60 [ 289.643787][T17303] __alloc_pages_nodemask+0x1a1/0x910 [ 289.649354][T17303] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 289.654917][T17303] ? __alloc_pages_slowpath+0x2920/0x2920 [ 289.660671][T17303] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 289.668157][T17303] alloc_pages_current+0x107/0x210 [ 289.673643][T17303] ? ___might_sleep+0x163/0x2c0 [ 289.678532][T17303] __vmalloc_node_range+0x4f8/0x810 [ 289.684228][T17303] __vmalloc+0x44/0x50 [ 289.688407][T17303] ? pcpu_mem_zalloc+0x8a/0xf0 [ 289.693298][T17303] pcpu_mem_zalloc+0x8a/0xf0 [ 289.698350][T17303] pcpu_create_chunk+0x196/0x7f0 [ 289.705930][T17303] pcpu_alloc+0x10f3/0x1380 [ 289.710474][T17303] ? pcpu_alloc_area+0x820/0x820 [ 289.715887][T17303] __alloc_percpu_gfp+0x28/0x30 [ 289.721028][T17303] array_map_alloc+0x698/0x7d0 [ 289.726517][T17303] ? array_of_map_free+0x50/0x50 [ 289.726538][T17303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.726552][T17303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.726566][T17303] ? array_of_map_free+0x50/0x50 [ 289.726582][T17303] __do_sys_bpf+0x478/0x3810 [ 289.726603][T17303] ? bpf_prog_load+0x18f0/0x18f0 [ 289.737911][T17303] ? __kasan_check_write+0x14/0x20 [ 289.737931][T17303] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 289.737947][T17303] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 289.737964][T17303] ? wait_for_completion+0x440/0x440 [ 289.737992][T17303] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 289.788672][T17303] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 289.794668][T17303] ? do_syscall_64+0x26/0x790 [ 289.801975][T17303] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.809622][T17303] ? do_syscall_64+0x26/0x790 [ 289.817707][T17303] __x64_sys_bpf+0x73/0xb0 [ 289.822127][T17303] do_syscall_64+0xfa/0x790 [ 289.826680][T17303] entry_SYSCALL_64_after_hwframe+0x49/0xbe 00:23:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x7000000000000000}, 0x0) 00:23:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'veth1_to_bond\x00', 0x2}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) sendmsg(r2, &(0x7f0000001800)={0x0, 0xfffffdad, &(0x7f0000000400)=[{&(0x7f0000000200)="9c0fd689c627eab3cb6e020c78fc98e4ab26d2c931f66a3a47a27b704488362d099936bb91532b558a579d855ada590fc187bef68f592fe48e37d5d1c5d056b0cdb39545d5968451e1f1faf7af2553b0d25ad6b37a2ed539ae4081fb34e2c337f66e4af6f1879f5dbd579bfa9e2ff83a0a285a9128b7f3f75427451b27be021ed92ee5932bbff8eb4e30f8f7d414ae4f2a2c6c14e9846e86ef4c6de98a00c3281ddb2497725e3dea672f107bdf40492a43f442d5941004a20a771bf2bbf9aa7235a686ed74520dd18c08ec6db39cfc15f0b3e7eef7c6930ea8850b47bdefb7", 0x23c}, {&(0x7f0000000300)="dc33d72922765c33fec02026ff60eb23b30bbc2c7c859ed5f3fb67aec942f49bbd12124c464554b81b5a08fe78b8097bf37a1cba337c7b84195b3f6b77d37ec31c7afc74f49a6dd3d2ab5b07401bbf8b3225d9547c161908249f0356eaefcb4ac19f49419fbba56a66eb236b898b0281f6f3e420ddbffb0163c293fc6a875e394ada6bb5d7e909015a0d875727e9cf0badf736567c3ba63b867d95f4607b0afcc9207454ec2ffd4923c073f0cba3aef5a9a6e5968c36518714dd1fb5a8bf5397388669b5aa774ed072184ed49415cd2a45b215aaa17a98dc970d1306721350f8", 0xe0}, {&(0x7f0000000100)="cc2890cd028ae89347a4d2022ddafb90398a572ea2b4a9dec2ae9b1fd30616f585595a650624827049357f8cd0c2c721", 0x30}, {&(0x7f0000001840)="a68a2b40b22a6a39037f28c6aaf415b398192c9b947c89a8e5b7d90e0000b561ca75df54e2f31a7547f35bfcbad3766707f3efafcb7d8fcc721a1dcf7a24a10fc03f44d017e5bfa553088e28020000001ae2b4d2cea6e433d1f582c367b919fce76a6cbb", 0x79}, {&(0x7f00000004c0)="d3a82dfd0edbbe2ce115ad31037bd1d5f01e8b85719f96be84318305c63e4b61ab069343c0e057ee032102c9f2587aa4387a66d31ae891caa09856433a7f3c69e76d284c7fc40372667b19294ab3b53eef59b7cfcca6fb110b8a8318213639b5085ed234d6363c0c417c3bab8a245224c47cb8121db1a795667d00e8c105ba8825d887269a89bd8c12d8c88be7f09b640c48a6d3f0af833472535bb06734265fed049bb7050a81fc54ae2e4555bdd6af977f576fd4af1320b9280182a748b574d97ff89b38302bc9870fd1b6681b", 0xce}], 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1218}, 0x60) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000001940)=ANY=[@ANYBLOB="3e8e8efefc025156d87778a41258be32b26fcfabcc5a03fd6cdab055592eaabdbe19f8a42ad84823417ccd"], 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000018c0)={0x3, 0x70, 0x1, 0x7, 0x9, 0x7f, 0x0, 0x0, 0x43070, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f, 0x1000}, 0x4000, 0x2, 0x7fff, 0x9, 0x4, 0x8, 0xfffb}) [ 289.842922][T17303] RIP: 0033:0x45a919 [ 289.847093][T17303] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.867163][T17303] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.867179][T17303] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:23:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2ea2d696e930b3edb8bdaaace7edd7332f40ab43db79c1d39ce5e0c3a54bcf939e29433983494138841e36bb6e6f6a29bde2c0787ea4ce92ba19b77bcbfcdef7ce54d9c0681cabc436f88f9c5fbde59382f574e7ec75893e8758a56a14f0d5b3438aaf15c13fa7bc1f21434e9605089533c6d272049acb0495f0c91164d00b99fd539362a962b2eae7f567b2a56918d8d1b5716c4fa046f85c9297fb8a29d65e6354645ca1562effaf485a00fee1a0780a6c653bd1bba87196c153c63a0de668bbbc2744d4c429fed"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00020180"], 0xda00) write$cgroup_subtree(r3, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x8, 0x1, 0x20, 0xb0, 0x0, 0xcf, 0x1000, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x120, 0x0, 0x0, 0x0, 0x6, 0x40}, r3, 0x8, r4, 0x8) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 289.867187][T17303] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 289.867195][T17303] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.867203][T17303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 289.867210][T17303] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:16 executing program 3 (fault-call:0 fault-nth:33): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r2, 0x0, 0x2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r4 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r5, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) openat$cgroup_ro(r5, &(0x7f0000000140)='pids.current\x00', 0x0, 0x0) close(r4) 00:23:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xc840811d00000000}, 0x0) 00:23:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x79b3, 0x8}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) r5 = perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x70, 0x40, 0x0, 0x3f, 0x9, 0x0, 0x7, 0xee3d01936c1e0c99, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x88cc, 0x3, @perf_bp={&(0x7f0000000080), 0x4}, 0x800, 0x2, 0x3, 0x5, 0x80000001, 0x8, 0x5}, r4, 0x4, r0, 0xc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r7 = perf_event_open$cgroup(&(0x7f0000000580)={0x2f89c80efa85094a, 0x70, 0x1, 0x5, 0x0, 0xf7, 0x0, 0x1, 0x6004, 0xe620abfbc2883663, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0xd}, 0x20, 0x8, 0x3, 0x0, 0xf66, 0xfec4, 0x3}, r6, 0xd, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x24) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 290.289730][T17335] FAULT_INJECTION: forcing a failure. [ 290.289730][T17335] name failslab, interval 1, probability 0, space 0, times 0 00:23:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xd018) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xd001010000000000}, 0x0) [ 290.454086][T17335] CPU: 0 PID: 17335 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 290.463312][T17335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.473401][T17335] Call Trace: [ 290.476710][T17335] dump_stack+0x197/0x210 [ 290.476734][T17335] should_fail.cold+0xa/0x15 [ 290.476754][T17335] ? fault_create_debugfs_attr+0x180/0x180 [ 290.476777][T17335] ? ___might_sleep+0x163/0x2c0 [ 290.497190][T17335] __should_failslab+0x121/0x190 00:23:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r3, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000100)=r3) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 290.502321][T17335] should_failslab+0x9/0x14 [ 290.508232][T17335] __kmalloc+0x2e0/0x770 [ 290.512615][T17335] ? memset+0x40/0x40 [ 290.516814][T17335] ? pcpu_get_vm_areas+0x3d5/0x3ee0 [ 290.522278][T17335] pcpu_get_vm_areas+0x3d5/0x3ee0 [ 290.527319][T17335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.527336][T17335] ? __vmalloc_node_range+0x4d7/0x810 [ 290.527367][T17335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.527387][T17335] pcpu_create_chunk+0x24e/0x7f0 [ 290.551175][T17335] pcpu_alloc+0x10f3/0x1380 [ 290.555767][T17335] ? pcpu_alloc_area+0x820/0x820 [ 290.560751][T17335] __alloc_percpu_gfp+0x28/0x30 [ 290.566327][T17335] array_map_alloc+0x698/0x7d0 [ 290.566348][T17335] ? array_of_map_free+0x50/0x50 [ 290.566367][T17335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.566388][T17335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.576514][T17335] ? array_of_map_free+0x50/0x50 [ 290.576531][T17335] __do_sys_bpf+0x478/0x3810 [ 290.576551][T17335] ? bpf_prog_load+0x18f0/0x18f0 [ 290.576573][T17335] ? __kasan_check_write+0x14/0x20 [ 290.611596][T17335] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 290.617269][T17335] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 290.622952][T17335] ? wait_for_completion+0x440/0x440 [ 290.628714][T17335] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 290.635289][T17335] ? trace_hardirqs_on_thunk+0x1a/0x1c 00:23:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 290.646012][T17335] ? do_syscall_64+0x26/0x790 [ 290.655400][T17335] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.661670][T17335] ? do_syscall_64+0x26/0x790 [ 290.668520][T17335] __x64_sys_bpf+0x73/0xb0 [ 290.675313][T17335] do_syscall_64+0xfa/0x790 [ 290.679831][T17335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.679842][T17335] RIP: 0033:0x45a919 00:23:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="806d256d00027920e3c06fe14118cabb8a8f97107a4301389d50ba6c1aee7fcf31e1f6f7651e7739f64b40fea096614240114116505b94765f687ca00142c9160d75"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r4, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, r4, 0x0, 0xe, &(0x7f0000000440)='memory.events\x00'}, 0x30) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x3, 0xff, 0x6c, 0x0, 0x0, 0x1, 0x409, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4eb2af0867a0c992, @perf_config_ext={0x7ff, 0x1}, 0x1d320, 0x4, 0x0, 0x4, 0x401, 0x2, 0xb86}, r3, 0xffffffffffffffff, r5, 0x2) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r2, &(0x7f00000002c0)="d2c613a1a536bcb2cc6f7df83fd665223a2d0da8b0b4c99bae9823e82634ba1a9f985520904fb11f2a7ebfcb6dae02791acbd01a4cbf04eb78d294415663f625939611fa1387daebcc0a620fe433ca8e8130f6231a15f3e7c05c01a6abfd10df075289819bf6a62db8df20367e17037b52498d0108d4718edd1ede8175ebc03c9aabf5ca1d5d8ec5f55b5e8d31af06e081b890f4b109713409763cd99e620eb03d85ee0509b929df9ba299c30bb17faf31a8710892cfb9074b9544fa7fa3256edd86e83f73f8f9e7f74c", &(0x7f00000004c0)="8f3c6ad20ccbbc24a804c0ef14481b72900b8eb7aa70cedd7e7282cc4391d89eea7062f26a05fc90fd6e8e55b0eeb2c65abf38c4cd75deb4b858330cd622f753215b48141426165c71944ff199cff3400a9718ef3fc1a411078170c2b1139655522601007a5f2b548d50971e22f2ee8aabada7f32f8b03315c7dcea35a44c86b912a8719bbef0b57d1179a14cf7cc8fe701d5c92374ba83fa32841e4f49798e77de539d7246ca16f71924c15560c392b14d16eb4a8f7b61f724f58d40ed6a134017923650fbdf530a00599bbbc3c5dd7a7fc5f63dd5cdc", 0x4}, 0x20) [ 290.679857][T17335] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.679864][T17335] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 290.679877][T17335] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 290.679885][T17335] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 290.679893][T17335] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.679901][T17335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 290.679916][T17335] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:17 executing program 3 (fault-call:0 fault-nth:34): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xeffdffff00000000}, 0x0) 00:23:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2d, 'pids'}, {0x2d, 'rdma'}, {0x2b, 'pids'}, {0x2b, 'io'}, {0x2b, 'rdma'}]}, 0x1c) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x6) 00:23:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xd5b8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 291.142976][T17388] FAULT_INJECTION: forcing a failure. [ 291.142976][T17388] name failslab, interval 1, probability 0, space 0, times 0 [ 291.183476][T17388] CPU: 0 PID: 17388 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 291.193448][T17388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.205199][T17388] Call Trace: [ 291.208710][T17388] dump_stack+0x197/0x210 [ 291.213062][T17388] should_fail.cold+0xa/0x15 [ 291.217876][T17388] ? fault_create_debugfs_attr+0x180/0x180 [ 291.224749][T17388] ? ___might_sleep+0x163/0x2c0 [ 291.229713][T17388] __should_failslab+0x121/0x190 [ 291.235408][T17388] should_failslab+0x9/0x14 [ 291.240371][T17388] __kmalloc+0x2e0/0x770 [ 291.245070][T17388] ? memset+0x40/0x40 [ 291.249152][T17388] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 291.249170][T17388] pcpu_get_vm_areas+0x3ec/0x3ee0 [ 291.249185][T17388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.249199][T17388] ? __vmalloc_node_range+0x4d7/0x810 [ 291.249228][T17388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.249249][T17388] pcpu_create_chunk+0x24e/0x7f0 [ 291.285534][T17388] pcpu_alloc+0x10f3/0x1380 [ 291.290159][T17388] ? pcpu_alloc_area+0x820/0x820 [ 291.296008][T17388] __alloc_percpu_gfp+0x28/0x30 [ 291.300891][T17388] array_map_alloc+0x698/0x7d0 [ 291.305719][T17388] ? array_of_map_free+0x50/0x50 [ 291.310696][T17388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.317133][T17388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.317153][T17388] ? array_of_map_free+0x50/0x50 [ 291.317170][T17388] __do_sys_bpf+0x478/0x3810 [ 291.317196][T17388] ? bpf_prog_load+0x18f0/0x18f0 [ 291.338580][T17388] ? __kasan_check_write+0x14/0x20 [ 291.344227][T17388] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 291.344244][T17388] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 291.344265][T17388] ? wait_for_completion+0x440/0x440 [ 291.360743][T17388] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.368084][T17388] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 291.374531][T17388] ? do_syscall_64+0x26/0x790 [ 291.379765][T17388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.386313][T17388] ? do_syscall_64+0x26/0x790 [ 291.391467][T17388] __x64_sys_bpf+0x73/0xb0 [ 291.396289][T17388] do_syscall_64+0xfa/0x790 [ 291.401449][T17388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.407365][T17388] RIP: 0033:0x45a919 [ 291.411567][T17388] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.433851][T17388] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 291.433867][T17388] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 291.433875][T17388] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 291.433883][T17388] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 291.433891][T17388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 291.433899][T17388] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:17 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x79b3, 0x8}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) r5 = perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x70, 0x40, 0x0, 0x3f, 0x9, 0x0, 0x7, 0xee3d01936c1e0c99, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x88cc, 0x3, @perf_bp={&(0x7f0000000080), 0x4}, 0x800, 0x2, 0x3, 0x5, 0x80000001, 0x8, 0x5}, r4, 0x4, r0, 0xc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r7 = perf_event_open$cgroup(&(0x7f0000000580)={0x2f89c80efa85094a, 0x70, 0x1, 0x5, 0x0, 0xf7, 0x0, 0x1, 0x6004, 0xe620abfbc2883663, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0xd}, 0x20, 0x8, 0x3, 0x0, 0xf66, 0xfec4, 0x3}, r6, 0xd, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x24) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, 0x0, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xf5ffffff00000000}, 0x0) 00:23:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000280), 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x6, 0x4, 0x7fffffff, 0x4, 0xffffffffffffffff, 0x2, [], 0x0, r2, 0x5}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000100)="fd5e68e8de9321710748f6df107950514b15"}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:17 executing program 3 (fault-call:0 fault-nth:35): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="806d246dbd913feb58bec8ea67a32c00000000000000ffd09b0000e6397fc382"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, 0x0, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 291.771866][T17413] FAULT_INJECTION: forcing a failure. [ 291.771866][T17413] name failslab, interval 1, probability 0, space 0, times 0 [ 291.805046][T17413] CPU: 1 PID: 17413 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 291.813784][T17413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.824121][T17413] Call Trace: [ 291.827436][T17413] dump_stack+0x197/0x210 [ 291.831805][T17413] should_fail.cold+0xa/0x15 [ 291.836452][T17413] ? fault_create_debugfs_attr+0x180/0x180 [ 291.842294][T17413] ? ___might_sleep+0x163/0x2c0 [ 291.847179][T17413] __should_failslab+0x121/0x190 [ 291.847201][T17413] should_failslab+0x9/0x14 [ 291.847216][T17413] kmem_cache_alloc_trace+0x2d3/0x790 [ 291.847227][T17413] ? kmem_cache_alloc+0x364/0x710 [ 291.847239][T17413] ? memset+0x40/0x40 [ 291.847256][T17413] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 291.847273][T17413] pcpu_get_vm_areas+0x4d6/0x3ee0 [ 291.847289][T17413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.847303][T17413] ? __vmalloc_node_range+0x4d7/0x810 [ 291.847335][T17413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.899840][T17413] pcpu_create_chunk+0x24e/0x7f0 [ 291.899859][T17413] pcpu_alloc+0x10f3/0x1380 [ 291.899882][T17413] ? pcpu_alloc_area+0x820/0x820 [ 291.899906][T17413] __alloc_percpu_gfp+0x28/0x30 [ 291.899922][T17413] array_map_alloc+0x698/0x7d0 [ 291.899942][T17413] ? array_of_map_free+0x50/0x50 [ 291.929208][T17413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.935485][T17413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.941890][T17413] ? array_of_map_free+0x50/0x50 [ 291.946854][T17413] __do_sys_bpf+0x478/0x3810 [ 291.951472][T17413] ? bpf_prog_load+0x18f0/0x18f0 [ 291.956440][T17413] ? __kasan_check_write+0x14/0x20 [ 291.961573][T17413] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 291.967127][T17413] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 291.967147][T17413] ? wait_for_completion+0x440/0x440 [ 291.967169][T17413] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.967198][T17413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 291.967212][T17413] ? do_syscall_64+0x26/0x790 [ 291.967235][T17413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.977802][T17413] ? do_syscall_64+0x26/0x790 [ 291.977827][T17413] __x64_sys_bpf+0x73/0xb0 [ 291.977843][T17413] do_syscall_64+0xfa/0x790 [ 291.977862][T17413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.977874][T17413] RIP: 0033:0x45a919 [ 291.977892][T17413] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.977900][T17413] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 291.977914][T17413] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 291.977922][T17413] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 00:23:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, 0x0, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xdb58) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 291.977937][T17413] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 292.068613][T17413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 292.068623][T17413] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:18 executing program 3 (fault-call:0 fault-nth:36): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:18 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x79b3, 0x8}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) r5 = perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x70, 0x40, 0x0, 0x3f, 0x9, 0x0, 0x7, 0xee3d01936c1e0c99, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x88cc, 0x3, @perf_bp={&(0x7f0000000080), 0x4}, 0x800, 0x2, 0x3, 0x5, 0x80000001, 0x8, 0x5}, r4, 0x4, r0, 0xc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r7 = perf_event_open$cgroup(&(0x7f0000000580)={0x2f89c80efa85094a, 0x70, 0x1, 0x5, 0x0, 0xf7, 0x0, 0x1, 0x6004, 0xe620abfbc2883663, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000100), 0xd}, 0x20, 0x8, 0x3, 0x0, 0xf66, 0xfec4, 0x3}, r6, 0xd, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x24) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0xffffffffa0008000}, 0x0) 00:23:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x4, 0x80}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r1, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r0, 0x0, 0x11, &(0x7f0000000080)='^.GPL@eth0system\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 292.365312][T17435] FAULT_INJECTION: forcing a failure. [ 292.365312][T17435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 292.487135][T17435] CPU: 1 PID: 17435 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 292.496821][T17435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.507112][T17435] Call Trace: [ 292.510435][T17435] dump_stack+0x197/0x210 [ 292.514802][T17435] should_fail.cold+0xa/0x15 [ 292.519454][T17435] ? fault_create_debugfs_attr+0x180/0x180 [ 292.525465][T17435] ? ___might_sleep+0x163/0x2c0 [ 292.530537][T17435] should_fail_alloc_page+0x50/0x60 [ 292.535769][T17435] __alloc_pages_nodemask+0x1a1/0x910 [ 292.541176][T17435] ? __alloc_pages_slowpath+0x2920/0x2920 [ 292.546941][T17435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.553334][T17435] ? find_next_bit+0x107/0x130 [ 292.558128][T17435] pcpu_populate_chunk+0xf8/0x940 [ 292.563291][T17435] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 292.569604][T17435] ? find_next_bit+0x107/0x130 [ 292.574493][T17435] pcpu_alloc+0xd5b/0x1380 [ 292.578946][T17435] ? pcpu_alloc_area+0x820/0x820 [ 292.583924][T17435] __alloc_percpu_gfp+0x28/0x30 [ 292.588814][T17435] array_map_alloc+0x698/0x7d0 [ 292.593621][T17435] ? array_of_map_free+0x50/0x50 [ 292.598594][T17435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.604864][T17435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.611160][T17435] ? array_of_map_free+0x50/0x50 [ 292.616127][T17435] __do_sys_bpf+0x478/0x3810 [ 292.620866][T17435] ? bpf_prog_load+0x18f0/0x18f0 [ 292.625828][T17435] ? __kasan_check_write+0x14/0x20 [ 292.631097][T17435] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 292.636671][T17435] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 292.641998][T17435] ? wait_for_completion+0x440/0x440 [ 292.647320][T17435] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 292.653627][T17435] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 292.659119][T17435] ? do_syscall_64+0x26/0x790 [ 292.663821][T17435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.669907][T17435] ? do_syscall_64+0x26/0x790 [ 292.674610][T17435] __x64_sys_bpf+0x73/0xb0 [ 292.679048][T17435] do_syscall_64+0xfa/0x790 [ 292.683574][T17435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.689746][T17435] RIP: 0033:0x45a919 [ 292.694186][T17435] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.713895][T17435] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 292.722327][T17435] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 292.730346][T17435] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 00:23:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xe0f8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 292.738349][T17435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 292.746552][T17435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 292.754721][T17435] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0}, 0x0) 00:23:19 executing program 3 (fault-call:0 fault-nth:37): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xd018) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000100)="e9aae0c536d2b2147726942a68505c2c60ca36be88a1f11a945e8c8db823621a086929eb44742694e1bba5846c056f31a60aa00b531d426e7324d15c7469313e7865680ccaf87d2878e5ef990c91ee77f675b360c4123fa6831bd1c19b0fac31c4c439090af26ba81e", &(0x7f0000000200)=""/134, 0x4}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x0, 0x0) close(r3) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 293.136487][T17472] FAULT_INJECTION: forcing a failure. [ 293.136487][T17472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 00:23:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xe698) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 293.265608][T17472] CPU: 0 PID: 17472 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 293.274354][T17472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.285012][T17472] Call Trace: [ 293.288327][T17472] dump_stack+0x197/0x210 [ 293.292692][T17472] should_fail.cold+0xa/0x15 [ 293.297299][T17472] ? fault_create_debugfs_attr+0x180/0x180 [ 293.297316][T17472] ? ___might_sleep+0x163/0x2c0 [ 293.297350][T17472] should_fail_alloc_page+0x50/0x60 [ 293.314326][T17472] __alloc_pages_nodemask+0x1a1/0x910 [ 293.319830][T17472] ? __alloc_pages_slowpath+0x2920/0x2920 [ 293.325685][T17472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 293.325701][T17472] ? find_next_bit+0x107/0x130 [ 293.325723][T17472] pcpu_populate_chunk+0xf8/0x940 [ 293.325737][T17472] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 293.325756][T17472] ? find_next_bit+0x107/0x130 [ 293.353356][T17472] pcpu_alloc+0xd5b/0x1380 [ 293.358069][T17472] ? pcpu_alloc_area+0x820/0x820 [ 293.363053][T17472] __alloc_percpu_gfp+0x28/0x30 [ 293.367936][T17472] array_map_alloc+0x698/0x7d0 [ 293.373000][T17472] ? array_of_map_free+0x50/0x50 [ 293.377980][T17472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 293.384469][T17472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.391108][T17472] ? array_of_map_free+0x50/0x50 [ 293.396085][T17472] __do_sys_bpf+0x478/0x3810 [ 293.400746][T17472] ? bpf_prog_load+0x18f0/0x18f0 [ 293.405795][T17472] ? __kasan_check_write+0x14/0x20 [ 293.410944][T17472] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 293.416545][T17472] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 293.421857][T17472] ? wait_for_completion+0x440/0x440 [ 293.427185][T17472] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.433657][T17472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 293.439147][T17472] ? do_syscall_64+0x26/0x790 [ 293.443861][T17472] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.450563][T17472] ? do_syscall_64+0x26/0x790 [ 293.455643][T17472] __x64_sys_bpf+0x73/0xb0 [ 293.460093][T17472] do_syscall_64+0xfa/0x790 [ 293.464802][T17472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.470715][T17472] RIP: 0033:0x45a919 [ 293.474908][T17472] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.494787][T17472] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 293.506691][T17472] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:23:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x0, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:19 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000100)=""/183) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 293.515636][T17472] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 293.523646][T17472] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 293.531631][T17472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 293.539878][T17472] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x0, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xd018) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0) 00:23:19 executing program 3 (fault-call:0 fault-nth:38): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xec38) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 293.942373][T17514] FAULT_INJECTION: forcing a failure. [ 293.942373][T17514] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x5, 0x99, 0x2c, 0x3, 0x0, 0x70e, 0x3441, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x10104, 0xffffffff, 0x5, 0x4, 0x4, 0x0, 0xfc}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9039ab60b258bd84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000280), 0x12) r3 = gettid() r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r4, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xda00) write$cgroup_subtree(r6, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000540)=ANY=[@ANYBLOB="4cf616835b8d1ec0021dd237c05d8b08f17eb7677e29d21d3ecdcd31f6e45821bdd4987308f3fd35f8a8ca87ed08bb06e2cb8a54d34f26250b87e08d01cfd92f7635fd244aec481cf97df58fd22d823d5cf974aa83fb1c9daa33acf5b73b3d4b4f4aaca804613491"], 0x1) r8 = openat$cgroup_ro(r7, &(0x7f0000000340)='memory.\xa3T\x82\xf9\xb1\tK\xc1\xed\x1c\xea\x01\xb3\x12t\x95\x01U\x7fts\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000280), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r3, r8, 0x0, 0x17, &(0x7f0000000100)='keyringppp1%wlan0eth0@\x00', 0xffffffffffffffff}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000280), 0x12) r11 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x0, 0x0, 0x4}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r11, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r9, r10, 0x0, 0x1, &(0x7f00000002c0)='\x00', r12}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x1) [ 293.989304][T17514] CPU: 0 PID: 17514 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 293.998904][T17514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.010239][T17514] Call Trace: [ 294.013653][T17514] dump_stack+0x197/0x210 [ 294.018658][T17514] should_fail.cold+0xa/0x15 [ 294.023370][T17514] ? fault_create_debugfs_attr+0x180/0x180 [ 294.029377][T17514] ? ___might_sleep+0x163/0x2c0 [ 294.034273][T17514] should_fail_alloc_page+0x50/0x60 [ 294.034291][T17514] __alloc_pages_nodemask+0x1a1/0x910 [ 294.034313][T17514] ? __alloc_pages_slowpath+0x2920/0x2920 [ 294.051352][T17514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.058077][T17514] ? find_next_bit+0x107/0x130 [ 294.064017][T17514] pcpu_populate_chunk+0xf8/0x940 [ 294.070246][T17514] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 294.076174][T17514] ? find_next_bit+0x107/0x130 [ 294.080970][T17514] pcpu_alloc+0xd5b/0x1380 [ 294.086483][T17514] ? pcpu_alloc_area+0x820/0x820 [ 294.092387][T17514] __alloc_percpu_gfp+0x28/0x30 [ 294.097457][T17514] array_map_alloc+0x698/0x7d0 [ 294.102790][T17514] ? array_of_map_free+0x50/0x50 [ 294.107847][T17514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.114197][T17514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.121657][T17514] ? array_of_map_free+0x50/0x50 [ 294.126648][T17514] __do_sys_bpf+0x478/0x3810 [ 294.131959][T17514] ? bpf_prog_load+0x18f0/0x18f0 [ 294.137030][T17514] ? __kasan_check_write+0x14/0x20 [ 294.142207][T17514] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 294.147783][T17514] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 294.153737][T17514] ? wait_for_completion+0x440/0x440 [ 294.159166][T17514] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 294.165799][T17514] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 294.171596][T17514] ? do_syscall_64+0x26/0x790 [ 294.176326][T17514] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.182592][T17514] ? do_syscall_64+0x26/0x790 [ 294.187387][T17514] __x64_sys_bpf+0x73/0xb0 [ 294.192282][T17514] do_syscall_64+0xfa/0x790 [ 294.196825][T17514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.202905][T17514] RIP: 0033:0x45a919 [ 294.206829][T17514] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.228285][T17514] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xd018) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x70}, 0x0) 00:23:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x0, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xf1d8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 294.228301][T17514] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 294.228308][T17514] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 294.228317][T17514] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 294.228325][T17514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 294.228333][T17514] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:20 executing program 3 (fault-call:0 fault-nth:39): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0) [ 294.534733][T17542] FAULT_INJECTION: forcing a failure. [ 294.534733][T17542] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 294.615865][T17542] CPU: 0 PID: 17542 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 294.624721][T17542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.635306][T17542] Call Trace: [ 294.638622][T17542] dump_stack+0x197/0x210 [ 294.643157][T17542] should_fail.cold+0xa/0x15 [ 294.647776][T17542] ? fault_create_debugfs_attr+0x180/0x180 [ 294.653867][T17542] ? ___might_sleep+0x163/0x2c0 [ 294.659197][T17542] should_fail_alloc_page+0x50/0x60 00:23:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xf778) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 294.664604][T17542] __alloc_pages_nodemask+0x1a1/0x910 [ 294.670788][T17542] ? __alloc_pages_slowpath+0x2920/0x2920 [ 294.677407][T17542] ? __sched_text_start+0x8/0x8 [ 294.683507][T17542] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.689750][T17542] ? find_next_bit+0x107/0x130 [ 294.689771][T17542] pcpu_populate_chunk+0xf8/0x940 [ 294.689785][T17542] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 294.689804][T17542] ? find_next_bit+0x107/0x130 [ 294.711887][T17542] pcpu_alloc+0xd5b/0x1380 [ 294.711914][T17542] ? pcpu_alloc_area+0x820/0x820 [ 294.711941][T17542] __alloc_percpu_gfp+0x28/0x30 [ 294.726493][T17542] array_map_alloc+0x698/0x7d0 [ 294.731394][T17542] ? array_of_map_free+0x50/0x50 [ 294.736383][T17542] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.743250][T17542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.743270][T17542] ? array_of_map_free+0x50/0x50 [ 294.743290][T17542] __do_sys_bpf+0x478/0x3810 [ 294.760757][T17542] ? bpf_prog_load+0x18f0/0x18f0 [ 294.765987][T17542] ? __kasan_check_write+0x14/0x20 [ 294.771415][T17542] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 294.777504][T17542] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 294.782843][T17542] ? wait_for_completion+0x440/0x440 [ 294.782867][T17542] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 294.782899][T17542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 294.801542][T17542] ? do_syscall_64+0x26/0x790 [ 294.806331][T17542] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.812600][T17542] ? do_syscall_64+0x26/0x790 [ 294.817313][T17542] __x64_sys_bpf+0x73/0xb0 [ 294.821766][T17542] do_syscall_64+0xfa/0x790 [ 294.826737][T17542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.833605][T17542] RIP: 0033:0x45a919 [ 294.838387][T17542] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.858101][T17542] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xc4d8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) 00:23:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 294.866619][T17542] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 294.874637][T17542] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 294.882656][T17542] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 294.890903][T17542] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 294.898900][T17542] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:21 executing program 3 (fault-call:0 fault-nth:40): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x411, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0) [ 295.270921][T17570] FAULT_INJECTION: forcing a failure. [ 295.270921][T17570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 295.330060][T17570] CPU: 0 PID: 17570 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 295.338781][T17570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.349237][T17570] Call Trace: [ 295.352569][T17570] dump_stack+0x197/0x210 [ 295.356968][T17570] should_fail.cold+0xa/0x15 [ 295.361604][T17570] ? fault_create_debugfs_attr+0x180/0x180 [ 295.367438][T17570] ? ___might_sleep+0x163/0x2c0 [ 295.372332][T17570] should_fail_alloc_page+0x50/0x60 [ 295.377668][T17570] __alloc_pages_nodemask+0x1a1/0x910 [ 295.383070][T17570] ? __alloc_pages_slowpath+0x2920/0x2920 [ 295.389077][T17570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 295.395353][T17570] ? find_next_bit+0x107/0x130 [ 295.400162][T17570] pcpu_populate_chunk+0xf8/0x940 [ 295.405213][T17570] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 295.410955][T17570] ? find_next_bit+0x107/0x130 [ 295.415782][T17570] pcpu_alloc+0xd5b/0x1380 [ 295.420272][T17570] ? pcpu_alloc_area+0x820/0x820 [ 295.425245][T17570] __alloc_percpu_gfp+0x28/0x30 00:23:21 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x105000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20a40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) recvmsg$kcm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/89, 0x59}], 0x1, &(0x7f0000000380)=""/57, 0x39}, 0x101) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="806d256d0002792016b0e0f7b3adb3bbeda1faa384b2256ae9c7549ac377c69c2bb489e11305faa4327567f71835648b3aedbdd25d991e3a"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r3, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={0xffffffffffffffff, r3, 0x12638726a844b631, 0x2}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="806d256d000279204296cfddc0aa9d3ecc8345d1f2bc652e82926ac94755ee0904a5df2f628b3abc08fd5ae08c2030566c"], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 295.430118][T17570] array_map_alloc+0x698/0x7d0 [ 295.435068][T17570] ? array_of_map_free+0x50/0x50 [ 295.440045][T17570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 295.446533][T17570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.452800][T17570] ? array_of_map_free+0x50/0x50 [ 295.457775][T17570] __do_sys_bpf+0x478/0x3810 [ 295.462490][T17570] ? bpf_prog_load+0x18f0/0x18f0 [ 295.467826][T17570] ? __kasan_check_write+0x14/0x20 [ 295.473213][T17570] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 295.478790][T17570] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 295.478811][T17570] ? wait_for_completion+0x440/0x440 [ 295.478834][T17570] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 295.478861][T17570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 295.478882][T17570] ? do_syscall_64+0x26/0x790 [ 295.489654][T17570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.489671][T17570] ? do_syscall_64+0x26/0x790 [ 295.489697][T17570] __x64_sys_bpf+0x73/0xb0 [ 295.489716][T17570] do_syscall_64+0xfa/0x790 [ 295.489734][T17570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.489745][T17570] RIP: 0033:0x45a919 [ 295.489766][T17570] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.489774][T17570] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 295.507487][T17570] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:23:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfd18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xc4d8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 295.507497][T17570] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 295.507505][T17570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 295.507513][T17570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 295.507522][T17570] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:21 executing program 3 (fault-call:0 fault-nth:41): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0x8) 00:23:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0) 00:23:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 295.840837][T17596] FAULT_INJECTION: forcing a failure. [ 295.840837][T17596] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 295.917548][T17596] CPU: 0 PID: 17596 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 295.926282][T17596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.937580][T17596] Call Trace: [ 295.941173][T17596] dump_stack+0x197/0x210 [ 295.946661][T17596] should_fail.cold+0xa/0x15 [ 295.951571][T17596] ? fault_create_debugfs_attr+0x180/0x180 [ 295.957826][T17596] ? ___might_sleep+0x163/0x2c0 00:23:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x200101ef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 295.962903][T17596] should_fail_alloc_page+0x50/0x60 [ 295.968216][T17596] __alloc_pages_nodemask+0x1a1/0x910 [ 295.973955][T17596] ? __alloc_pages_slowpath+0x2920/0x2920 [ 295.979967][T17596] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 295.987361][T17596] ? find_next_bit+0x107/0x130 [ 295.992499][T17596] pcpu_populate_chunk+0xf8/0x940 [ 295.997983][T17596] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 296.003900][T17596] ? find_next_bit+0x107/0x130 [ 296.009157][T17596] pcpu_alloc+0xd5b/0x1380 00:23:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x9, 0xfffffffffffff483}, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x100}, 0x0, 0x0, r0, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 296.013612][T17596] ? pcpu_alloc_area+0x820/0x820 [ 296.018583][T17596] __alloc_percpu_gfp+0x28/0x30 [ 296.023550][T17596] array_map_alloc+0x698/0x7d0 [ 296.028334][T17596] ? array_of_map_free+0x50/0x50 [ 296.033421][T17596] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.039953][T17596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.046355][T17596] ? array_of_map_free+0x50/0x50 [ 296.051423][T17596] __do_sys_bpf+0x478/0x3810 [ 296.056045][T17596] ? bpf_prog_load+0x18f0/0x18f0 [ 296.061011][T17596] ? __kasan_check_write+0x14/0x20 00:23:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfd18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 296.066150][T17596] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 296.072095][T17596] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 296.077699][T17596] ? wait_for_completion+0x440/0x440 [ 296.083369][T17596] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 296.090051][T17596] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 296.096185][T17596] ? do_syscall_64+0x26/0x790 [ 296.101272][T17596] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.108263][T17596] ? do_syscall_64+0x26/0x790 [ 296.113404][T17596] __x64_sys_bpf+0x73/0xb0 [ 296.118112][T17596] do_syscall_64+0xfa/0x790 [ 296.122642][T17596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.128614][T17596] RIP: 0033:0x45a919 [ 296.128629][T17596] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.128637][T17596] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:22 executing program 3 (fault-call:0 fault-nth:42): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 296.128649][T17596] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 296.128658][T17596] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 296.128665][T17596] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.128674][T17596] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 296.128682][T17596] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x7000}, 0x0) [ 296.343891][T17623] FAULT_INJECTION: forcing a failure. [ 296.343891][T17623] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc, 0x0, @perf_bp={0x0}, 0x1, 0xfffffffffffffffe}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d0002792a"], 0xda00) openat$cgroup_ro(r1, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)="d244dcb1cc2c7af408ef8b9b6865c9c0799e124c5e03240ab842b2954de4384347a8f4e3bc051c4def0379f95eb2c980b6690c2c35d71549558ce7f2dc50a8fe52f85a4d9ebc2887e22a563e26", 0x4d}], 0x1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'ifb0\x00'}) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r3, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x5c, 0x40, 0x1f, 0x7f, 0x0, 0x0, 0x2000, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x755, 0x6, @perf_config_ext={0x80, 0xb0f}, 0x2924, 0x6, 0x3f, 0x2, 0x7, 0x5}, r2, 0xc, r5, 0x2) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfffffdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 296.461919][T17623] CPU: 0 PID: 17623 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 296.471272][T17623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.483867][T17623] Call Trace: [ 296.487283][T17623] dump_stack+0x197/0x210 [ 296.491814][T17623] should_fail.cold+0xa/0x15 [ 296.496871][T17623] ? fault_create_debugfs_attr+0x180/0x180 [ 296.503101][T17623] ? ___might_sleep+0x163/0x2c0 [ 296.508114][T17623] should_fail_alloc_page+0x50/0x60 [ 296.514034][T17623] __alloc_pages_nodemask+0x1a1/0x910 [ 296.519522][T17623] ? __alloc_pages_slowpath+0x2920/0x2920 [ 296.525280][T17623] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.531535][T17623] ? find_next_bit+0x107/0x130 [ 296.536505][T17623] pcpu_populate_chunk+0xf8/0x940 [ 296.541550][T17623] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 296.548694][T17623] ? find_next_bit+0x107/0x130 [ 296.553493][T17623] pcpu_alloc+0xd5b/0x1380 00:23:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfffffffffffffdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 296.557972][T17623] ? pcpu_alloc_area+0x820/0x820 [ 296.562951][T17623] __alloc_percpu_gfp+0x28/0x30 [ 296.567823][T17623] array_map_alloc+0x698/0x7d0 [ 296.573033][T17623] ? array_of_map_free+0x50/0x50 [ 296.578003][T17623] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.585220][T17623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.591487][T17623] ? array_of_map_free+0x50/0x50 [ 296.596452][T17623] __do_sys_bpf+0x478/0x3810 [ 296.601077][T17623] ? bpf_prog_load+0x18f0/0x18f0 [ 296.606040][T17623] ? __kasan_check_write+0x14/0x20 [ 296.611179][T17623] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 296.616743][T17623] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 296.622055][T17623] ? wait_for_completion+0x440/0x440 [ 296.627370][T17623] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 296.633729][T17623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 296.639203][T17623] ? do_syscall_64+0x26/0x790 [ 296.643891][T17623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.651797][T17623] ? do_syscall_64+0x26/0x790 [ 296.656500][T17623] __x64_sys_bpf+0x73/0xb0 00:23:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a21618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cfbf160467d49a7e499ba8c1097118dc017606d0a9439d263124d340e6c8630280092afcb6293398930f2000066a3f0d5edb75cb1b99471d5153ea921143f70bcd9357899657dc21eb9428ed5bda04008264ca3aca22d1e3e876341c042415484592008"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 296.661041][T17623] do_syscall_64+0xfa/0x790 [ 296.665605][T17623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.671517][T17623] RIP: 0033:0x45a919 [ 296.675538][T17623] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.695854][T17623] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 296.704285][T17623] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 296.712363][T17623] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 296.720351][T17623] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.728339][T17623] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 296.736421][T17623] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfd18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:23 executing program 3 (fault-call:0 fault-nth:43): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x101d0}, 0x0) 00:23:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) 00:23:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x200101ef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 297.155204][T17660] FAULT_INJECTION: forcing a failure. [ 297.155204][T17660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) [ 297.239455][T17660] CPU: 1 PID: 17660 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 297.249505][T17660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.259584][T17660] Call Trace: [ 297.259615][T17660] dump_stack+0x197/0x210 [ 297.259638][T17660] should_fail.cold+0xa/0x15 [ 297.259659][T17660] ? fault_create_debugfs_attr+0x180/0x180 [ 297.259673][T17660] ? ___might_sleep+0x163/0x2c0 [ 297.259698][T17660] should_fail_alloc_page+0x50/0x60 [ 297.259714][T17660] __alloc_pages_nodemask+0x1a1/0x910 [ 297.259737][T17660] ? __alloc_pages_slowpath+0x2920/0x2920 [ 297.259759][T17660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.259773][T17660] ? find_next_bit+0x107/0x130 [ 297.259794][T17660] pcpu_populate_chunk+0xf8/0x940 [ 297.259807][T17660] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 297.259826][T17660] ? find_next_bit+0x107/0x130 [ 297.282693][T17660] pcpu_alloc+0xd5b/0x1380 [ 297.282718][T17660] ? pcpu_alloc_area+0x820/0x820 00:23:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 297.282802][T17660] __alloc_percpu_gfp+0x28/0x30 [ 297.305635][T17660] array_map_alloc+0x698/0x7d0 [ 297.305659][T17660] ? array_of_map_free+0x50/0x50 [ 297.305684][T17660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.315642][T17660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.366318][T17660] ? array_of_map_free+0x50/0x50 [ 297.371277][T17660] __do_sys_bpf+0x478/0x3810 [ 297.375892][T17660] ? bpf_prog_load+0x18f0/0x18f0 [ 297.380850][T17660] ? __kasan_check_write+0x14/0x20 [ 297.386099][T17660] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 297.391756][T17660] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 297.397776][T17660] ? wait_for_completion+0x440/0x440 [ 297.403185][T17660] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 297.409984][T17660] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 297.415595][T17660] ? do_syscall_64+0x26/0x790 [ 297.420397][T17660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.426697][T17660] ? do_syscall_64+0x26/0x790 [ 297.431858][T17660] __x64_sys_bpf+0x73/0xb0 [ 297.436564][T17660] do_syscall_64+0xfa/0x790 [ 297.441268][T17660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.447264][T17660] RIP: 0033:0x45a919 [ 297.451406][T17660] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.471214][T17660] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 297.479642][T17660] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 297.487631][T17660] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 297.495643][T17660] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 297.503627][T17660] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 297.511656][T17660] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:23 executing program 1: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140)=@id={0x1e, 0x3, 0x0, {0x4e23, 0x3}}, 0x10, &(0x7f0000001600), 0x7, &(0x7f0000001680)="88db4e05ca1c740b13baad06d0a4b0e21d0b6a46f1490b751ce16bc62ef82a2386fdf195ecf51c4c081e1e0cbeb04324dd8bf54cc4a25e436bf24d6c3d7c5e93cc579aa93c01f4702613013d81", 0x4d, 0x40}, 0x2040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.swap.max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:23 executing program 3 (fault-call:0 fault-nth:44): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x8000a0}, 0x0) 00:23:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 297.823116][T17690] FAULT_INJECTION: forcing a failure. [ 297.823116][T17690] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 297.885408][T17690] CPU: 1 PID: 17690 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 297.894165][T17690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.904239][T17690] Call Trace: [ 297.907557][T17690] dump_stack+0x197/0x210 [ 297.912533][T17690] should_fail.cold+0xa/0x15 [ 297.917688][T17690] ? fault_create_debugfs_attr+0x180/0x180 [ 297.923521][T17690] ? ___might_sleep+0x163/0x2c0 [ 297.929366][T17690] should_fail_alloc_page+0x50/0x60 [ 297.934743][T17690] __alloc_pages_nodemask+0x1a1/0x910 [ 297.940182][T17690] ? __alloc_pages_slowpath+0x2920/0x2920 [ 297.946286][T17690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.952751][T17690] ? find_next_bit+0x107/0x130 [ 297.957551][T17690] pcpu_populate_chunk+0xf8/0x940 [ 297.964337][T17690] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 297.970165][T17690] ? find_next_bit+0x107/0x130 [ 297.975305][T17690] pcpu_alloc+0xd5b/0x1380 [ 297.980308][T17690] ? pcpu_alloc_area+0x820/0x820 [ 297.985283][T17690] __alloc_percpu_gfp+0x28/0x30 [ 297.990525][T17690] array_map_alloc+0x698/0x7d0 [ 297.995365][T17690] ? array_of_map_free+0x50/0x50 [ 298.000939][T17690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.007602][T17690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.014724][T17690] ? array_of_map_free+0x50/0x50 [ 298.021079][T17690] __do_sys_bpf+0x478/0x3810 [ 298.025704][T17690] ? bpf_prog_load+0x18f0/0x18f0 [ 298.030768][T17690] ? __kasan_check_write+0x14/0x20 [ 298.036608][T17690] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 298.043205][T17690] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 298.049044][T17690] ? wait_for_completion+0x440/0x440 [ 298.054362][T17690] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 298.060934][T17690] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 298.066675][T17690] ? do_syscall_64+0x26/0x790 [ 298.071902][T17690] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.077991][T17690] ? do_syscall_64+0x26/0x790 [ 298.084456][T17690] __x64_sys_bpf+0x73/0xb0 [ 298.089067][T17690] do_syscall_64+0xfa/0x790 [ 298.093607][T17690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.099513][T17690] RIP: 0033:0x45a919 [ 298.103481][T17690] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.123791][T17690] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:24 executing program 5: r0 = gettid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 298.132222][T17690] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 298.142215][T17690] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 298.150590][T17690] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.158586][T17690] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 298.167310][T17690] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0x0) 00:23:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:24 executing program 3 (fault-call:0 fault-nth:45): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x1d8140c8}, 0x0) 00:23:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ae3c7dc8d1fb19d96c3f93cc4d1619ded631172066099e717c00"/41], 0xda00) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000240)=r0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r4, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r6, 0x0, 0xe, &(0x7f0000000100)='memory.events\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r0, &(0x7f0000000480)=r7, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 298.653866][T17732] FAULT_INJECTION: forcing a failure. [ 298.653866][T17732] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 298.738626][T17732] CPU: 1 PID: 17732 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 298.747533][T17732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.757785][T17732] Call Trace: [ 298.761285][T17732] dump_stack+0x197/0x210 [ 298.766489][T17732] should_fail.cold+0xa/0x15 [ 298.771114][T17732] ? fault_create_debugfs_attr+0x180/0x180 [ 298.777321][T17732] ? ___might_sleep+0x163/0x2c0 [ 298.782651][T17732] should_fail_alloc_page+0x50/0x60 [ 298.787874][T17732] __alloc_pages_nodemask+0x1a1/0x910 [ 298.793363][T17732] ? __alloc_pages_slowpath+0x2920/0x2920 [ 298.800411][T17732] ? __sched_text_start+0x8/0x8 [ 298.805659][T17732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.812705][T17732] ? find_next_bit+0x107/0x130 [ 298.818312][T17732] pcpu_populate_chunk+0xf8/0x940 [ 298.824002][T17732] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 298.830016][T17732] ? find_next_bit+0x107/0x130 [ 298.836437][T17732] pcpu_alloc+0xd5b/0x1380 [ 298.841257][T17732] ? pcpu_alloc_area+0x820/0x820 [ 298.847073][T17732] __alloc_percpu_gfp+0x28/0x30 [ 298.852571][T17732] array_map_alloc+0x698/0x7d0 [ 298.857804][T17732] ? array_of_map_free+0x50/0x50 [ 298.862773][T17732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.869139][T17732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.875790][T17732] ? array_of_map_free+0x50/0x50 [ 298.880929][T17732] __do_sys_bpf+0x478/0x3810 00:23:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 298.885556][T17732] ? bpf_prog_load+0x18f0/0x18f0 [ 298.890524][T17732] ? __kasan_check_write+0x14/0x20 [ 298.896688][T17732] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 298.902304][T17732] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 298.908314][T17732] ? wait_for_completion+0x440/0x440 [ 298.908339][T17732] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 298.908366][T17732] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 298.908380][T17732] ? do_syscall_64+0x26/0x790 [ 298.908393][T17732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.908407][T17732] ? do_syscall_64+0x26/0x790 [ 298.908429][T17732] __x64_sys_bpf+0x73/0xb0 [ 298.948603][T17732] do_syscall_64+0xfa/0x790 [ 298.953245][T17732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.959594][T17732] RIP: 0033:0x45a919 [ 298.963822][T17732] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:23:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x0) 00:23:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 298.985952][T17732] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 298.994685][T17732] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 299.002863][T17732] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 299.011711][T17732] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.019796][T17732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 299.027895][T17732] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467d49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x20000, 0x0) 00:23:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:25 executing program 3 (fault-call:0 fault-nth:46): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x4}, 0x0, 0x0, &(0x7f0000000180)={0x1, 0xe, 0xfffffc01, 0x100}, &(0x7f0000000200)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x100}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={r3}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0) 00:23:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 299.446962][T17768] FAULT_INJECTION: forcing a failure. [ 299.446962][T17768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x4, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x4, 0x4, 0x9}], 'F'}, @fwd={0x4}, @datasec={0x10, 0x7, 0x0, 0xf, 0x3, [{0x3, 0x80, 0x9}, {0x5, 0xfffffff7, 0x9}, {0x1, 0x3d5, 0x5}, {0x5, 0x5, 0x4}, {0x2, 0x40, 0x7c6}, {0x5, 0x8000, 0x8}, {0x3, 0x9, 0x7}], "f5cefc"}, @func={0xc, 0x0, 0x0, 0xc, 0x1}, @struct={0x1, 0x1, 0x0, 0x4, 0x1, 0x9, [{0x3, 0x2, 0x7}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000300)=""/85, 0xc8, 0x55}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xc0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=0x3ff, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000780)={0x4, 0xf, 0x7, 0x20}, &(0x7f00000007c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=0x3}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000020c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x8, 0x47, &(0x7f0000000540)=""/71, 0x0, 0x0, [], 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000002040)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r4}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000980)={r2, 0xffffffffffffff0b, &(0x7f0000000700)={&(0x7f00000006c0)=""/8, 0x5, r4}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={0xffffffffffffffff, r1, 0x0, 0x4}, 0x10) write$cgroup_int(r0, &(0x7f00000009c0)=0x7, 0x12) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x11, 0x6, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_subtree(r6, &(0x7f0000000240)={[{0x0, 'pids'}]}, 0x6) openat$cgroup_ro(r3, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='/dev/net/tun\x00', r7}, 0x10) 00:23:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0x70000000}, 0x0) [ 299.687141][T17768] CPU: 0 PID: 17768 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 299.695876][T17768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.706548][T17768] Call Trace: [ 299.709950][T17768] dump_stack+0x197/0x210 [ 299.714318][T17768] should_fail.cold+0xa/0x15 [ 299.719584][T17768] ? fault_create_debugfs_attr+0x180/0x180 [ 299.725701][T17768] ? ___might_sleep+0x163/0x2c0 [ 299.730583][T17768] should_fail_alloc_page+0x50/0x60 [ 299.735891][T17768] __alloc_pages_nodemask+0x1a1/0x910 [ 299.741403][T17768] ? __alloc_pages_slowpath+0x2920/0x2920 [ 299.747546][T17768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.755384][T17768] ? find_next_bit+0x107/0x130 [ 299.760232][T17768] pcpu_populate_chunk+0xf8/0x940 [ 299.765372][T17768] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 299.771114][T17768] ? find_next_bit+0x107/0x130 [ 299.776173][T17768] pcpu_alloc+0xd5b/0x1380 [ 299.776200][T17768] ? pcpu_alloc_area+0x820/0x820 00:23:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 299.776228][T17768] __alloc_percpu_gfp+0x28/0x30 [ 299.785977][T17768] array_map_alloc+0x698/0x7d0 [ 299.785997][T17768] ? array_of_map_free+0x50/0x50 [ 299.786015][T17768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.786029][T17768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.786043][T17768] ? array_of_map_free+0x50/0x50 [ 299.786064][T17768] __do_sys_bpf+0x478/0x3810 [ 299.826136][T17768] ? bpf_prog_load+0x18f0/0x18f0 [ 299.831313][T17768] ? __kasan_check_write+0x14/0x20 [ 299.837070][T17768] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 299.842636][T17768] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 299.847975][T17768] ? wait_for_completion+0x440/0x440 [ 299.853756][T17768] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 299.860209][T17768] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 299.867088][T17768] ? do_syscall_64+0x26/0x790 [ 299.871791][T17768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.877893][T17768] ? do_syscall_64+0x26/0x790 [ 299.882685][T17768] __x64_sys_bpf+0x73/0xb0 [ 299.887124][T17768] do_syscall_64+0xfa/0x790 [ 299.891743][T17768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.898436][T17768] RIP: 0033:0x45a919 [ 299.903092][T17768] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.924855][T17768] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)) [ 299.933549][T17768] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 299.943879][T17768] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 299.952687][T17768] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.961034][T17768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 299.969027][T17768] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xa0008000}, 0x0) 00:23:26 executing program 3 (fault-call:0 fault-nth:47): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0xea2d67a1dcd967ff, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'tunl0\x00', @dev={[], 0x1a}}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 300.306725][T17807] FAULT_INJECTION: forcing a failure. [ 300.306725][T17807] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 300.416127][T17807] CPU: 0 PID: 17807 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 300.425223][T17807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.436834][T17807] Call Trace: [ 300.440779][T17807] dump_stack+0x197/0x210 [ 300.445944][T17807] should_fail.cold+0xa/0x15 [ 300.451012][T17807] ? fault_create_debugfs_attr+0x180/0x180 [ 300.456947][T17807] ? ___might_sleep+0x163/0x2c0 [ 300.462026][T17807] should_fail_alloc_page+0x50/0x60 [ 300.467427][T17807] __alloc_pages_nodemask+0x1a1/0x910 [ 300.473694][T17807] ? __alloc_pages_slowpath+0x2920/0x2920 [ 300.479531][T17807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.486551][T17807] ? find_next_bit+0x107/0x130 [ 300.491608][T17807] pcpu_populate_chunk+0xf8/0x940 [ 300.497205][T17807] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 300.502951][T17807] ? find_next_bit+0x107/0x130 [ 300.507894][T17807] pcpu_alloc+0xd5b/0x1380 [ 300.512361][T17807] ? pcpu_alloc_area+0x820/0x820 [ 300.517345][T17807] __alloc_percpu_gfp+0x28/0x30 [ 300.522230][T17807] array_map_alloc+0x698/0x7d0 [ 300.527174][T17807] ? array_of_map_free+0x50/0x50 [ 300.532282][T17807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.538550][T17807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.544818][T17807] ? array_of_map_free+0x50/0x50 [ 300.549798][T17807] __do_sys_bpf+0x478/0x3810 [ 300.554426][T17807] ? bpf_prog_load+0x18f0/0x18f0 [ 300.559386][T17807] ? __kasan_check_write+0x14/0x20 00:23:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xc840811d}, 0x0) [ 300.564876][T17807] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 300.570445][T17807] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 300.575780][T17807] ? wait_for_completion+0x440/0x440 [ 300.581121][T17807] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.588116][T17807] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 300.588132][T17807] ? do_syscall_64+0x26/0x790 [ 300.588147][T17807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.588167][T17807] ? do_syscall_64+0x26/0x790 [ 300.610089][T17807] __x64_sys_bpf+0x73/0xb0 [ 300.610110][T17807] do_syscall_64+0xfa/0x790 [ 300.610130][T17807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.610143][T17807] RIP: 0033:0x45a919 [ 300.610158][T17807] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.610165][T17807] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 300.610179][T17807] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 00:23:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000280), 0x12) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000000)=0xffffffff) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 300.610187][T17807] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 300.610194][T17807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.610202][T17807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 300.610209][T17807] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:26 executing program 3 (fault-call:0 fault-nth:48): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 300.910001][T17835] FAULT_INJECTION: forcing a failure. [ 300.910001][T17835] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 300.966402][T17835] CPU: 1 PID: 17835 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 300.975217][T17835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.985459][T17835] Call Trace: [ 300.988785][T17835] dump_stack+0x197/0x210 [ 300.993169][T17835] should_fail.cold+0xa/0x15 [ 300.997796][T17835] ? fault_create_debugfs_attr+0x180/0x180 [ 301.003848][T17835] ? ___might_sleep+0x163/0x2c0 [ 301.008732][T17835] should_fail_alloc_page+0x50/0x60 00:23:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 301.013962][T17835] __alloc_pages_nodemask+0x1a1/0x910 [ 301.019371][T17835] ? __alloc_pages_slowpath+0x2920/0x2920 [ 301.025132][T17835] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 301.031535][T17835] ? find_next_bit+0x107/0x130 [ 301.036359][T17835] pcpu_populate_chunk+0xf8/0x940 [ 301.041410][T17835] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 301.047159][T17835] ? find_next_bit+0x107/0x130 [ 301.052009][T17835] pcpu_alloc+0xd5b/0x1380 [ 301.056468][T17835] ? pcpu_alloc_area+0x820/0x820 [ 301.061450][T17835] __alloc_percpu_gfp+0x28/0x30 00:23:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[], 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 301.066328][T17835] array_map_alloc+0x698/0x7d0 [ 301.071125][T17835] ? array_of_map_free+0x50/0x50 [ 301.076130][T17835] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 301.082389][T17835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.088657][T17835] ? array_of_map_free+0x50/0x50 [ 301.093631][T17835] __do_sys_bpf+0x478/0x3810 [ 301.098275][T17835] ? bpf_prog_load+0x18f0/0x18f0 [ 301.103234][T17835] ? __kasan_check_write+0x14/0x20 [ 301.108360][T17835] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 301.108378][T17835] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 301.108396][T17835] ? wait_for_completion+0x440/0x440 [ 301.108420][T17835] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.108449][T17835] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.119285][T17835] ? do_syscall_64+0x26/0x790 [ 301.119303][T17835] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.119318][T17835] ? do_syscall_64+0x26/0x790 [ 301.119342][T17835] __x64_sys_bpf+0x73/0xb0 [ 301.119361][T17835] do_syscall_64+0xfa/0x790 [ 301.119378][T17835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.119390][T17835] RIP: 0033:0x45a919 [ 301.119405][T17835] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.119412][T17835] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 301.119425][T17835] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 301.119435][T17835] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 301.119444][T17835] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.119453][T17835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 301.119467][T17835] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000280), 0x12) r3 = openat$cgroup(r2, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x3, 0x1f, 0x0, 0x1f, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x6, @perf_config_ext={0x8, 0x11b}, 0x90, 0x7f, 0x80000001, 0x9, 0x251, 0x7, 0x746d}, r3, 0x4, r4, 0x4) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) write$cgroup_int(r5, &(0x7f0000000080)=0x6, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 00:23:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xd0010100}, 0x0) 00:23:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x7, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[], 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:27 executing program 3 (fault-call:0 fault-nth:49): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 00:23:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}, 0x0) [ 301.814592][T17884] FAULT_INJECTION: forcing a failure. [ 301.814592][T17884] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:23:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) socketpair(0x0, 0x80d, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000300)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000680)=""/221, 0xdd}], 0x1, &(0x7f0000000280)=""/8, 0x8}, 0x40000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000980)={r6, 0x10, &(0x7f0000000940)={&(0x7f0000000840)=""/204, 0xcc, 0x0}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000280), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xe, 0xd, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x6b}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x2}, @generic={0x2d, 0x3, 0x6, 0x3}, @map={0x18, 0x2, 0x1, 0x0, r3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x4b}, @call={0x85, 0x0, 0x0, 0x5e}, @exit, @ldst={0x2, 0x1, 0x3, 0x9, 0x1, 0x1c, 0x1}], &(0x7f0000000100)='syzkaller\x00', 0x7fff, 0xef, &(0x7f0000000580)=""/239, 0x41100, 0x1c, [], r4, 0x0, r5, 0x8, &(0x7f00000007c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x8, 0xfff, 0x5}, 0x10, r7, r8}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[], 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000280), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000100)='memory.events\x00') write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000280), 0x12) openat$cgroup_ro(r4, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 301.939467][T17884] CPU: 0 PID: 17884 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 301.948740][T17884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.959267][T17884] Call Trace: [ 301.962601][T17884] dump_stack+0x197/0x210 [ 301.967971][T17884] should_fail.cold+0xa/0x15 [ 301.972590][T17884] ? fault_create_debugfs_attr+0x180/0x180 [ 301.978522][T17884] ? ___might_sleep+0x163/0x2c0 [ 301.978560][T17884] should_fail_alloc_page+0x50/0x60 [ 301.978575][T17884] __alloc_pages_nodemask+0x1a1/0x910 [ 301.978595][T17884] ? __alloc_pages_slowpath+0x2920/0x2920 [ 301.978626][T17884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.008340][T17884] ? find_next_bit+0x107/0x130 [ 302.013231][T17884] pcpu_populate_chunk+0xf8/0x940 [ 302.018394][T17884] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 302.024234][T17884] ? find_next_bit+0x107/0x130 [ 302.029082][T17884] pcpu_alloc+0xd5b/0x1380 [ 302.033876][T17884] ? pcpu_alloc_area+0x820/0x820 [ 302.038977][T17884] __alloc_percpu_gfp+0x28/0x30 [ 302.044993][T17884] array_map_alloc+0x698/0x7d0 [ 302.049788][T17884] ? array_of_map_free+0x50/0x50 [ 302.054951][T17884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.061911][T17884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.068624][T17884] ? array_of_map_free+0x50/0x50 [ 302.074579][T17884] __do_sys_bpf+0x478/0x3810 [ 302.079569][T17884] ? bpf_prog_load+0x18f0/0x18f0 [ 302.085486][T17884] ? __kasan_check_write+0x14/0x20 [ 302.090647][T17884] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 302.097989][T17884] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 302.103555][T17884] ? wait_for_completion+0x440/0x440 [ 302.108969][T17884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.115334][T17884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.120812][T17884] ? do_syscall_64+0x26/0x790 [ 302.125703][T17884] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.131911][T17884] ? do_syscall_64+0x26/0x790 [ 302.136620][T17884] __x64_sys_bpf+0x73/0xb0 00:23:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:28 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff}, 0x0) [ 302.141335][T17884] do_syscall_64+0xfa/0x790 [ 302.145874][T17884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.152303][T17884] RIP: 0033:0x45a919 [ 302.156203][T17884] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.156211][T17884] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:28 executing program 3 (fault-call:0 fault-nth:50): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 302.156224][T17884] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 302.156231][T17884] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 302.156239][T17884] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.156247][T17884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 302.156255][T17884] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="806d256d00027920"], 0xda00) write$cgroup_pid(r0, &(0x7f0000000480), 0xa) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB='L'], 0x1) close(r3) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) [ 302.363498][T17908] FAULT_INJECTION: forcing a failure. [ 302.363498][T17908] name failslab, interval 1, probability 0, space 0, times 0 [ 302.441098][T17908] CPU: 0 PID: 17908 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 302.450687][T17908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.461453][T17908] Call Trace: [ 302.464788][T17908] dump_stack+0x197/0x210 [ 302.469325][T17908] should_fail.cold+0xa/0x15 [ 302.473947][T17908] ? fault_create_debugfs_attr+0x180/0x180 [ 302.480096][T17908] ? ___might_sleep+0x163/0x2c0 [ 302.484990][T17908] __should_failslab+0x121/0x190 [ 302.490582][T17908] should_failslab+0x9/0x14 [ 302.496432][T17908] kmem_cache_alloc+0x2aa/0x710 [ 302.501312][T17908] ? memset+0x40/0x40 [ 302.505343][T17908] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 302.510566][T17908] pcpu_get_vm_areas+0x49e/0x3ee0 [ 302.515601][T17908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.521868][T17908] ? __vmalloc_node_range+0x4d7/0x810 [ 302.527560][T17908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.533830][T17908] pcpu_create_chunk+0x24e/0x7f0 [ 302.538888][T17908] pcpu_alloc+0x10f3/0x1380 [ 302.543428][T17908] ? pcpu_alloc_area+0x820/0x820 [ 302.548402][T17908] __alloc_percpu_gfp+0x28/0x30 [ 302.553266][T17908] array_map_alloc+0x698/0x7d0 [ 302.553289][T17908] ? array_of_map_free+0x50/0x50 [ 302.553311][T17908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.571226][T17908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.577480][T17908] ? array_of_map_free+0x50/0x50 [ 302.577500][T17908] __do_sys_bpf+0x478/0x3810 [ 302.577520][T17908] ? bpf_prog_load+0x18f0/0x18f0 00:23:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:23:28 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000100), 0x21e) socketpair(0x1e, 0x80805, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x6f) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdef}, 0x0) [ 302.577535][T17908] ? __kasan_check_write+0x14/0x20 [ 302.577557][T17908] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 302.597119][T17908] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 302.597142][T17908] ? wait_for_completion+0x440/0x440 [ 302.597166][T17908] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.597193][T17908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.597212][T17908] ? do_syscall_64+0x26/0x790 [ 302.608441][T17908] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.608458][T17908] ? do_syscall_64+0x26/0x790 [ 302.608483][T17908] __x64_sys_bpf+0x73/0xb0 [ 302.608500][T17908] do_syscall_64+0xfa/0x790 [ 302.608519][T17908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.608530][T17908] RIP: 0033:0x45a919 [ 302.608550][T17908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.620409][T17908] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 00:23:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0xb33}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920adda3d32a45194504a605bca387430bb605ff41ef1000027fd4be7894322fb76f3db55bd8537e4bdae875aace181a109b7dac8c5749a27618ab344e0b4ce7ba9aa90ef9d3db897eb8cc15f0b9ad1194054388bd40ab5793b683d8de0f803a9d213a3d31738ae68aa0ad3e41c12d399669b4cd4bc8788c5e8f1c2bb57ef5409de3c6260627c1730fa5a96e5d4792f1697b91961feda574002c9b8bd8d58e14918edaccf28c36d8fe20c25e4c1bdc04a1d920a7be37eb67756c43c9e0f9daf7ef91845c8e8d09798bea8ee2c07ac7cb624fbf160467c49a7e499ba8c6560ccdcad83b3bc2cdf30fc1097118dc017606d0a9439d263124d340e6c8630280092af615699c60e18968b69cb6293398930f2"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 302.620424][T17908] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 302.620432][T17908] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 302.620440][T17908] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.620448][T17908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 302.620465][T17908] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 00:23:28 executing program 3 (fault-call:0 fault-nth:51): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 302.902950][T17926] FAULT_INJECTION: forcing a failure. [ 302.902950][T17926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 302.989369][T17926] CPU: 0 PID: 17926 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 302.998092][T17926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.008157][T17926] Call Trace: [ 303.008186][T17926] dump_stack+0x197/0x210 [ 303.008211][T17926] should_fail.cold+0xa/0x15 [ 303.008236][T17926] ? fault_create_debugfs_attr+0x180/0x180 [ 303.026344][T17926] ? ___might_sleep+0x163/0x2c0 [ 303.031489][T17926] should_fail_alloc_page+0x50/0x60 [ 303.036709][T17926] __alloc_pages_nodemask+0x1a1/0x910 [ 303.042107][T17926] ? find_held_lock+0x35/0x130 [ 303.047245][T17926] ? __alloc_pages_slowpath+0x2920/0x2920 [ 303.053016][T17926] ? lock_downgrade+0x920/0x920 [ 303.057901][T17926] ? rwlock_bug.part.0+0x90/0x90 [ 303.063807][T17926] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 303.063829][T17926] alloc_pages_current+0x107/0x210 [ 303.063851][T17926] __get_free_pages+0xc/0x40 [ 303.079908][T17926] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 303.085572][T17926] apply_to_page_range+0x445/0x700 [ 303.090705][T17926] ? memset+0x40/0x40 [ 303.094717][T17926] kasan_populate_vmalloc+0x68/0x90 [ 303.099945][T17926] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 303.105079][T17926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.111373][T17926] pcpu_create_chunk+0x24e/0x7f0 [ 303.116340][T17926] pcpu_alloc+0x10f3/0x1380 [ 303.120890][T17926] ? pcpu_alloc_area+0x820/0x820 [ 303.125867][T17926] __alloc_percpu_gfp+0x28/0x30 [ 303.130746][T17926] array_map_alloc+0x698/0x7d0 [ 303.135639][T17926] ? array_of_map_free+0x50/0x50 [ 303.140607][T17926] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.146872][T17926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.153141][T17926] ? array_of_map_free+0x50/0x50 [ 303.158107][T17926] __do_sys_bpf+0x478/0x3810 [ 303.162758][T17926] ? bpf_prog_load+0x18f0/0x18f0 [ 303.168680][T17926] ? __kasan_check_write+0x14/0x20 [ 303.173821][T17926] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 303.179385][T17926] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 303.184811][T17926] ? wait_for_completion+0x440/0x440 [ 303.190133][T17926] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.196412][T17926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.201903][T17926] ? do_syscall_64+0x26/0x790 [ 303.206633][T17926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.212743][T17926] ? do_syscall_64+0x26/0x790 [ 303.217456][T17926] __x64_sys_bpf+0x73/0xb0 [ 303.221907][T17926] do_syscall_64+0xfa/0x790 [ 303.226435][T17926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.232800][T17926] RIP: 0033:0x45a919 [ 303.236708][T17926] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.236716][T17926] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 303.236729][T17926] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 303.236736][T17926] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 303.236744][T17926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 303.236752][T17926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 303.236760][T17926] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 303.282368][T17926] ================================================================== [ 303.313582][T17926] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 303.321141][T17926] Write of size 32768 at addr ffffe8ffff400000 by task syz-executor.3/17926 [ 303.329821][T17926] [ 303.332174][T17926] CPU: 0 PID: 17926 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 303.340854][T17926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.351058][T17926] Call Trace: [ 303.354557][T17926] dump_stack+0x197/0x210 [ 303.358900][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.364028][T17926] print_address_description.constprop.0.cold+0x5/0x30b [ 303.370951][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.375550][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.380141][T17926] __kasan_report.cold+0x1b/0x41 [ 303.385307][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.390016][T17926] kasan_report+0x12/0x20 [ 303.394894][T17926] check_memory_region+0x134/0x1a0 [ 303.400122][T17926] memset+0x24/0x40 [ 303.403967][T17926] pcpu_alloc+0x589/0x1380 [ 303.408420][T17926] ? pcpu_alloc_area+0x820/0x820 [ 303.413409][T17926] __alloc_percpu_gfp+0x28/0x30 [ 303.418307][T17926] array_map_alloc+0x698/0x7d0 [ 303.423579][T17926] ? array_of_map_free+0x50/0x50 [ 303.428551][T17926] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.434834][T17926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.441127][T17926] ? array_of_map_free+0x50/0x50 [ 303.446091][T17926] __do_sys_bpf+0x478/0x3810 [ 303.450712][T17926] ? bpf_prog_load+0x18f0/0x18f0 [ 303.455705][T17926] ? __kasan_check_write+0x14/0x20 [ 303.460853][T17926] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 303.466542][T17926] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 303.471860][T17926] ? wait_for_completion+0x440/0x440 [ 303.477199][T17926] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.483478][T17926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.489065][T17926] ? do_syscall_64+0x26/0x790 [ 303.493765][T17926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.499846][T17926] ? do_syscall_64+0x26/0x790 [ 303.504539][T17926] __x64_sys_bpf+0x73/0xb0 [ 303.504556][T17926] do_syscall_64+0xfa/0x790 [ 303.504579][T17926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.519376][T17926] RIP: 0033:0x45a919 [ 303.523295][T17926] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.542919][T17926] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 303.551349][T17926] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 303.559338][T17926] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 303.567445][T17926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 303.575459][T17926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 303.583456][T17926] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 303.591463][T17926] [ 303.593806][T17926] [ 303.596142][T17926] Memory state around the buggy address: [ 303.601811][T17926] BUG: unable to handle page fault for address: fffff91fffe7ffe0 [ 303.609538][T17926] #PF: supervisor read access in kernel mode [ 303.615638][T17926] #PF: error_code(0x0000) - not-present page [ 303.621624][T17926] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 303.629274][T17926] Oops: 0000 [#1] PREEMPT SMP KASAN [ 303.634767][T17926] CPU: 0 PID: 17926 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 303.643900][T17926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.653996][T17926] RIP: 0010:memcpy_erms+0x6/0x10 [ 303.659467][T17926] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 303.679761][T17926] RSP: 0018:ffffc90008437990 EFLAGS: 00010082 [ 303.684067][ T4086] kobject: 'loop4' (00000000efc48e52): kobject_uevent_env [ 303.685874][T17926] RAX: ffffc9000843799c RBX: fffff91fffe7ffe0 RCX: 0000000000000010 [ 303.685882][T17926] RDX: 0000000000000010 RSI: fffff91fffe7ffe0 RDI: ffffc9000843799c [ 303.685890][T17926] RBP: ffffc900084379f0 R08: ffff88809475c1c0 R09: fffff52001086f38 [ 303.685897][T17926] R10: fffff52001086f37 R11: ffffc900084379be R12: fffff91fffe80000 [ 303.685913][T17926] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 303.719287][ T4086] kobject: 'loop4' (00000000efc48e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 303.726135][T17926] FS: 00007f135f88c700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 303.726143][T17926] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 303.726151][T17926] CR2: fffff91fffe7ffe0 CR3: 000000009844a000 CR4: 00000000001406f0 [ 303.726161][T17926] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 303.726169][T17926] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 303.726174][T17926] Call Trace: [ 303.726194][T17926] ? print_shadow_for_address+0x91/0x117 [ 303.726212][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.777810][ T4086] kobject: 'loop2' (000000009a92ef8b): kobject_uevent_env [ 303.785668][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.785683][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.785707][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.820568][T17926] __kasan_report.cold+0x30/0x41 [ 303.825910][T17926] ? pcpu_alloc+0x589/0x1380 [ 303.830707][T17926] kasan_report+0x12/0x20 [ 303.835061][T17926] check_memory_region+0x134/0x1a0 [ 303.840373][T17926] memset+0x24/0x40 [ 303.844287][T17926] pcpu_alloc+0x589/0x1380 [ 303.848722][T17926] ? pcpu_alloc_area+0x820/0x820 [ 303.853950][T17926] __alloc_percpu_gfp+0x28/0x30 [ 303.858818][T17926] array_map_alloc+0x698/0x7d0 [ 303.859370][ T4086] kobject: 'loop2' (000000009a92ef8b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 303.863749][T17926] ? array_of_map_free+0x50/0x50 [ 303.863769][T17926] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.863784][T17926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.863795][T17926] ? array_of_map_free+0x50/0x50 [ 303.863816][T17926] __do_sys_bpf+0x478/0x3810 [ 303.903506][T17926] ? bpf_prog_load+0x18f0/0x18f0 [ 303.908725][T17926] ? __kasan_check_write+0x14/0x20 [ 303.914901][T17926] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 303.920682][T17926] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 303.926001][T17926] ? wait_for_completion+0x440/0x440 [ 303.932045][T17926] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.938427][ T4086] kobject: 'loop0' (00000000d5bdc4c0): kobject_uevent_env [ 303.938483][T17926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.951304][T17926] ? do_syscall_64+0x26/0x790 [ 303.956356][T17926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.962536][T17926] ? do_syscall_64+0x26/0x790 [ 303.967234][T17926] __x64_sys_bpf+0x73/0xb0 [ 303.971674][T17926] do_syscall_64+0xfa/0x790 [ 303.974668][ T4086] kobject: 'loop0' (00000000d5bdc4c0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 303.976193][T17926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.976204][T17926] RIP: 0033:0x45a919 [ 303.976219][T17926] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.976226][T17926] RSP: 002b:00007f135f88bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 304.028512][T17926] RAX: ffffffffffffffda RBX: 00007f135f88bc90 RCX: 000000000045a919 [ 304.036585][T17926] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 304.047097][T17926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.055343][T17926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f135f88c6d4 [ 304.058280][ T4086] kobject: 'loop4' (00000000efc48e52): kobject_uevent_env [ 304.063329][T17926] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 304.063343][T17926] Modules linked in: [ 304.063355][T17926] CR2: fffff91fffe7ffe0 [ 304.063372][T17926] ---[ end trace 7a435dbc7dbd7baf ]--- [ 304.092471][T17926] RIP: 0010:memcpy_erms+0x6/0x10 [ 304.097529][T17926] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 304.117147][T17926] RSP: 0018:ffffc90008437990 EFLAGS: 00010082 [ 304.123233][T17926] RAX: ffffc9000843799c RBX: fffff91fffe7ffe0 RCX: 0000000000000010 [ 304.131216][T17926] RDX: 0000000000000010 RSI: fffff91fffe7ffe0 RDI: ffffc9000843799c [ 304.137995][ T4086] kobject: 'loop4' (00000000efc48e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 304.139367][T17926] RBP: ffffc900084379f0 R08: ffff88809475c1c0 R09: fffff52001086f38 [ 304.139376][T17926] R10: fffff52001086f37 R11: ffffc900084379be R12: fffff91fffe80000 [ 304.139384][T17926] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 304.139397][T17926] FS: 00007f135f88c700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 304.139406][T17926] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 304.139413][T17926] CR2: fffff91fffe7ffe0 CR3: 000000009844a000 CR4: 00000000001406f0 [ 304.139429][T17926] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 304.187530][ T4086] kobject: 'loop0' (00000000d5bdc4c0): kobject_uevent_env [ 304.190560][T17926] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 304.190570][T17926] Kernel panic - not syncing: Fatal exception [ 304.199856][T17926] Kernel Offset: disabled [ 304.234350][T17926] Rebooting in 86400 seconds..