x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:04 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00@\x00\xa0\xff\xff\xff\xff\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 589.469268][ T3043] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 589.477255][ T3043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 589.485329][ T3043] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 589.503531][ T3044] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:04 executing program 0 (fault-call:1 fault-nth:1): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 589.594455][ T3044] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:04 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0512000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:04 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 589.760589][ T3071] FAULT_INJECTION: forcing a failure. [ 589.760589][ T3071] name failslab, interval 1, probability 0, space 0, times 0 [ 589.836681][ T3071] CPU: 1 PID: 3071 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 589.845343][ T3071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.855449][ T3071] Call Trace: [ 589.858768][ T3071] dump_stack+0x197/0x210 [ 589.863127][ T3071] should_fail.cold+0xa/0x15 [ 589.867786][ T3071] ? fault_create_debugfs_attr+0x180/0x180 [ 589.873640][ T3071] ? ___might_sleep+0x163/0x2c0 [ 589.878525][ T3071] __should_failslab+0x121/0x190 04:26:04 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 589.883495][ T3071] should_failslab+0x9/0x14 [ 589.888097][ T3071] kmem_cache_alloc_node_trace+0x274/0x750 [ 589.894036][ T3071] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 589.899627][ T3071] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 589.905819][ T3071] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 589.911677][ T3071] __kmalloc_node+0x3d/0x70 [ 589.916235][ T3071] __bpf_map_area_alloc+0xbd/0xf0 [ 589.921290][ T3071] bpf_map_area_alloc+0x20/0x30 [ 589.926173][ T3071] htab_map_alloc+0x589/0x11c0 [ 589.930985][ T3071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:26:05 executing program 5: r0 = perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x8001}}, 0x0, 0x0, r0, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r4, 0xb, 0xffffffffffffffff, 0x1) r5 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000440)={0xc, 0x2}, 0x0, 0x0, &(0x7f0000000480)={0x0, 0xe, 0x7fff, 0xffffffff}, &(0x7f00000004c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0xc}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='(\']@\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r4, 0x0, 0x3, &(0x7f0000000400)='\\{\x00', r6}, 0x30) close(r2) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r7, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000300)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f') r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000240)={'yam0\x00', @local}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r9) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x8, 0x3, 0x1, 0xf6}, r10, 0xb, 0xffffffffffffffff, 0x1) r11 = openat$cgroup_ro(r8, &(0x7f0000000840)='cpuset.memory_pressure\x00', 0x0, 0x0) r12 = openat$cgroup_type(r11, &(0x7f0000000180)='c\x00', 0x2, 0x0) write$cgroup_type(r12, &(0x7f00000003c0)='threaded\x00', 0xfffffffffffffdda) ioctl$TUNSETSNDBUF(r9, 0x400454d4, &(0x7f0000000200)=0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:05 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 589.937258][ T3071] ? htab_map_update_elem+0xca0/0xca0 [ 589.942705][ T3071] __do_sys_bpf+0x478/0x3810 [ 589.947355][ T3071] ? bpf_prog_load+0x18f0/0x18f0 [ 589.952332][ T3071] ? __kasan_check_write+0x14/0x20 [ 589.957475][ T3071] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 589.963035][ T3071] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 589.968433][ T3071] ? wait_for_completion+0x440/0x440 [ 589.973756][ T3071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 589.980207][ T3071] ? trace_hardirqs_on_thunk+0x1a/0x1c 04:26:05 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 589.985781][ T3071] ? do_syscall_64+0x26/0x790 [ 589.990575][ T3071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 589.996762][ T3071] ? do_syscall_64+0x26/0x790 [ 590.001819][ T3071] __x64_sys_bpf+0x73/0xb0 [ 590.006352][ T3071] do_syscall_64+0xfa/0x790 [ 590.010888][ T3071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 590.016798][ T3071] RIP: 0033:0x45a6f9 [ 590.020978][ T3071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 590.041548][ T3071] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 590.050057][ T3071] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 590.058669][ T3071] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 590.066646][ T3071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 590.074633][ T3071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 590.082597][ T3071] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 590.104224][ T3078] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 590.121619][ T3078] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:05 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0612000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:05 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:05 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\xa0\x00@\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 590.316625][ T3101] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 590.335169][ T3101] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:05 executing program 0 (fault-call:1 fault-nth:2): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r2, 0x6, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg(r3, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="a61d28c097619a6bc67c82af5c8db25ae6bf73af74c7ddcff4fcb1326dae9e5c51d891601f5ed16769658a19cb0e42ee0a25418d5baa4000a622248f6a273bbbd01e012b00fa00f0228d0cb60dc8545883624ce538fb3a9b34e1ba36aa", 0x5d}, {&(0x7f0000000300)="9a2f14115b2d778f8003a0f43f81c8163da9", 0x12}], 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x478}, 0x2) close(r3) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0xff, 0x43, 0x1, 0x0, 0x0, 0x100, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0xffffffffffffff97, 0x2}, 0x8, 0x8, 0x7, 0x1, 0x8, 0x401, 0x5}, r2, 0xe, r3, 0x2) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:05 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0712000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:05 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:05 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 590.552222][ T3114] FAULT_INJECTION: forcing a failure. [ 590.552222][ T3114] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 590.565486][ T3114] CPU: 1 PID: 3114 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 590.574111][ T3114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.584181][ T3114] Call Trace: [ 590.587497][ T3114] dump_stack+0x197/0x210 [ 590.591884][ T3114] should_fail.cold+0xa/0x15 [ 590.596502][ T3114] ? fault_create_debugfs_attr+0x180/0x180 [ 590.602340][ T3114] ? __kasan_check_read+0x11/0x20 [ 590.606316][ T3119] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 590.607378][ T3114] ? __lock_acquire+0x16f2/0x4a00 [ 590.607398][ T3114] ? kmem_cache_alloc_trace+0x158/0x790 [ 590.607422][ T3114] should_fail_alloc_page+0x50/0x60 [ 590.632026][ T3114] __alloc_pages_nodemask+0x1a1/0x910 [ 590.634779][ T3119] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 590.637419][ T3114] ? fs_reclaim_release+0xf/0x30 04:26:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0a12000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 590.637436][ T3114] ? __alloc_pages_slowpath+0x2920/0x2920 [ 590.637448][ T3114] ? fs_reclaim_release+0xf/0x30 [ 590.637473][ T3114] ? fault_create_debugfs_attr+0x180/0x180 [ 590.668232][ T3114] cache_grow_begin+0x90/0xc60 [ 590.673028][ T3114] ? __kmalloc_node+0x3d/0x70 [ 590.677725][ T3114] ? trace_hardirqs_off+0x62/0x240 [ 590.682954][ T3114] kmem_cache_alloc_node_trace+0x689/0x750 [ 590.685939][ T3121] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0e12000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 590.688801][ T3114] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 590.688817][ T3114] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 590.688844][ T3114] __kmalloc_node+0x3d/0x70 [ 590.697075][ T3121] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 590.703500][ T3114] __bpf_map_area_alloc+0xbd/0xf0 [ 590.703519][ T3114] bpf_map_area_alloc+0x20/0x30 [ 590.703535][ T3114] htab_map_alloc+0x589/0x11c0 [ 590.703559][ T3114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 590.703573][ T3114] ? htab_map_update_elem+0xca0/0xca0 04:26:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0f12000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 590.703593][ T3114] __do_sys_bpf+0x478/0x3810 [ 590.756028][ T3114] ? bpf_prog_load+0x18f0/0x18f0 [ 590.756311][ T3123] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 590.760992][ T3114] ? __kasan_check_write+0x14/0x20 [ 590.761010][ T3114] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 590.761027][ T3114] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 590.761042][ T3114] ? wait_for_completion+0x440/0x440 [ 590.761063][ T3114] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 04:26:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc4812000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 590.761089][ T3114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 590.803750][ T3114] ? do_syscall_64+0x26/0x790 [ 590.808456][ T3114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 590.815241][ T3114] ? do_syscall_64+0x26/0x790 [ 590.819973][ T3114] __x64_sys_bpf+0x73/0xb0 [ 590.824413][ T3114] do_syscall_64+0xfa/0x790 [ 590.828941][ T3114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 590.834848][ T3114] RIP: 0033:0x45a6f9 04:26:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc4c12000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 590.839022][ T3114] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 590.858644][ T3114] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 590.867817][ T3114] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 590.877026][ T3114] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 590.886142][ T3114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 590.894130][ T3114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 04:26:06 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 590.902206][ T3114] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:06 executing program 0 (fault-call:1 fault-nth:3): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 591.155144][ T3144] FAULT_INJECTION: forcing a failure. [ 591.155144][ T3144] name failslab, interval 1, probability 0, space 0, times 0 [ 591.186285][ T3144] CPU: 0 PID: 3144 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 591.194934][ T3144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.205121][ T3144] Call Trace: [ 591.208470][ T3144] dump_stack+0x197/0x210 [ 591.212814][ T3144] should_fail.cold+0xa/0x15 [ 591.217408][ T3144] ? fault_create_debugfs_attr+0x180/0x180 [ 591.223220][ T3144] ? ___might_sleep+0x163/0x2c0 [ 591.228109][ T3144] __should_failslab+0x121/0x190 [ 591.233056][ T3144] should_failslab+0x9/0x14 [ 591.237561][ T3144] kmem_cache_alloc_node_trace+0x274/0x750 [ 591.243398][ T3144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 591.249668][ T3144] ? debug_smp_processor_id+0x33/0x18a [ 591.255132][ T3144] __get_vm_area_node+0x12b/0x4f0 [ 591.260162][ T3144] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 591.265720][ T3144] __vmalloc_node_range+0xd4/0x810 [ 591.270832][ T3144] ? bpf_map_area_alloc+0x20/0x30 [ 591.275906][ T3144] ? kasan_unpoison_shadow+0x35/0x50 [ 591.281197][ T3144] ? bpf_map_area_alloc+0x20/0x30 [ 591.286230][ T3144] __vmalloc_node_flags_caller+0x71/0x90 [ 591.291872][ T3144] ? bpf_map_area_alloc+0x20/0x30 [ 591.296906][ T3144] __bpf_map_area_alloc+0xde/0xf0 [ 591.301936][ T3144] bpf_map_area_alloc+0x20/0x30 [ 591.306787][ T3144] htab_map_alloc+0x8d3/0x11c0 [ 591.311677][ T3144] ? htab_map_update_elem+0xca0/0xca0 [ 591.317047][ T3144] __do_sys_bpf+0x478/0x3810 [ 591.321639][ T3144] ? bpf_prog_load+0x18f0/0x18f0 [ 591.326688][ T3144] ? __kasan_check_write+0x14/0x20 [ 591.332182][ T3144] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 591.337799][ T3144] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 591.343396][ T3144] ? wait_for_completion+0x440/0x440 [ 591.348701][ T3144] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 591.355302][ T3144] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 591.360869][ T3144] ? do_syscall_64+0x26/0x790 [ 591.365537][ T3144] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 591.371596][ T3144] ? do_syscall_64+0x26/0x790 [ 591.376297][ T3144] __x64_sys_bpf+0x73/0xb0 [ 591.380707][ T3144] do_syscall_64+0xfa/0x790 [ 591.385222][ T3144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 591.391129][ T3144] RIP: 0033:0x45a6f9 [ 591.395016][ T3144] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 591.414752][ T3144] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 591.425228][ T3144] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 591.433296][ T3144] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 591.444166][ T3144] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x70, 0x81, 0x3f, 0x3, 0x2, 0x0, 0x5, 0x901, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x157, 0x3, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa020, 0x5, 0x2, 0x1, 0x5, 0x32e8, 0x5b47}, r0, 0x6, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:06 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:06 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc6012000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:06 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 591.452146][ T3144] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 591.460121][ T3144] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:06 executing program 0 (fault-call:1 fault-nth:4): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc6812000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:06 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 591.660867][ T3162] FAULT_INJECTION: forcing a failure. [ 591.660867][ T3162] name failslab, interval 1, probability 0, space 0, times 0 [ 591.701175][ T3162] CPU: 0 PID: 3162 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 591.709827][ T3162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.720000][ T3162] Call Trace: [ 591.723301][ T3162] dump_stack+0x197/0x210 [ 591.723325][ T3162] should_fail.cold+0xa/0x15 [ 591.723340][ T3162] ? htab_map_alloc+0x8d3/0x11c0 [ 591.723358][ T3162] ? fault_create_debugfs_attr+0x180/0x180 [ 591.723377][ T3162] ? ___might_sleep+0x163/0x2c0 [ 591.723395][ T3162] __should_failslab+0x121/0x190 [ 591.723411][ T3162] should_failslab+0x9/0x14 [ 591.723424][ T3162] kmem_cache_alloc_node+0x268/0x740 [ 591.723434][ T3162] ? ___might_sleep+0x163/0x2c0 [ 591.723455][ T3162] alloc_vmap_area+0x147/0x2030 [ 591.723473][ T3162] ? __get_vm_area_node+0x12b/0x4f0 [ 591.777661][ T3162] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 591.783496][ T3162] ? purge_vmap_area_lazy+0x40/0x40 [ 591.788723][ T3162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 591.794982][ T3162] ? debug_smp_processor_id+0x33/0x18a [ 591.800487][ T3162] __get_vm_area_node+0x179/0x4f0 [ 591.805534][ T3162] __vmalloc_node_range+0xd4/0x810 [ 591.810644][ T3162] ? bpf_map_area_alloc+0x20/0x30 [ 591.815685][ T3162] ? kasan_unpoison_shadow+0x35/0x50 [ 591.820997][ T3162] ? bpf_map_area_alloc+0x20/0x30 [ 591.826133][ T3162] __vmalloc_node_flags_caller+0x71/0x90 [ 591.831790][ T3162] ? bpf_map_area_alloc+0x20/0x30 [ 591.836836][ T3162] __bpf_map_area_alloc+0xde/0xf0 [ 591.841903][ T3162] bpf_map_area_alloc+0x20/0x30 [ 591.846780][ T3162] htab_map_alloc+0x8d3/0x11c0 [ 591.851672][ T3162] ? htab_map_update_elem+0xca0/0xca0 [ 591.857098][ T3162] __do_sys_bpf+0x478/0x3810 [ 591.861716][ T3162] ? bpf_prog_load+0x18f0/0x18f0 [ 591.866680][ T3162] ? __kasan_check_write+0x14/0x20 [ 591.871814][ T3162] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 591.877387][ T3162] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 591.882690][ T3162] ? wait_for_completion+0x440/0x440 [ 591.888002][ T3162] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 591.894276][ T3162] ? trace_hardirqs_on_thunk+0x1a/0x1c 04:26:06 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:06 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:07 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00@\x00\xa0\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 591.899858][ T3162] ? do_syscall_64+0x26/0x790 [ 591.904555][ T3162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 591.905107][ T3176] validate_nla: 5 callbacks suppressed [ 591.905116][ T3176] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 591.910642][ T3162] ? do_syscall_64+0x26/0x790 [ 591.910665][ T3162] __x64_sys_bpf+0x73/0xb0 [ 591.910683][ T3162] do_syscall_64+0xfa/0x790 [ 591.910703][ T3162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 591.910713][ T3162] RIP: 0033:0x45a6f9 [ 591.910727][ T3162] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 591.910734][ T3162] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 591.910747][ T3162] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 591.910755][ T3162] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 591.910762][ T3162] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:07 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 591.910769][ T3162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 591.910778][ T3162] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:07 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0xfffffffffffffffd}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x14, 0x0, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:07 executing program 0 (fault-call:1 fault-nth:5): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc6c12000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 592.119564][ T3186] FAULT_INJECTION: forcing a failure. [ 592.119564][ T3186] name failslab, interval 1, probability 0, space 0, times 0 [ 592.178864][ T3191] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 592.195268][ T3186] CPU: 0 PID: 3186 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 592.203914][ T3186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.213988][ T3186] Call Trace: [ 592.217299][ T3186] dump_stack+0x197/0x210 [ 592.221665][ T3186] should_fail.cold+0xa/0x15 [ 592.226287][ T3186] ? fault_create_debugfs_attr+0x180/0x180 [ 592.232905][ T3186] ? ___might_sleep+0x163/0x2c0 [ 592.237794][ T3186] __should_failslab+0x121/0x190 [ 592.242765][ T3186] should_failslab+0x9/0x14 [ 592.247303][ T3186] kmem_cache_alloc_node_trace+0x274/0x750 [ 592.253130][ T3186] ? do_raw_spin_unlock+0x178/0x270 [ 592.258336][ T3186] __kmalloc_node+0x3d/0x70 [ 592.262857][ T3186] __vmalloc_node_range+0x1db/0x810 [ 592.268082][ T3186] ? bpf_map_area_alloc+0x20/0x30 [ 592.273113][ T3186] __vmalloc_node_flags_caller+0x71/0x90 [ 592.278760][ T3186] ? bpf_map_area_alloc+0x20/0x30 [ 592.283794][ T3186] __bpf_map_area_alloc+0xde/0xf0 [ 592.288837][ T3186] bpf_map_area_alloc+0x20/0x30 [ 592.293705][ T3186] htab_map_alloc+0x8d3/0x11c0 [ 592.298505][ T3186] ? htab_map_update_elem+0xca0/0xca0 [ 592.303893][ T3186] __do_sys_bpf+0x478/0x3810 [ 592.308511][ T3186] ? bpf_prog_load+0x18f0/0x18f0 [ 592.313480][ T3186] ? __kasan_check_write+0x14/0x20 [ 592.318615][ T3186] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 592.324200][ T3186] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 592.329507][ T3186] ? wait_for_completion+0x440/0x440 [ 592.334813][ T3186] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 592.341083][ T3186] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 592.346555][ T3186] ? do_syscall_64+0x26/0x790 [ 592.351267][ T3186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.357446][ T3186] ? do_syscall_64+0x26/0x790 [ 592.362162][ T3186] __x64_sys_bpf+0x73/0xb0 [ 592.366604][ T3186] do_syscall_64+0xfa/0x790 [ 592.371132][ T3186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.377035][ T3186] RIP: 0033:0x45a6f9 [ 592.380934][ T3186] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 592.380943][ T3186] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 592.380956][ T3186] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 592.380963][ T3186] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:07 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\xff\xff\xff\xff\xa0\x00@\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:07 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:07 executing program 0 (fault-call:1 fault-nth:6): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc7412000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:07 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:07 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 592.380970][ T3186] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 592.380976][ T3186] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 592.380983][ T3186] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:07 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 592.533062][ T3202] FAULT_INJECTION: forcing a failure. [ 592.533062][ T3202] name failslab, interval 1, probability 0, space 0, times 0 [ 592.595559][ T3214] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 592.640969][ T3202] CPU: 0 PID: 3202 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 592.649796][ T3202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.659862][ T3202] Call Trace: [ 592.663173][ T3202] dump_stack+0x197/0x210 [ 592.667543][ T3202] should_fail.cold+0xa/0x15 [ 592.672266][ T3202] ? fault_create_debugfs_attr+0x180/0x180 [ 592.678098][ T3202] ? ___might_sleep+0x163/0x2c0 [ 592.682974][ T3202] __should_failslab+0x121/0x190 [ 592.688426][ T3202] should_failslab+0x9/0x14 [ 592.693020][ T3202] kmem_cache_alloc_node_trace+0x274/0x750 [ 592.699006][ T3202] ? do_raw_spin_unlock+0x178/0x270 [ 592.704290][ T3202] __kmalloc_node+0x3d/0x70 [ 592.708822][ T3202] __vmalloc_node_range+0x1db/0x810 [ 592.714052][ T3202] ? bpf_map_area_alloc+0x20/0x30 [ 592.719102][ T3202] __vmalloc_node_flags_caller+0x71/0x90 [ 592.724750][ T3202] ? bpf_map_area_alloc+0x20/0x30 [ 592.729815][ T3202] __bpf_map_area_alloc+0xde/0xf0 [ 592.734842][ T3202] bpf_map_area_alloc+0x20/0x30 [ 592.739779][ T3202] htab_map_alloc+0x8d3/0x11c0 [ 592.744540][ T3202] ? htab_map_update_elem+0xca0/0xca0 [ 592.749898][ T3202] __do_sys_bpf+0x478/0x3810 [ 592.754507][ T3202] ? bpf_prog_load+0x18f0/0x18f0 [ 592.759543][ T3202] ? __kasan_check_write+0x14/0x20 [ 592.764752][ T3202] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 592.770503][ T3202] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 592.775810][ T3202] ? wait_for_completion+0x440/0x440 [ 592.781189][ T3202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 592.787572][ T3202] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 592.793061][ T3202] ? do_syscall_64+0x26/0x790 [ 592.798185][ T3202] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.804436][ T3202] ? do_syscall_64+0x26/0x790 [ 592.809123][ T3202] __x64_sys_bpf+0x73/0xb0 [ 592.813628][ T3202] do_syscall_64+0xfa/0x790 [ 592.818143][ T3202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.824021][ T3202] RIP: 0033:0x45a6f9 [ 592.827900][ T3202] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 592.847578][ T3202] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 592.855977][ T3202] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 592.864076][ T3202] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 592.872049][ T3202] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 592.880032][ T3202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 04:26:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc7a12000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:07 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 592.887994][ T3202] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf63000000000000570600000fff07006706000002000000070600000ee60000bf05000000000000bd350200000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000b02dec303fb7b13041d5441f4f63f74abaa01642c41da5d63b65dbeb7cd18d138b2dc4a8e95512ed5cfb3cb57639e9ba36d537a98b0736d91f7aadf472fb45c0cfe377044a5f7406d9c9c2f4f1809e5ea1ce6f1aa1dadf83a92717067d05661111009134c1389892a33d1f4825a69e2e02ad758404e36f1dcb7859cb34e6655b7e0597e10445b9f38157e53881b4689b9461833cf158eef0a5a1a29d8f7f0f20af71a1590090b59ca731f5001e96384df7142c35b0f14efd6e5bc3ce91b1a4cdceff1e6c7d309bbfcf4e8a4f645027479f373e220039ae2a24b3f166735b6c35991e1d6524ce7afe119c9fe0030ddedcfd91f141c4564584020000000000000093b9bd14e78f53c36944e1022c9373ab95e0308e9780c496a38610259fb6b9d20f49b34d74cbd77bad65dd62da587b8a990ed1699346db7feb68ee090e1bb710e30254f313b2e27f56db2cf6ba51ac8c77844f3079f877e39e6cfeca9c9875f4601c7a91ff91ecd84b29dc478304ac7ab03f039f3fa3f795dc35eb244e68e512cd9493d87fb57eae756b2da2e89b51bee9a94d325a2e856d08765b5416250cc413fd93"], &(0x7f0000000100)='GPL\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:08 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:08 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:08 executing program 0 (fault-call:1 fault-nth:7): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 593.058216][ T3229] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 593.083056][ T3233] FAULT_INJECTION: forcing a failure. [ 593.083056][ T3233] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 593.129579][ T3229] __nla_validate_parse: 7 callbacks suppressed [ 593.129589][ T3229] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 593.152140][ T3233] CPU: 0 PID: 3233 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 593.160809][ T3233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.170884][ T3233] Call Trace: [ 593.174197][ T3233] dump_stack+0x197/0x210 [ 593.178534][ T3233] should_fail.cold+0xa/0x15 [ 593.183139][ T3233] ? fault_create_debugfs_attr+0x180/0x180 [ 593.188942][ T3233] ? ___might_sleep+0x163/0x2c0 [ 593.193803][ T3233] should_fail_alloc_page+0x50/0x60 [ 593.199266][ T3233] __alloc_pages_nodemask+0x1a1/0x910 [ 593.204664][ T3233] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 593.210306][ T3233] ? __alloc_pages_slowpath+0x2920/0x2920 [ 593.216041][ T3233] ? kasan_unpoison_shadow+0x35/0x50 [ 593.221346][ T3233] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 593.228346][ T3233] alloc_pages_current+0x107/0x210 [ 593.233479][ T3233] __vmalloc_node_range+0x4f8/0x810 [ 593.238689][ T3233] ? bpf_map_area_alloc+0x20/0x30 [ 593.243705][ T3233] __vmalloc_node_flags_caller+0x71/0x90 [ 593.249328][ T3233] ? bpf_map_area_alloc+0x20/0x30 [ 593.254349][ T3233] __bpf_map_area_alloc+0xde/0xf0 [ 593.259383][ T3233] bpf_map_area_alloc+0x20/0x30 [ 593.264232][ T3233] htab_map_alloc+0x8d3/0x11c0 [ 593.269092][ T3233] ? htab_map_update_elem+0xca0/0xca0 [ 593.274473][ T3233] __do_sys_bpf+0x478/0x3810 [ 593.279061][ T3233] ? bpf_prog_load+0x18f0/0x18f0 [ 593.284000][ T3233] ? __kasan_check_write+0x14/0x20 [ 593.289371][ T3233] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 593.294913][ T3233] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 593.300310][ T3233] ? wait_for_completion+0x440/0x440 [ 593.305688][ T3233] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 593.312657][ T3233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 593.318108][ T3233] ? do_syscall_64+0x26/0x790 [ 593.322792][ T3233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 593.328856][ T3233] ? do_syscall_64+0x26/0x790 [ 593.333547][ T3233] __x64_sys_bpf+0x73/0xb0 [ 593.337959][ T3233] do_syscall_64+0xfa/0x790 [ 593.342510][ T3233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 593.348428][ T3233] RIP: 0033:0x45a6f9 [ 593.352323][ T3233] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:26:08 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:08 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 593.376019][ T3233] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 593.384432][ T3233] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 593.392407][ T3233] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 593.400385][ T3233] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 593.408356][ T3233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 593.416317][ T3233] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0040000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:08 executing program 0 (fault-call:1 fault-nth:8): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:08 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:08 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00@\x00\xa0\xff\xff\xff\xff\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 593.599769][ T3247] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_pid(r1, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:08 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 593.712174][ T3247] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 593.739260][ T3254] FAULT_INJECTION: forcing a failure. [ 593.739260][ T3254] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 593.818696][ T3254] CPU: 1 PID: 3254 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 593.827344][ T3254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.837420][ T3254] Call Trace: [ 593.840728][ T3254] dump_stack+0x197/0x210 [ 593.845077][ T3254] should_fail.cold+0xa/0x15 [ 593.849680][ T3254] ? fault_create_debugfs_attr+0x180/0x180 [ 593.855522][ T3254] ? ___might_sleep+0x163/0x2c0 [ 593.860382][ T3254] should_fail_alloc_page+0x50/0x60 [ 593.865573][ T3254] __alloc_pages_nodemask+0x1a1/0x910 [ 593.870947][ T3254] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 593.876497][ T3254] ? __alloc_pages_slowpath+0x2920/0x2920 [ 593.882225][ T3254] ? kasan_unpoison_shadow+0x35/0x50 [ 593.887506][ T3254] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 593.893741][ T3254] alloc_pages_current+0x107/0x210 [ 593.899190][ T3254] ? ___might_sleep+0x163/0x2c0 [ 593.904034][ T3254] __vmalloc_node_range+0x4f8/0x810 [ 593.909235][ T3254] ? bpf_map_area_alloc+0x20/0x30 [ 593.914260][ T3254] __vmalloc_node_flags_caller+0x71/0x90 [ 593.919909][ T3254] ? bpf_map_area_alloc+0x20/0x30 [ 593.924933][ T3254] __bpf_map_area_alloc+0xde/0xf0 [ 593.929951][ T3254] bpf_map_area_alloc+0x20/0x30 [ 593.934800][ T3254] htab_map_alloc+0x8d3/0x11c0 [ 593.939572][ T3254] ? htab_map_update_elem+0xca0/0xca0 [ 593.944935][ T3254] __do_sys_bpf+0x478/0x3810 [ 593.949523][ T3254] ? bpf_prog_load+0x18f0/0x18f0 [ 593.954462][ T3254] ? __kasan_check_write+0x14/0x20 [ 593.959562][ T3254] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 593.965099][ T3254] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 593.970563][ T3254] ? wait_for_completion+0x440/0x440 [ 593.975849][ T3254] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 593.982121][ T3254] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 593.987595][ T3254] ? do_syscall_64+0x26/0x790 [ 593.992274][ T3254] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 593.998339][ T3254] ? do_syscall_64+0x26/0x790 [ 594.003029][ T3254] __x64_sys_bpf+0x73/0xb0 [ 594.007443][ T3254] do_syscall_64+0xfa/0x790 [ 594.011949][ T3254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 594.017829][ T3254] RIP: 0033:0x45a6f9 [ 594.021715][ T3254] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 594.041332][ T3254] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 594.049757][ T3254] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 594.057741][ T3254] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc005a000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 594.065726][ T3254] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 594.073967][ T3254] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 594.081947][ T3254] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:09 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 594.180530][ T3271] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:09 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 594.225299][ T3271] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x9, 0x0, 0xc2, 0x1f, 0x0, 0x8001, 0x80a10, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0x4}, 0x100c0, 0x1f, 0x5, 0x6, 0x3, 0x1, 0xb8}, 0x0, 0xd, 0xffffffffffffffff, 0x5) 04:26:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0068000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:09 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:09 executing program 0 (fault-call:1 fault-nth:9): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:09 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 594.498566][ T3292] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 594.516995][ T3292] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 594.527807][ T3296] FAULT_INJECTION: forcing a failure. [ 594.527807][ T3296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 594.548441][ T3296] CPU: 1 PID: 3296 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 594.557107][ T3296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.567356][ T3296] Call Trace: [ 594.567389][ T3296] dump_stack+0x197/0x210 [ 594.567412][ T3296] should_fail.cold+0xa/0x15 [ 594.567433][ T3296] ? fault_create_debugfs_attr+0x180/0x180 [ 594.567448][ T3296] ? ___might_sleep+0x163/0x2c0 [ 594.567478][ T3296] should_fail_alloc_page+0x50/0x60 [ 594.595736][ T3296] __alloc_pages_nodemask+0x1a1/0x910 [ 594.601143][ T3296] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 594.606724][ T3296] ? __alloc_pages_slowpath+0x2920/0x2920 [ 594.612561][ T3296] ? kasan_unpoison_shadow+0x35/0x50 [ 594.618062][ T3296] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 594.624334][ T3296] alloc_pages_current+0x107/0x210 [ 594.629469][ T3296] ? ___might_sleep+0x163/0x2c0 [ 594.634346][ T3296] __vmalloc_node_range+0x4f8/0x810 [ 594.639594][ T3296] ? bpf_map_area_alloc+0x20/0x30 04:26:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 594.644639][ T3296] __vmalloc_node_flags_caller+0x71/0x90 [ 594.650388][ T3296] ? bpf_map_area_alloc+0x20/0x30 [ 594.655437][ T3296] __bpf_map_area_alloc+0xde/0xf0 [ 594.660488][ T3296] bpf_map_area_alloc+0x20/0x30 [ 594.665365][ T3296] htab_map_alloc+0x8d3/0x11c0 [ 594.670173][ T3296] ? htab_map_update_elem+0xca0/0xca0 [ 594.675591][ T3296] __do_sys_bpf+0x478/0x3810 [ 594.680218][ T3296] ? bpf_prog_load+0x18f0/0x18f0 [ 594.685183][ T3296] ? __kasan_check_write+0x14/0x20 [ 594.685200][ T3296] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 594.685214][ T3296] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 594.685233][ T3296] ? wait_for_completion+0x440/0x440 [ 594.701272][ T3296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 594.701300][ T3296] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 594.701313][ T3296] ? do_syscall_64+0x26/0x790 [ 594.701328][ T3296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 594.701338][ T3296] ? do_syscall_64+0x26/0x790 [ 594.701362][ T3296] __x64_sys_bpf+0x73/0xb0 [ 594.738302][ T3296] do_syscall_64+0xfa/0x790 [ 594.742833][ T3296] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:26:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\xa0\x00@\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 594.748742][ T3296] RIP: 0033:0x45a6f9 [ 594.752649][ T3296] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 594.773051][ T3296] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 594.781478][ T3296] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 594.789470][ T3296] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc03b6000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 594.789487][ T3296] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 594.805524][ T3296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 594.813521][ T3296] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:09 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 594.889074][ T3319] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 594.897515][ T3319] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:10 executing program 0 (fault-call:1 fault-nth:10): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f') r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:10 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc005a000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 595.118656][ T3334] FAULT_INJECTION: forcing a failure. [ 595.118656][ T3334] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:10 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 595.186496][ T3344] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 595.195361][ T3334] CPU: 1 PID: 3334 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 595.196184][ T3344] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 595.203983][ T3334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.203992][ T3334] Call Trace: [ 595.204018][ T3334] dump_stack+0x197/0x210 [ 595.204042][ T3334] should_fail.cold+0xa/0x15 04:26:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0068000b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 595.204063][ T3334] ? fault_create_debugfs_attr+0x180/0x180 [ 595.204076][ T3334] ? ___might_sleep+0x163/0x2c0 [ 595.204104][ T3334] should_fail_alloc_page+0x50/0x60 [ 595.252562][ T3334] __alloc_pages_nodemask+0x1a1/0x910 [ 595.257959][ T3334] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 595.263530][ T3334] ? __alloc_pages_slowpath+0x2920/0x2920 [ 595.269291][ T3334] ? kasan_unpoison_shadow+0x35/0x50 [ 595.274601][ T3334] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 595.280870][ T3334] alloc_pages_current+0x107/0x210 04:26:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 595.286022][ T3334] ? ___might_sleep+0x163/0x2c0 [ 595.289326][ T3350] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 595.290918][ T3334] __vmalloc_node_range+0x4f8/0x810 [ 595.290944][ T3334] ? bpf_map_area_alloc+0x20/0x30 [ 595.290958][ T3334] __vmalloc_node_flags_caller+0x71/0x90 [ 595.290980][ T3334] ? bpf_map_area_alloc+0x20/0x30 [ 595.302130][ T3350] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 595.304237][ T3334] __bpf_map_area_alloc+0xde/0xf0 04:26:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00b6030b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 595.304255][ T3334] bpf_map_area_alloc+0x20/0x30 [ 595.304275][ T3334] htab_map_alloc+0x8d3/0x11c0 [ 595.344338][ T3334] ? htab_map_update_elem+0xca0/0xca0 [ 595.350432][ T3334] __do_sys_bpf+0x478/0x3810 [ 595.355051][ T3334] ? bpf_prog_load+0x18f0/0x18f0 [ 595.360006][ T3334] ? __kasan_check_write+0x14/0x20 [ 595.365162][ T3334] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 595.370729][ T3334] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 595.376041][ T3334] ? wait_for_completion+0x440/0x440 [ 595.381356][ T3334] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 04:26:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 595.387623][ T3334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 595.393107][ T3334] ? do_syscall_64+0x26/0x790 [ 595.397805][ T3334] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.399860][ T3355] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 595.403895][ T3334] ? do_syscall_64+0x26/0x790 [ 595.403918][ T3334] __x64_sys_bpf+0x73/0xb0 [ 595.403935][ T3334] do_syscall_64+0xfa/0x790 [ 595.403954][ T3334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.403973][ T3334] RIP: 0033:0x45a6f9 04:26:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012020b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00@\x00\xa0\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 595.436983][ T3334] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 595.456607][ T3334] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 595.465328][ T3334] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 595.473315][ T3334] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 595.481421][ T3334] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 595.489406][ T3334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 595.497480][ T3334] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 595.546461][ T3364] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:10 executing program 0 (fault-call:1 fault-nth:11): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:10 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:10 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4588, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8000, 0x3, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg(r3, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000007380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007500)=[{&(0x7f0000007400)=""/193, 0x35}], 0x1, &(0x7f0000007540)=""/217, 0xfffffffffffffd3d}, 0x3) r7 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r7, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) recvmsg(r7, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c000), 0x100000000000019b}, 0x1) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(r9, 0x0, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000540)={'\x00\x00\x001\xefcc\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x1000}) ioctl$SIOCSIFHWADDR(r10, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r10, @ANYRESOCT=r6, @ANYRES16=0x0]], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r8, 0x0, r9, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, &(0x7f000000c180)={0x4, 0x7, 0x0, 0x9}, 0x10}, 0x70) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r11) write$cgroup_type(r11, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r13 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r12, 0xb, 0xffffffffffffffff, 0x1) close(r13) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x1ffffffffffffc97, &(0x7f0000000780)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYRES16=r11, @ANYRES32=r1, @ANYRES32=r3, @ANYRES64], @ANYRESOCT, @ANYRES16, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES64, @ANYRES16], @ANYBLOB="5e7b608efa89b538db28d39863ff4826a75669945c", @ANYRESDEC=r13], &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x8, [], r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xe, 0xfff, 0x7fff}, 0x10}, 0x78) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000007680)=r8) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000000c0)=r8) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r14, 0xb, 0xffffffffffffffff, 0x1) r15 = perf_event_open$cgroup(&(0x7f0000000580)={0x4, 0x70, 0x6, 0x2, 0xd9, 0x11, 0x0, 0x5, 0x10000, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000400), 0x8}, 0x100, 0x6, 0xfffffff7, 0x7, 0x1, 0xd80, 0x7fff}, r14, 0xffffffffffffffff, r5, 0x9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r15, 0x4008240b, &(0x7f0000000600)={0x2, 0x70, 0x80, 0x7, 0xff, 0x7f, 0x0, 0x9761, 0x40000, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc3a2238a1d62cd4, @perf_config_ext={0x8, 0x7fe5}, 0x1, 0x4, 0x3dde, 0xc, 0xfffffffffffffa0d, 0x2, 0xf801}) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012030b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:10 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 595.804799][ T3386] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:10 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\xff\xff\xff\xff\xa0\x00@\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:10 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012040b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 595.882537][ T3396] FAULT_INJECTION: forcing a failure. [ 595.882537][ T3396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 595.947103][ T3396] CPU: 1 PID: 3396 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 595.955757][ T3396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.966336][ T3396] Call Trace: [ 595.966364][ T3396] dump_stack+0x197/0x210 [ 595.966389][ T3396] should_fail.cold+0xa/0x15 [ 595.966409][ T3396] ? fault_create_debugfs_attr+0x180/0x180 [ 595.966426][ T3396] ? ___might_sleep+0x163/0x2c0 [ 595.966457][ T3396] should_fail_alloc_page+0x50/0x60 [ 595.994649][ T3396] __alloc_pages_nodemask+0x1a1/0x910 [ 596.000044][ T3396] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 596.005622][ T3396] ? __alloc_pages_slowpath+0x2920/0x2920 [ 596.011400][ T3396] ? kasan_unpoison_shadow+0x35/0x50 [ 596.016713][ T3396] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 596.022988][ T3396] alloc_pages_current+0x107/0x210 [ 596.028124][ T3396] ? ___might_sleep+0x163/0x2c0 [ 596.033007][ T3396] __vmalloc_node_range+0x4f8/0x810 [ 596.038242][ T3396] ? bpf_map_area_alloc+0x20/0x30 [ 596.043285][ T3396] __vmalloc_node_flags_caller+0x71/0x90 [ 596.049038][ T3396] ? bpf_map_area_alloc+0x20/0x30 [ 596.054088][ T3396] __bpf_map_area_alloc+0xde/0xf0 [ 596.059141][ T3396] bpf_map_area_alloc+0x20/0x30 [ 596.064029][ T3396] htab_map_alloc+0x8d3/0x11c0 [ 596.068840][ T3396] ? htab_map_update_elem+0xca0/0xca0 [ 596.074238][ T3396] __do_sys_bpf+0x478/0x3810 [ 596.078872][ T3396] ? bpf_prog_load+0x18f0/0x18f0 [ 596.083835][ T3396] ? __kasan_check_write+0x14/0x20 [ 596.088989][ T3396] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 596.094581][ T3396] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 596.099903][ T3396] ? wait_for_completion+0x440/0x440 [ 596.105222][ T3396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 596.111523][ T3396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 596.117014][ T3396] ? do_syscall_64+0x26/0x790 [ 596.122325][ T3396] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 596.128404][ T3396] ? do_syscall_64+0x26/0x790 [ 596.133095][ T3396] __x64_sys_bpf+0x73/0xb0 [ 596.133112][ T3396] do_syscall_64+0xfa/0x790 [ 596.133133][ T3396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 596.133148][ T3396] RIP: 0033:0x45a6f9 [ 596.152317][ T3396] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 596.171934][ T3396] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 596.180363][ T3396] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 596.188354][ T3396] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:11 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012050b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:11 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 596.196352][ T3396] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 596.204342][ T3396] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 596.212332][ T3396] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:11 executing program 0 (fault-call:1 fault-nth:12): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012060b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r2, 0x6, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x3, 0xe0, 0x0, 0x0, 0x1f, 0x4000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x19b8, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x23208, 0x4, 0xfff, 0x6, 0x40, 0x51ca, 0x5e}, 0x0, 0xc, r1, 0x1) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x5, 0x2, 0x3f, 0x3, 0x0, 0x5, 0x1000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xac, 0x0, @perf_config_ext={0x8001, 0x8}, 0x2, 0xfffffffffffffffc, 0x7, 0x0, 0x8d, 0x2, 0xfffe}, r2, 0x8, r3, 0x12) 04:26:11 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:11 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 596.447798][ T3437] FAULT_INJECTION: forcing a failure. [ 596.447798][ T3437] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 596.516825][ T3437] CPU: 1 PID: 3437 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 596.525500][ T3437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.535583][ T3437] Call Trace: [ 596.538907][ T3437] dump_stack+0x197/0x210 [ 596.543261][ T3437] should_fail.cold+0xa/0x15 [ 596.547869][ T3437] ? fault_create_debugfs_attr+0x180/0x180 [ 596.553685][ T3437] ? ___might_sleep+0x163/0x2c0 [ 596.558558][ T3437] should_fail_alloc_page+0x50/0x60 [ 596.563752][ T3437] __alloc_pages_nodemask+0x1a1/0x910 [ 596.569120][ T3437] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 596.574762][ T3437] ? __alloc_pages_slowpath+0x2920/0x2920 [ 596.580480][ T3437] ? kasan_unpoison_shadow+0x35/0x50 [ 596.585771][ T3437] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 596.592102][ T3437] alloc_pages_current+0x107/0x210 [ 596.597213][ T3437] ? ___might_sleep+0x163/0x2c0 [ 596.602062][ T3437] __vmalloc_node_range+0x4f8/0x810 [ 596.607279][ T3437] ? bpf_map_area_alloc+0x20/0x30 [ 596.612293][ T3437] __vmalloc_node_flags_caller+0x71/0x90 [ 596.617923][ T3437] ? bpf_map_area_alloc+0x20/0x30 [ 596.622940][ T3437] __bpf_map_area_alloc+0xde/0xf0 [ 596.627962][ T3437] bpf_map_area_alloc+0x20/0x30 [ 596.632804][ T3437] htab_map_alloc+0x8d3/0x11c0 [ 596.637580][ T3437] ? htab_map_update_elem+0xca0/0xca0 [ 596.642957][ T3437] __do_sys_bpf+0x478/0x3810 [ 596.647550][ T3437] ? bpf_prog_load+0x18f0/0x18f0 [ 596.652478][ T3437] ? __kasan_check_write+0x14/0x20 [ 596.657667][ T3437] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 596.663212][ T3437] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 596.668489][ T3437] ? wait_for_completion+0x440/0x440 [ 596.673775][ T3437] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 596.680021][ T3437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 596.685467][ T3437] ? do_syscall_64+0x26/0x790 [ 596.690139][ T3437] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 596.696205][ T3437] ? do_syscall_64+0x26/0x790 [ 596.700886][ T3437] __x64_sys_bpf+0x73/0xb0 [ 596.705292][ T3437] do_syscall_64+0xfa/0x790 [ 596.709788][ T3437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 596.715673][ T3437] RIP: 0033:0x45a6f9 [ 596.719566][ T3437] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 596.739193][ T3437] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 596.747602][ T3437] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 596.755567][ T3437] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012070b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:11 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 596.763524][ T3437] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 596.771488][ T3437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 596.779447][ T3437] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:11 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00120a0b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:12 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:12 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:12 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:12 executing program 0 (fault-call:1 fault-nth:13): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 597.083185][ T3471] validate_nla: 7 callbacks suppressed [ 597.083194][ T3471] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:12 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00@\x00\xa0\xff\xff\xff\xff\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f') 04:26:12 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00120e0b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:12 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 597.289271][ T3485] FAULT_INJECTION: forcing a failure. [ 597.289271][ T3485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 597.385534][ T3500] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 597.390130][ T3485] CPU: 1 PID: 3485 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 597.402271][ T3485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.412352][ T3485] Call Trace: [ 597.415673][ T3485] dump_stack+0x197/0x210 [ 597.420038][ T3485] should_fail.cold+0xa/0x15 [ 597.424663][ T3485] ? fault_create_debugfs_attr+0x180/0x180 [ 597.430498][ T3485] ? ___might_sleep+0x163/0x2c0 [ 597.435410][ T3485] should_fail_alloc_page+0x50/0x60 [ 597.440628][ T3485] __alloc_pages_nodemask+0x1a1/0x910 [ 597.440649][ T3485] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 597.451646][ T3485] ? __alloc_pages_slowpath+0x2920/0x2920 [ 597.457383][ T3485] ? kasan_unpoison_shadow+0x35/0x50 [ 597.457400][ T3485] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 597.457421][ T3485] alloc_pages_current+0x107/0x210 [ 597.474137][ T3485] ? ___might_sleep+0x163/0x2c0 [ 597.479016][ T3485] __vmalloc_node_range+0x4f8/0x810 [ 597.484243][ T3485] ? bpf_map_area_alloc+0x20/0x30 [ 597.490413][ T3485] __vmalloc_node_flags_caller+0x71/0x90 [ 597.496069][ T3485] ? bpf_map_area_alloc+0x20/0x30 [ 597.501118][ T3485] __bpf_map_area_alloc+0xde/0xf0 [ 597.506170][ T3485] bpf_map_area_alloc+0x20/0x30 [ 597.506188][ T3485] htab_map_alloc+0x8d3/0x11c0 [ 597.506217][ T3485] ? htab_map_update_elem+0xca0/0xca0 [ 597.521296][ T3485] __do_sys_bpf+0x478/0x3810 [ 597.525912][ T3485] ? bpf_prog_load+0x18f0/0x18f0 [ 597.530869][ T3485] ? __kasan_check_write+0x14/0x20 [ 597.535998][ T3485] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 597.541575][ T3485] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 597.541595][ T3485] ? wait_for_completion+0x440/0x440 [ 597.541621][ T3485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 597.541651][ T3485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 597.541670][ T3485] ? do_syscall_64+0x26/0x790 [ 597.568797][ T3485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.574892][ T3485] ? do_syscall_64+0x26/0x790 [ 597.579604][ T3485] __x64_sys_bpf+0x73/0xb0 [ 597.584050][ T3485] do_syscall_64+0xfa/0x790 [ 597.588683][ T3485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.591632][ T3511] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 597.594671][ T3485] RIP: 0033:0x45a6f9 [ 597.594688][ T3485] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 597.594697][ T3485] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 04:26:12 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00120f0b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:12 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012480b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 597.594711][ T3485] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 597.594726][ T3485] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 597.634976][ T3485] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 597.658931][ T3485] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 597.666902][ T3485] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:12 executing program 0 (fault-call:1 fault-nth:14): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:12 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:12 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:12 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 597.839088][ T3523] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 597.862210][ T3526] FAULT_INJECTION: forcing a failure. [ 597.862210][ T3526] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:13 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 597.959566][ T3526] CPU: 0 PID: 3526 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 597.968297][ T3526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.978629][ T3526] Call Trace: [ 597.982155][ T3526] dump_stack+0x197/0x210 [ 597.986514][ T3526] should_fail.cold+0xa/0x15 [ 597.991145][ T3526] ? fault_create_debugfs_attr+0x180/0x180 [ 597.996973][ T3526] ? ___might_sleep+0x163/0x2c0 [ 598.001859][ T3526] should_fail_alloc_page+0x50/0x60 04:26:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00124c0b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 598.007079][ T3526] __alloc_pages_nodemask+0x1a1/0x910 [ 598.012564][ T3526] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 598.018155][ T3526] ? __alloc_pages_slowpath+0x2920/0x2920 [ 598.024162][ T3526] ? kasan_unpoison_shadow+0x35/0x50 [ 598.029473][ T3526] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 598.035751][ T3526] alloc_pages_current+0x107/0x210 [ 598.042282][ T3526] ? ___might_sleep+0x163/0x2c0 [ 598.047164][ T3526] __vmalloc_node_range+0x4f8/0x810 [ 598.055788][ T3526] ? bpf_map_area_alloc+0x20/0x30 [ 598.060840][ T3526] __vmalloc_node_flags_caller+0x71/0x90 [ 598.066761][ T3526] ? bpf_map_area_alloc+0x20/0x30 [ 598.071848][ T3526] __bpf_map_area_alloc+0xde/0xf0 [ 598.076887][ T3526] bpf_map_area_alloc+0x20/0x30 [ 598.079738][ T3539] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 598.082703][ T3526] htab_map_alloc+0x8d3/0x11c0 [ 598.082732][ T3526] ? htab_map_update_elem+0xca0/0xca0 [ 598.082747][ T3526] __do_sys_bpf+0x478/0x3810 [ 598.082766][ T3526] ? bpf_prog_load+0x18f0/0x18f0 04:26:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012600b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 598.082779][ T3526] ? __kasan_check_write+0x14/0x20 [ 598.082794][ T3526] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 598.082808][ T3526] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 598.082824][ T3526] ? wait_for_completion+0x440/0x440 [ 598.082848][ T3526] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 598.138299][ T3526] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 598.143863][ T3526] ? do_syscall_64+0x26/0x790 [ 598.148555][ T3526] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.154732][ T3526] ? do_syscall_64+0x26/0x790 04:26:13 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\xa0\x00@\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 598.159433][ T3526] __x64_sys_bpf+0x73/0xb0 [ 598.161513][ T3544] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 598.163880][ T3526] do_syscall_64+0xfa/0x790 [ 598.163903][ T3526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.163921][ T3526] RIP: 0033:0x45a6f9 [ 598.183415][ T3544] __nla_validate_parse: 9 callbacks suppressed [ 598.183423][ T3544] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012680b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 598.186257][ T3526] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 598.186267][ T3526] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 598.186282][ T3526] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 598.186290][ T3526] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 598.186297][ T3526] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 598.186311][ T3526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 598.261945][ T3526] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 598.319924][ T3556] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:13 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:13 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 598.374797][ T3556] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:13 executing program 0 (fault-call:1 fault-nth:15): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:13 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) gettid() 04:26:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00126c0b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 598.595009][ T3581] FAULT_INJECTION: forcing a failure. [ 598.595009][ T3581] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 598.609224][ T3581] CPU: 1 PID: 3581 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 598.617937][ T3581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.628178][ T3581] Call Trace: [ 598.631489][ T3581] dump_stack+0x197/0x210 [ 598.635923][ T3581] should_fail.cold+0xa/0x15 [ 598.640536][ T3581] ? fault_create_debugfs_attr+0x180/0x180 [ 598.646361][ T3581] ? ___might_sleep+0x163/0x2c0 [ 598.651243][ T3581] should_fail_alloc_page+0x50/0x60 [ 598.656462][ T3581] __alloc_pages_nodemask+0x1a1/0x910 [ 598.664813][ T3581] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 598.670382][ T3581] ? __alloc_pages_slowpath+0x2920/0x2920 [ 598.677520][ T3581] ? kasan_unpoison_shadow+0x35/0x50 [ 598.682853][ T3581] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 598.689098][ T3581] alloc_pages_current+0x107/0x210 [ 598.694374][ T3581] ? ___might_sleep+0x163/0x2c0 [ 598.699216][ T3581] __vmalloc_node_range+0x4f8/0x810 [ 598.704454][ T3581] ? bpf_map_area_alloc+0x20/0x30 [ 598.709475][ T3581] __vmalloc_node_flags_caller+0x71/0x90 [ 598.715108][ T3581] ? bpf_map_area_alloc+0x20/0x30 [ 598.720125][ T3581] __bpf_map_area_alloc+0xde/0xf0 [ 598.725144][ T3581] bpf_map_area_alloc+0x20/0x30 [ 598.729995][ T3581] htab_map_alloc+0x8d3/0x11c0 [ 598.734768][ T3581] ? htab_map_update_elem+0xca0/0xca0 [ 598.740304][ T3581] __do_sys_bpf+0x478/0x3810 [ 598.744889][ T3581] ? bpf_prog_load+0x18f0/0x18f0 [ 598.749951][ T3581] ? __kasan_check_write+0x14/0x20 [ 598.755140][ T3581] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 598.760680][ T3581] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 598.765971][ T3581] ? wait_for_completion+0x440/0x440 [ 598.771254][ T3581] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 598.777503][ T3581] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 598.782962][ T3581] ? do_syscall_64+0x26/0x790 [ 598.787625][ T3581] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.793695][ T3581] ? do_syscall_64+0x26/0x790 [ 598.798369][ T3581] __x64_sys_bpf+0x73/0xb0 [ 598.802778][ T3581] do_syscall_64+0xfa/0x790 [ 598.807274][ T3581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.813155][ T3581] RIP: 0033:0x45a6f9 [ 598.817042][ T3581] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 598.839594][ T3581] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 598.848084][ T3581] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 598.856233][ T3581] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 598.864380][ T3581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 598.872429][ T3581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 598.880427][ T3581] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:13 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 598.889444][ T3584] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:14 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:14 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 598.973321][ T3584] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012740b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:14 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:14 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:14 executing program 0 (fault-call:1 fault-nth:16): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:14 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 599.189623][ T3600] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 599.205251][ T3600] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 599.302077][ T3608] FAULT_INJECTION: forcing a failure. [ 599.302077][ T3608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 599.321129][ T3608] CPU: 1 PID: 3608 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 599.330221][ T3608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.340382][ T3608] Call Trace: [ 599.343700][ T3608] dump_stack+0x197/0x210 [ 599.348062][ T3608] should_fail.cold+0xa/0x15 [ 599.352687][ T3608] ? fault_create_debugfs_attr+0x180/0x180 [ 599.359062][ T3608] ? ___might_sleep+0x163/0x2c0 [ 599.364130][ T3608] should_fail_alloc_page+0x50/0x60 [ 599.369461][ T3608] __alloc_pages_nodemask+0x1a1/0x910 [ 599.374866][ T3608] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 599.380454][ T3608] ? __alloc_pages_slowpath+0x2920/0x2920 [ 599.386812][ T3608] ? kasan_unpoison_shadow+0x35/0x50 [ 599.386832][ T3608] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 599.386854][ T3608] alloc_pages_current+0x107/0x210 [ 599.386868][ T3608] ? ___might_sleep+0x163/0x2c0 [ 599.386895][ T3608] __vmalloc_node_range+0x4f8/0x810 [ 599.413769][ T3608] ? bpf_map_area_alloc+0x20/0x30 [ 599.418835][ T3608] __vmalloc_node_flags_caller+0x71/0x90 [ 599.424500][ T3608] ? bpf_map_area_alloc+0x20/0x30 [ 599.429547][ T3608] __bpf_map_area_alloc+0xde/0xf0 [ 599.434615][ T3608] bpf_map_area_alloc+0x20/0x30 [ 599.434634][ T3608] htab_map_alloc+0x8d3/0x11c0 [ 599.434671][ T3608] ? htab_map_update_elem+0xca0/0xca0 [ 599.434690][ T3608] __do_sys_bpf+0x478/0x3810 [ 599.434713][ T3608] ? bpf_prog_load+0x18f0/0x18f0 [ 599.455482][ T3615] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 599.459278][ T3608] ? __kasan_check_write+0x14/0x20 [ 599.459300][ T3608] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 599.459318][ T3608] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 599.459345][ T3608] ? wait_for_completion+0x440/0x440 [ 599.488825][ T3608] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 599.495199][ T3608] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 599.500685][ T3608] ? do_syscall_64+0x26/0x790 [ 599.505392][ T3608] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 599.511573][ T3608] ? do_syscall_64+0x26/0x790 [ 599.515500][ T3615] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 599.516273][ T3608] __x64_sys_bpf+0x73/0xb0 [ 599.531439][ T3608] do_syscall_64+0xfa/0x790 [ 599.536255][ T3608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 599.542263][ T3608] RIP: 0033:0x45a6f9 [ 599.546182][ T3608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 599.566418][ T3608] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 599.575298][ T3608] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 599.583395][ T3608] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 599.591388][ T3608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00127a0b140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:14 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 599.599387][ T3608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 599.607973][ T3608] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x0, 0xfc, 0x0, 0x14, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x4201, 0xfffffffffffffffd, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000300)="9a6ba6941e8e4bc0ccf1d8aa2445cd904b4e66aa54447692699638861c960448307abfc991ce89e968e1d74905243a92033a11a7d35b565cfd31777a02b39d185187b4827ff5f31e41bca5a9c476555f4d79d90be37a9fcc45dc3acb9947f2c5076fd1b81dffd11011ed72789ee3ecf45b7c4daa8401050f294158b1e5a3b46071e30d613c1c6539fdcbb7a31bf43ab4f76d68d6e6b738ab500dfa94ccab8aaaad0fa96580fdad0ab78d071aad8551184ffcd34ce87b46969787fe", &(0x7f00000003c0)="a328ab7bbfa969845dd39ff9d781c7fe731f3055a77fec25261151d80c1984f51c601a754aa20c71ba5ffa06f4a8c4faf000347ce219e09aedeabd30b7bb78d16a436a6b69a6dcdc92c72cde0a80736fb46e02d77748afa7bdab457dbcb53156827645b9b8579cfcf597aa8c9b33566461ab4c41fa1f4f28d81d6920bba5df220d4b977201678cb9f69e314c45acd846b3b16c1fd3fc9c9684fe9ca82ebc79a35898a2663efb1375f26b7b3d3efd65f5c05b5b2dd3", 0x8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:14 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00@\x00\xa0\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:14 executing program 0 (fault-call:1 fault-nth:17): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00120012140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:14 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:14 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 599.802591][ T3627] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 599.826857][ T3632] FAULT_INJECTION: forcing a failure. [ 599.826857][ T3632] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 599.862653][ T3632] CPU: 1 PID: 3632 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 599.871677][ T3632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.871688][ T3632] Call Trace: [ 599.871711][ T3632] dump_stack+0x197/0x210 [ 599.871734][ T3632] should_fail.cold+0xa/0x15 [ 599.871753][ T3632] ? fault_create_debugfs_attr+0x180/0x180 [ 599.871776][ T3632] ? ___might_sleep+0x163/0x2c0 [ 599.904731][ T3632] should_fail_alloc_page+0x50/0x60 [ 599.909936][ T3632] __alloc_pages_nodemask+0x1a1/0x910 [ 599.915317][ T3632] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 599.920870][ T3632] ? __alloc_pages_slowpath+0x2920/0x2920 [ 599.926592][ T3632] ? kasan_unpoison_shadow+0x35/0x50 [ 599.932492][ T3632] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 599.938994][ T3632] alloc_pages_current+0x107/0x210 [ 599.944256][ T3632] ? ___might_sleep+0x163/0x2c0 [ 599.949193][ T3632] __vmalloc_node_range+0x4f8/0x810 [ 599.954441][ T3632] ? bpf_map_area_alloc+0x20/0x30 [ 599.959575][ T3632] __vmalloc_node_flags_caller+0x71/0x90 [ 599.965335][ T3632] ? bpf_map_area_alloc+0x20/0x30 [ 599.970394][ T3632] __bpf_map_area_alloc+0xde/0xf0 [ 599.975612][ T3632] bpf_map_area_alloc+0x20/0x30 [ 599.980561][ T3632] htab_map_alloc+0x8d3/0x11c0 [ 599.985814][ T3632] ? htab_map_update_elem+0xca0/0xca0 [ 599.991390][ T3632] __do_sys_bpf+0x478/0x3810 [ 599.995986][ T3632] ? bpf_prog_load+0x18f0/0x18f0 [ 600.000959][ T3632] ? __kasan_check_write+0x14/0x20 [ 600.006071][ T3632] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 600.011906][ T3632] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 600.017237][ T3632] ? wait_for_completion+0x440/0x440 [ 600.022991][ T3632] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 600.029531][ T3632] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 600.034998][ T3632] ? do_syscall_64+0x26/0x790 [ 600.042106][ T3632] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.048483][ T3632] ? do_syscall_64+0x26/0x790 [ 600.053299][ T3632] __x64_sys_bpf+0x73/0xb0 [ 600.057734][ T3632] do_syscall_64+0xfa/0x790 [ 600.062330][ T3632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.068801][ T3632] RIP: 0033:0x45a6f9 [ 600.072700][ T3632] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 600.092711][ T3632] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 600.101140][ T3632] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:14 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00120040140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 600.109141][ T3632] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 600.117263][ T3632] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 600.125757][ T3632] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 600.133868][ T3632] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:15 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff'}, 0x12, 0x0}, 0x0) 04:26:15 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:15 executing program 0 (fault-call:1 fault-nth:18): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:15 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 600.286293][ T3645] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1000) 04:26:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012005a140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:15 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 600.444581][ T3656] FAULT_INJECTION: forcing a failure. [ 600.444581][ T3656] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 600.510846][ T3656] CPU: 0 PID: 3656 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 600.519788][ T3656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.530506][ T3656] Call Trace: [ 600.533917][ T3656] dump_stack+0x197/0x210 [ 600.533942][ T3656] should_fail.cold+0xa/0x15 [ 600.533962][ T3656] ? fault_create_debugfs_attr+0x180/0x180 [ 600.533977][ T3656] ? ___might_sleep+0x163/0x2c0 [ 600.533999][ T3656] should_fail_alloc_page+0x50/0x60 04:26:15 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:15 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 600.534013][ T3656] __alloc_pages_nodemask+0x1a1/0x910 [ 600.534029][ T3656] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 600.534044][ T3656] ? __alloc_pages_slowpath+0x2920/0x2920 [ 600.534064][ T3656] ? kasan_unpoison_shadow+0x35/0x50 [ 600.582494][ T3656] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 600.589163][ T3656] alloc_pages_current+0x107/0x210 [ 600.594564][ T3656] ? ___might_sleep+0x163/0x2c0 [ 600.599703][ T3656] __vmalloc_node_range+0x4f8/0x810 [ 600.605037][ T3656] ? bpf_map_area_alloc+0x20/0x30 [ 600.610201][ T3656] __vmalloc_node_flags_caller+0x71/0x90 [ 600.615851][ T3656] ? bpf_map_area_alloc+0x20/0x30 [ 600.615866][ T3656] __bpf_map_area_alloc+0xde/0xf0 [ 600.615883][ T3656] bpf_map_area_alloc+0x20/0x30 [ 600.615896][ T3656] htab_map_alloc+0x8d3/0x11c0 [ 600.615925][ T3656] ? htab_map_update_elem+0xca0/0xca0 [ 600.615940][ T3656] __do_sys_bpf+0x478/0x3810 [ 600.615959][ T3656] ? bpf_prog_load+0x18f0/0x18f0 [ 600.615973][ T3656] ? __kasan_check_write+0x14/0x20 [ 600.615989][ T3656] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 600.616004][ T3656] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 600.616026][ T3656] ? wait_for_completion+0x440/0x440 [ 600.676151][ T3656] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 600.682808][ T3656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 600.688563][ T3656] ? do_syscall_64+0x26/0x790 [ 600.694582][ T3656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.702275][ T3656] ? do_syscall_64+0x26/0x790 [ 600.707566][ T3656] __x64_sys_bpf+0x73/0xb0 [ 600.712345][ T3656] do_syscall_64+0xfa/0x790 [ 600.717264][ T3656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.723295][ T3656] RIP: 0033:0x45a6f9 [ 600.727191][ T3656] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 600.747368][ T3656] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 600.755874][ T3656] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 600.764291][ T3656] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 600.772410][ T3656] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 600.780599][ T3656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 600.789027][ T3656] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:15 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\xa0\x00@\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:16 executing program 0 (fault-call:1 fault-nth:19): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:16 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:16 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00120068140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 601.055596][ T3685] FAULT_INJECTION: forcing a failure. [ 601.055596][ T3685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 601.163898][ T3685] CPU: 0 PID: 3685 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 601.177885][ T3685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.188847][ T3685] Call Trace: [ 601.192347][ T3685] dump_stack+0x197/0x210 [ 601.198135][ T3685] should_fail.cold+0xa/0x15 [ 601.203124][ T3685] ? fault_create_debugfs_attr+0x180/0x180 04:26:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 601.212048][ T3685] ? ___might_sleep+0x163/0x2c0 [ 601.217297][ T3685] should_fail_alloc_page+0x50/0x60 [ 601.222659][ T3685] __alloc_pages_nodemask+0x1a1/0x910 [ 601.228948][ T3685] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 601.235157][ T3685] ? __alloc_pages_slowpath+0x2920/0x2920 [ 601.241049][ T3685] ? kasan_unpoison_shadow+0x35/0x50 [ 601.246594][ T3685] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 601.247760][ T3698] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 601.253300][ T3685] alloc_pages_current+0x107/0x210 [ 601.253315][ T3685] ? ___might_sleep+0x163/0x2c0 [ 601.253334][ T3685] __vmalloc_node_range+0x4f8/0x810 [ 601.253357][ T3685] ? bpf_map_area_alloc+0x20/0x30 [ 601.253371][ T3685] __vmalloc_node_flags_caller+0x71/0x90 [ 601.253384][ T3685] ? bpf_map_area_alloc+0x20/0x30 [ 601.253398][ T3685] __bpf_map_area_alloc+0xde/0xf0 [ 601.253414][ T3685] bpf_map_area_alloc+0x20/0x30 [ 601.253429][ T3685] htab_map_alloc+0x8d3/0x11c0 [ 601.253461][ T3685] ? htab_map_update_elem+0xca0/0xca0 [ 601.318920][ T3685] __do_sys_bpf+0x478/0x3810 [ 601.323660][ T3685] ? bpf_prog_load+0x18f0/0x18f0 [ 601.328692][ T3685] ? __kasan_check_write+0x14/0x20 [ 601.333808][ T3685] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 601.339691][ T3685] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 601.345091][ T3685] ? wait_for_completion+0x440/0x440 [ 601.351018][ T3685] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 601.357452][ T3685] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 601.362972][ T3685] ? do_syscall_64+0x26/0x790 [ 601.367951][ T3685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.374698][ T3685] ? do_syscall_64+0x26/0x790 [ 601.380017][ T3685] __x64_sys_bpf+0x73/0xb0 [ 601.384452][ T3685] do_syscall_64+0xfa/0x790 [ 601.389400][ T3685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.396473][ T3685] RIP: 0033:0x45a6f9 [ 601.400577][ T3685] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 601.422326][ T3685] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 601.431619][ T3685] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 601.440522][ T3685] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 601.450439][ T3685] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 601.459026][ T3685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 601.467370][ T3685] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:16 executing program 0 (fault-call:1 fault-nth:20): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc001203d0140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:16 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:16 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 601.659908][ T3709] FAULT_INJECTION: forcing a failure. [ 601.659908][ T3709] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 601.722154][ T3709] CPU: 1 PID: 3709 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 601.731333][ T3709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.742550][ T3709] Call Trace: [ 601.746951][ T3714] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 601.747552][ T3709] dump_stack+0x197/0x210 [ 601.747580][ T3709] should_fail.cold+0xa/0x15 [ 601.767734][ T3709] ? fault_create_debugfs_attr+0x180/0x180 [ 601.773845][ T3709] ? ___might_sleep+0x163/0x2c0 [ 601.779180][ T3709] should_fail_alloc_page+0x50/0x60 [ 601.785268][ T3709] __alloc_pages_nodemask+0x1a1/0x910 [ 601.790681][ T3709] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 601.797483][ T3709] ? __alloc_pages_slowpath+0x2920/0x2920 [ 601.803245][ T3709] ? kasan_unpoison_shadow+0x35/0x50 [ 601.808663][ T3709] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 601.815137][ T3709] alloc_pages_current+0x107/0x210 [ 601.820279][ T3709] ? ___might_sleep+0x163/0x2c0 [ 601.825349][ T3709] __vmalloc_node_range+0x4f8/0x810 [ 601.830909][ T3709] ? bpf_map_area_alloc+0x20/0x30 [ 601.836810][ T3709] __vmalloc_node_flags_caller+0x71/0x90 [ 601.842841][ T3709] ? bpf_map_area_alloc+0x20/0x30 [ 601.847897][ T3709] __bpf_map_area_alloc+0xde/0xf0 [ 601.853141][ T3709] bpf_map_area_alloc+0x20/0x30 [ 601.858019][ T3709] htab_map_alloc+0x8d3/0x11c0 [ 601.863203][ T3709] ? htab_map_update_elem+0xca0/0xca0 [ 601.868704][ T3709] __do_sys_bpf+0x478/0x3810 [ 601.873339][ T3709] ? bpf_prog_load+0x18f0/0x18f0 [ 601.878307][ T3709] ? __kasan_check_write+0x14/0x20 [ 601.883571][ T3709] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 601.889347][ T3709] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 601.893364][ T3723] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 601.894896][ T3709] ? wait_for_completion+0x440/0x440 [ 601.894922][ T3709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 601.894949][ T3709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 601.922434][ T3709] ? do_syscall_64+0x26/0x790 [ 601.931149][ T3709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.938523][ T3709] ? do_syscall_64+0x26/0x790 [ 601.943461][ T3709] __x64_sys_bpf+0x73/0xb0 [ 601.948308][ T3709] do_syscall_64+0xfa/0x790 [ 601.953006][ T3709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.959051][ T3709] RIP: 0033:0x45a6f9 [ 601.963396][ T3709] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 601.984103][ T3709] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 601.993367][ T3709] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 602.001699][ T3709] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 602.009757][ T3709] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00120012140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = openat$cgroup_ro(r1, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r4, 0xb, 0xffffffffffffffff, 0x1) close(r5) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000000c0)=r4) close(r5) [ 602.018424][ T3709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 602.026409][ T3709] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012005a140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:17 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00@\x00\xa0\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:17 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}, 0x12, 0x0}, 0x0) 04:26:17 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 602.245293][ T3736] validate_nla: 5 callbacks suppressed [ 602.245305][ T3736] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:17 executing program 0 (fault-call:1 fault-nth:21): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:17 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc00120068140c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 602.512738][ T3750] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 602.533774][ T3755] FAULT_INJECTION: forcing a failure. [ 602.533774][ T3755] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 602.583778][ T3755] CPU: 1 PID: 3755 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 602.592850][ T3755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.603402][ T3755] Call Trace: [ 602.606910][ T3755] dump_stack+0x197/0x210 [ 602.612498][ T3755] should_fail.cold+0xa/0x15 [ 602.617549][ T3755] ? fault_create_debugfs_attr+0x180/0x180 [ 602.624167][ T3755] ? ___might_sleep+0x163/0x2c0 [ 602.629648][ T3755] should_fail_alloc_page+0x50/0x60 [ 602.635236][ T3755] __alloc_pages_nodemask+0x1a1/0x910 [ 602.640646][ T3755] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 602.646322][ T3755] ? __alloc_pages_slowpath+0x2920/0x2920 [ 602.652094][ T3755] ? kasan_unpoison_shadow+0x35/0x50 [ 602.655412][ T3760] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 602.657406][ T3755] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 602.657426][ T3755] alloc_pages_current+0x107/0x210 [ 602.657446][ T3755] ? ___might_sleep+0x163/0x2c0 [ 602.683616][ T3755] __vmalloc_node_range+0x4f8/0x810 [ 602.689048][ T3755] ? bpf_map_area_alloc+0x20/0x30 [ 602.694105][ T3755] __vmalloc_node_flags_caller+0x71/0x90 [ 602.700370][ T3755] ? bpf_map_area_alloc+0x20/0x30 [ 602.705435][ T3755] __bpf_map_area_alloc+0xde/0xf0 [ 602.710585][ T3755] bpf_map_area_alloc+0x20/0x30 [ 602.715612][ T3755] htab_map_alloc+0x8d3/0x11c0 [ 602.720426][ T3755] ? htab_map_update_elem+0xca0/0xca0 [ 602.726126][ T3755] __do_sys_bpf+0x478/0x3810 [ 602.731112][ T3755] ? bpf_prog_load+0x18f0/0x18f0 [ 602.736259][ T3755] ? __kasan_check_write+0x14/0x20 [ 602.741567][ T3755] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 602.747958][ T3755] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 602.755987][ T3755] ? wait_for_completion+0x440/0x440 [ 602.761601][ T3755] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 602.765245][ T3765] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 602.769884][ T3755] ? trace_hardirqs_on_thunk+0x1a/0x1c 04:26:17 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b5a0c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:17 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b680c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 602.769901][ T3755] ? do_syscall_64+0x26/0x790 [ 602.769925][ T3755] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.795339][ T3755] ? do_syscall_64+0x26/0x790 [ 602.800163][ T3755] __x64_sys_bpf+0x73/0xb0 [ 602.804699][ T3755] do_syscall_64+0xfa/0x790 [ 602.809223][ T3755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.815306][ T3755] RIP: 0033:0x45a6f9 [ 602.815322][ T3755] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 602.815329][ T3755] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 602.815341][ T3755] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 602.815348][ T3755] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 602.815355][ T3755] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 602.815363][ T3755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 602.815370][ T3755] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) socket$kcm(0x29, 0x5, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r2 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r2, 0x6, 0xffffffffffffffff, 0x8) write$cgroup_pid(r1, &(0x7f00000000c0)=r2, 0x12) 04:26:18 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\xa0\x00@\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:18 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff'}, 0x12, 0x0}, 0x0) 04:26:18 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b6c0c000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:18 executing program 0 (fault-call:1 fault-nth:22): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 603.095104][ T3782] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 603.110843][ T3784] FAULT_INJECTION: forcing a failure. [ 603.110843][ T3784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:18 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:18 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 603.181144][ T3784] CPU: 0 PID: 3784 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 603.189938][ T3784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.200643][ T3784] Call Trace: [ 603.204235][ T3784] dump_stack+0x197/0x210 [ 603.208721][ T3784] should_fail.cold+0xa/0x15 [ 603.213685][ T3784] ? fault_create_debugfs_attr+0x180/0x180 [ 603.219929][ T3784] ? ___might_sleep+0x163/0x2c0 [ 603.225001][ T3784] should_fail_alloc_page+0x50/0x60 04:26:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b1403000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 603.230328][ T3784] __alloc_pages_nodemask+0x1a1/0x910 [ 603.236109][ T3784] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 603.241790][ T3784] ? __alloc_pages_slowpath+0x2920/0x2920 [ 603.247553][ T3784] ? kasan_unpoison_shadow+0x35/0x50 [ 603.253067][ T3784] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 603.259348][ T3784] alloc_pages_current+0x107/0x210 [ 603.264666][ T3784] ? ___might_sleep+0x163/0x2c0 [ 603.270082][ T3784] __vmalloc_node_range+0x4f8/0x810 [ 603.275405][ T3784] ? bpf_map_area_alloc+0x20/0x30 [ 603.275558][ T3794] __nla_validate_parse: 5 callbacks suppressed [ 603.275567][ T3794] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 603.280584][ T3784] __vmalloc_node_flags_caller+0x71/0x90 [ 603.280602][ T3784] ? bpf_map_area_alloc+0x20/0x30 [ 603.280618][ T3784] __bpf_map_area_alloc+0xde/0xf0 [ 603.280634][ T3784] bpf_map_area_alloc+0x20/0x30 [ 603.280658][ T3784] htab_map_alloc+0x8d3/0x11c0 [ 603.323617][ T3784] ? htab_map_update_elem+0xca0/0xca0 04:26:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b1407000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 603.329580][ T3784] __do_sys_bpf+0x478/0x3810 [ 603.334394][ T3784] ? bpf_prog_load+0x18f0/0x18f0 [ 603.339602][ T3784] ? __kasan_check_write+0x14/0x20 [ 603.344745][ T3784] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 603.350325][ T3784] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 603.355657][ T3784] ? wait_for_completion+0x440/0x440 [ 603.361092][ T3784] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 603.367552][ T3784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 603.373132][ T3784] ? do_syscall_64+0x26/0x790 04:26:18 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 603.377975][ T3784] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.384219][ T3784] ? do_syscall_64+0x26/0x790 [ 603.388941][ T3784] __x64_sys_bpf+0x73/0xb0 [ 603.393402][ T3784] do_syscall_64+0xfa/0x790 [ 603.398035][ T3784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.404461][ T3784] RIP: 0033:0x45a6f9 [ 603.408596][ T3784] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 603.411744][ T3800] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 603.428785][ T3784] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 603.428800][ T3784] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 603.428806][ T3784] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 603.428813][ T3784] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 603.428819][ T3784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 04:26:18 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 603.428826][ T3784] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f0000000c80)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xc7\x8fhBZ\xc4\xa7\x03jpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=H\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6\xfby\x81X\x9c\xcf];\xd8&\x7f\x9d\"A\x03s\xfa\x16l{\x9bx\x95\xac\x91x{\x06\xa7\x8ey\x10`6\t\x9c(?\x01\xf9\x8d\x8a\xab\xc0\x03C\xe4,\x98y\x82\xa4\x19\xb5\xc0\xcd\x93}\x11\xa9\xa7\x93W\xdc ,\xc4\x90!\xfag\xdf\xfb\xf8{\xa0T%\xe6w\x89\xadDg=F\xfd\tx*\v\x1f\xc7:?l\xe0\xb4\xeaj\xd8/\x0foXaS\xb8\xe9\xd8\x0e\xfc0\x84\x81\x7f3\x89OKqe\xc5\x89\xde\xa4\x84\x00\xa33\xdc\xa82G\xd8,u\x19\x8c\x90%v\"\xe1\x15\x00\xa1v\x8a!\r%\xb2\xb02?^\xc3\'\xa8\xf8\x12}\xbe\x9f^\x17\xb2\x19\xe2s\xd8\xf2\xaaWO^\xdd\xed\xa6\x84C\x05W\xe3=\xf8\x06\x15\xb7\xbex\xe6o\xbc*\x05\xcf\xd6\xfdz\xff\t6\xc9\xa9\xe0\xbc\xb1\xb7#)A+\xae\x90`\x00\x00\x95\xb9\xf8\xb0e\xa2\x85\\rfU\xc0\x13\xe6\xe2\xd2\xb8\xf1\xe1\xbc\xd4*\xe2\\\xa0#N\xba\xc2W\xfa\x99\xd6\xe8SW\xd5\xdf\x8d\fJ\xe6\xb3\x06\x9f\xd4\xcb\x1d\x18a\x92\xab\xae\x9e\xd4\x12\x91\xae\xd8\xddi\xbf+\xcf\xd7,O\x9c\b\bh\xd8\x95/\xef\r\xf5\xbf\x12\xb1\x86N`&\xe7\x1e\xdb\xbe\xc7G\xb4\xf3[o\x8a\x1b4\x9b\x01\xc3\xe2\xf3a\x93\xf7\xe1W\x1e@\xadM\x11\xa6\xa3\x85\xde\xfaE\x93\xfa\x18*\x98\x9b#:\xfd\xd10\x95-\xdaBns\xf2:\xb6\xb8\v\'\xf6\n\x8b\x85\xf2\xdb\x86\xec\xb5\x98m\x06(|\x06Q\xa4\xa7_\xedH\xaa\xe5\x88\x8d\xb4\x90K6\x91&|F\xaf\x1f\xe5N\x94H\xa5\x88\xe3\xc7wZ\xb7\xaa}\xecq\t\xf9\x80\xb0bL\x90\x8f\x92]~\xb0\xab\xcf\xea\xeb\xf6A{\xf5\"\xd4}\x9d\x0e\xc7\x16\xb4\xeah;\xaf\xd2fF\xd2\x0f\xc7,\xe4\xaa_\x97\xb5\xdbq\xf0\x96|\xa3\x8b\xee\xbb\x1a\xfe\xa0\xafE+%\'(2\xe9\x00\xf9K\xa4$u', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r2 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000440)={0xc, 0x2}, 0x0, 0x0, &(0x7f0000000480)={0x0, 0xe, 0x7fff, 0xffffffff}, &(0x7f00000004c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0xc}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='(\']@\x00', r3}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r3}, 0xc) r4 = gettid() write$cgroup_pid(r1, &(0x7f00000000c0)=r4, 0x12) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa00}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r8, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000140)=r8, 0x4) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r6, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) openat$cgroup_ro(r6, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:18 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff'}, 0x12, 0x0}, 0x0) 04:26:18 executing program 0 (fault-call:1 fault-nth:23): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b1408000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:18 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:18 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 603.799946][ T3824] FAULT_INJECTION: forcing a failure. [ 603.799946][ T3824] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 603.848465][ T3824] CPU: 1 PID: 3824 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 603.858581][ T3824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.869975][ T3824] Call Trace: [ 603.874113][ T3824] dump_stack+0x197/0x210 [ 603.878914][ T3824] should_fail.cold+0xa/0x15 [ 603.880570][ T3826] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 603.883936][ T3824] ? fault_create_debugfs_attr+0x180/0x180 [ 603.883960][ T3824] ? ___might_sleep+0x163/0x2c0 [ 603.883987][ T3824] should_fail_alloc_page+0x50/0x60 [ 603.884007][ T3824] __alloc_pages_nodemask+0x1a1/0x910 [ 603.917961][ T3824] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 603.923636][ T3824] ? __alloc_pages_slowpath+0x2920/0x2920 [ 603.929642][ T3824] ? kasan_unpoison_shadow+0x35/0x50 [ 603.934973][ T3824] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 603.942133][ T3824] alloc_pages_current+0x107/0x210 [ 603.947821][ T3824] ? ___might_sleep+0x163/0x2c0 [ 603.952706][ T3824] __vmalloc_node_range+0x4f8/0x810 [ 603.958037][ T3824] ? bpf_map_area_alloc+0x20/0x30 [ 603.963083][ T3824] __vmalloc_node_flags_caller+0x71/0x90 [ 603.963100][ T3824] ? bpf_map_area_alloc+0x20/0x30 [ 603.963115][ T3824] __bpf_map_area_alloc+0xde/0xf0 [ 603.963136][ T3824] bpf_map_area_alloc+0x20/0x30 [ 603.979463][ T3824] htab_map_alloc+0x8d3/0x11c0 [ 603.979496][ T3824] ? htab_map_update_elem+0xca0/0xca0 [ 603.979516][ T3824] __do_sys_bpf+0x478/0x3810 [ 604.000274][ T3824] ? bpf_prog_load+0x18f0/0x18f0 [ 604.005579][ T3824] ? __kasan_check_write+0x14/0x20 [ 604.008183][ T3830] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 604.011074][ T3824] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 604.011093][ T3824] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 604.011110][ T3824] ? wait_for_completion+0x440/0x440 [ 604.011133][ T3824] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 604.011169][ T3824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 604.048451][ T3824] ? do_syscall_64+0x26/0x790 [ 604.053520][ T3824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 604.060106][ T3824] ? do_syscall_64+0x26/0x790 [ 604.065212][ T3824] __x64_sys_bpf+0x73/0xb0 [ 604.069654][ T3824] do_syscall_64+0xfa/0x790 [ 604.074404][ T3824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 604.074416][ T3824] RIP: 0033:0x45a6f9 04:26:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b1416000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:19 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b1425000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 604.074430][ T3824] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 604.074436][ T3824] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 604.074454][ T3824] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 604.074462][ T3824] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 604.074469][ T3824] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 604.074476][ T3824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 04:26:19 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 604.074490][ T3824] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:19 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00@\x00\xa0\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:19 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 604.269772][ T3841] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 604.480783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 604.487071][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:26:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2d, 'memory'}, {0x2d, 'memory'}, {0x3602f9c969292e41, 'cpu'}, {0x7b, 'memory'}, {0x2b, 'memory'}]}, 0x25) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:19 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:19 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:19 executing program 0 (fault-call:1 fault-nth:24): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b145a000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:19 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) [ 604.767776][ T3864] FAULT_INJECTION: forcing a failure. [ 604.767776][ T3864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 604.768706][ T3863] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 604.782422][ T3864] CPU: 0 PID: 3864 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 604.800106][ T3864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.810273][ T3864] Call Trace: [ 604.813852][ T3864] dump_stack+0x197/0x210 [ 604.813874][ T3864] should_fail.cold+0xa/0x15 [ 604.813891][ T3864] ? fault_create_debugfs_attr+0x180/0x180 [ 604.813905][ T3864] ? ___might_sleep+0x163/0x2c0 [ 604.813928][ T3864] should_fail_alloc_page+0x50/0x60 [ 604.813939][ T3864] __alloc_pages_nodemask+0x1a1/0x910 [ 604.813954][ T3864] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 604.813969][ T3864] ? __alloc_pages_slowpath+0x2920/0x2920 [ 604.813992][ T3864] ? kasan_unpoison_shadow+0x35/0x50 [ 604.865183][ T3864] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 604.875821][ T3864] alloc_pages_current+0x107/0x210 [ 604.881151][ T3864] ? ___might_sleep+0x163/0x2c0 [ 604.886424][ T3864] __vmalloc_node_range+0x4f8/0x810 [ 604.892256][ T3864] ? bpf_map_area_alloc+0x20/0x30 [ 604.897400][ T3864] __vmalloc_node_flags_caller+0x71/0x90 [ 604.903272][ T3864] ? bpf_map_area_alloc+0x20/0x30 [ 604.908512][ T3864] __bpf_map_area_alloc+0xde/0xf0 [ 604.913664][ T3864] bpf_map_area_alloc+0x20/0x30 [ 604.919212][ T3864] htab_map_alloc+0x8d3/0x11c0 [ 604.924623][ T3864] ? htab_map_update_elem+0xca0/0xca0 [ 604.931350][ T3864] __do_sys_bpf+0x478/0x3810 [ 604.936653][ T3864] ? bpf_prog_load+0x18f0/0x18f0 [ 604.942313][ T3864] ? __kasan_check_write+0x14/0x20 [ 604.947431][ T3864] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 604.953591][ T3864] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 604.959324][ T3864] ? wait_for_completion+0x440/0x440 [ 604.965080][ T3864] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 604.971947][ T3864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 604.977514][ T3864] ? do_syscall_64+0x26/0x790 [ 604.982546][ T3864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 604.989118][ T3864] ? do_syscall_64+0x26/0x790 [ 604.993939][ T3864] __x64_sys_bpf+0x73/0xb0 [ 604.998504][ T3864] do_syscall_64+0xfa/0x790 [ 605.003329][ T3864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 605.009319][ T3864] RIP: 0033:0x45a6f9 [ 605.013482][ T3864] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 605.034098][ T3864] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 605.042846][ T3864] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 605.051222][ T3864] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 605.059879][ T3864] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:20 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 605.068217][ T3864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 605.076635][ T3864] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b1468000200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:20 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff'}, 0x12, 0x0}, 0x0) 04:26:20 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:20 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:20 executing program 0 (fault-call:1 fault-nth:25): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 605.283452][ T3882] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b14d0030200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:20 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1000, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg(r3, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r3) r4 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x1, 0x6, 0xcf, 0x8, 0x0, 0xfffffffffffffffc, 0x41000, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_config_ext={0x2ad, 0xff}, 0x10000, 0x4, 0x10001, 0x1, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='wlan1-self[(eth0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000030c0)={0xffffffffffffffff, r0, 0x0, 0x89, &(0x7f0000003000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0xffffffffffffffff}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000002f80)={0x0, 0x70, 0x86, 0xe1, 0x3, 0x1, 0x0, 0x80000001, 0xc002, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000002d40), 0xc}, 0x4000, 0xfffffffffffffff7, 0x3, 0x7, 0x0, 0xfffffeff, 0x3}, r5, 0x7, r6, 0x1) r7 = gettid() r8 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r8, 0x6, 0xffffffffffffffff, 0x8) r9 = perf_event_open(&(0x7f0000003200)={0x2, 0x70, 0x40, 0x7, 0x6, 0x5, 0x0, 0xffff, 0x1800, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000031c0), 0x1c}, 0x4024, 0x0, 0x101, 0x2, 0xffffffff, 0x0, 0xcb}, 0x0, 0x8, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000003140)={0x2, 0x70, 0xff, 0xce, 0x4, 0x19, 0x0, 0x7fffffff, 0x100, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffa, 0x5, @perf_bp={&(0x7f0000003100), 0x4}, 0x2000, 0x1, 0x7, 0x0, 0x3ff, 0xee97, 0x6}, r8, 0xd, r9, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000440)={0xc, 0x2}, 0x0, 0x0, &(0x7f0000000480)={0x0, 0xe, 0x7fff, 0xffffffff}, &(0x7f00000004c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0xc}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r7, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='(\']@\x00', r10}, 0x30) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r12, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002f40)={r12, 0x10, &(0x7f0000002f00)={&(0x7f0000002d40), 0x0, r11}}, 0x10) recvmsg(r2, &(0x7f0000002c80)={&(0x7f0000000580)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000000640)=""/68, 0x44}, {&(0x7f00000017c0)=""/154, 0x9a}, {&(0x7f0000001880)=""/57, 0x39}, {&(0x7f00000018c0)=""/248, 0xf8}, {&(0x7f00000019c0)=""/149, 0x95}, {&(0x7f0000001a80)=""/79, 0x4f}, {&(0x7f0000001b00)=""/222, 0xde}, {&(0x7f0000001c00)=""/4096, 0x1000}], 0x8}, 0x10043) recvmsg$kcm(r2, &(0x7f0000002d80)={&(0x7f0000002cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002d40)}, 0x40) sendmsg$inet(r2, &(0x7f0000002ec0)={&(0x7f0000000380)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10, &(0x7f0000000540)=[{&(0x7f00000003c0)="ccc14caa3470444c7d4d69e3713751c7c4bcb4bc332ebbff776cad4e53d7c89b", 0x20}, {&(0x7f00000007c0)="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", 0x1000}], 0x2, &(0x7f0000003280)=ANY=[@ANYBLOB="1400000000000000000000000100000002000000000000001c000000000000000000000008000000", @ANYRES32=r13, @ANYBLOB="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"/276, @ANYRES32=r14, @ANYBLOB="ffffffff7f00000100000000"], 0xf0}, 0xc0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r3, 0x0, 0x2b, &(0x7f0000000140)='keyringmime_type}keyringwlan1ppp1[vboxnet0\x00', r10}, 0x30) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3f, 0x1, 0x7f, 0x6, 0x0, 0x9, 0x80000, 0xf, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x20080000, 0x0, @perf_config_ext={0x9, 0xb2}, 0x8401, 0x1ae1, 0x9, 0x2, 0x0, 0x3, 0x22}, 0x0, 0x8, r15, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:20 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:20 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}, 0x12, 0x0}, 0x0) 04:26:20 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\xa0\x00@\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 605.485612][ T3895] FAULT_INJECTION: forcing a failure. [ 605.485612][ T3895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 605.510552][ T3898] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 605.597419][ T3895] CPU: 1 PID: 3895 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 605.607901][ T3895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.618527][ T3895] Call Trace: [ 605.622099][ T3895] dump_stack+0x197/0x210 [ 605.626815][ T3895] should_fail.cold+0xa/0x15 [ 605.631420][ T3895] ? fault_create_debugfs_attr+0x180/0x180 [ 605.638199][ T3895] ? ___might_sleep+0x163/0x2c0 [ 605.643281][ T3895] should_fail_alloc_page+0x50/0x60 [ 605.648728][ T3895] __alloc_pages_nodemask+0x1a1/0x910 [ 605.655283][ T3895] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 605.661694][ T3895] ? __alloc_pages_slowpath+0x2920/0x2920 [ 605.667738][ T3895] ? kasan_unpoison_shadow+0x35/0x50 [ 605.673402][ T3895] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 605.679830][ T3895] alloc_pages_current+0x107/0x210 [ 605.685176][ T3895] ? ___might_sleep+0x163/0x2c0 [ 605.690129][ T3895] __vmalloc_node_range+0x4f8/0x810 [ 605.695350][ T3895] ? bpf_map_area_alloc+0x20/0x30 [ 605.700551][ T3895] __vmalloc_node_flags_caller+0x71/0x90 [ 605.706464][ T3895] ? bpf_map_area_alloc+0x20/0x30 [ 605.711673][ T3895] __bpf_map_area_alloc+0xde/0xf0 [ 605.716788][ T3895] bpf_map_area_alloc+0x20/0x30 [ 605.721808][ T3895] htab_map_alloc+0x8d3/0x11c0 [ 605.726635][ T3895] ? htab_map_update_elem+0xca0/0xca0 [ 605.732147][ T3895] __do_sys_bpf+0x478/0x3810 [ 605.736862][ T3895] ? bpf_prog_load+0x18f0/0x18f0 [ 605.741823][ T3895] ? __kasan_check_write+0x14/0x20 [ 605.747024][ T3895] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 605.752621][ T3895] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 605.758041][ T3895] ? wait_for_completion+0x440/0x440 [ 605.763452][ T3895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 605.769711][ T3895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 605.775256][ T3895] ? do_syscall_64+0x26/0x790 [ 605.779972][ T3895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 605.786083][ T3895] ? do_syscall_64+0x26/0x790 [ 605.790773][ T3895] __x64_sys_bpf+0x73/0xb0 [ 605.795246][ T3895] do_syscall_64+0xfa/0x790 [ 605.800019][ T3895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 605.806086][ T3895] RIP: 0033:0x45a6f9 [ 605.809985][ T3895] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 605.831248][ T3895] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 04:26:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c020200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 605.839780][ T3895] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 605.849065][ T3895] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 605.857514][ T3895] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 605.865496][ T3895] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 605.873593][ T3895] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:21 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:21 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:21 executing program 0 (fault-call:1 fault-nth:26): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 606.048460][ T3918] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:21 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff'}, 0x12, 0x0}, 0x0) 04:26:21 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000300)="85f04ee57018b5ce44b5e40c8fbe9088b3f4ea259b1680b99e2e5954c9f5624d326229dae5477d03d54ee889c39968085635e4f656abd8eef6ea0e77446554b8748bbfa01a6a9601516624d22aab2e49b552f44eceda0883cb2093c40859f444317673e31db9230ccfabaf120dc935cd3662d7acafb19687fb64988de67c7bbe71", &(0x7f00000003c0)="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"}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c030200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 606.175693][ T3928] FAULT_INJECTION: forcing a failure. [ 606.175693][ T3928] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 606.244339][ T3928] CPU: 0 PID: 3928 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 606.253017][ T3928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.263092][ T3928] Call Trace: [ 606.266400][ T3928] dump_stack+0x197/0x210 [ 606.270752][ T3928] should_fail.cold+0xa/0x15 [ 606.270773][ T3928] ? fault_create_debugfs_attr+0x180/0x180 [ 606.270788][ T3928] ? ___might_sleep+0x163/0x2c0 [ 606.270813][ T3928] should_fail_alloc_page+0x50/0x60 [ 606.281191][ T3928] __alloc_pages_nodemask+0x1a1/0x910 [ 606.281207][ T3928] ? find_held_lock+0x35/0x130 [ 606.281222][ T3928] ? __alloc_pages_slowpath+0x2920/0x2920 [ 606.281239][ T3928] ? lock_downgrade+0x920/0x920 [ 606.281251][ T3928] ? rwlock_bug.part.0+0x90/0x90 [ 606.281265][ T3928] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 606.281282][ T3928] alloc_pages_current+0x107/0x210 [ 606.281300][ T3928] __get_free_pages+0xc/0x40 [ 606.281313][ T3928] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 606.281332][ T3928] apply_to_page_range+0x445/0x700 [ 606.281349][ T3928] ? memset+0x40/0x40 [ 606.281371][ T3928] kasan_populate_vmalloc+0x68/0x90 [ 606.317004][ T3928] __vmalloc_node_range+0x47e/0x810 [ 606.338930][ T3935] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 606.339503][ T3928] ? bpf_map_area_alloc+0x20/0x30 [ 606.355162][ T3928] __vmalloc_node_flags_caller+0x71/0x90 [ 606.355179][ T3928] ? bpf_map_area_alloc+0x20/0x30 [ 606.355195][ T3928] __bpf_map_area_alloc+0xde/0xf0 [ 606.355209][ T3928] bpf_map_area_alloc+0x20/0x30 [ 606.355225][ T3928] htab_map_alloc+0x8d3/0x11c0 [ 606.355257][ T3928] ? htab_map_update_elem+0xca0/0xca0 [ 606.405337][ T3928] __do_sys_bpf+0x478/0x3810 [ 606.409960][ T3928] ? bpf_prog_load+0x18f0/0x18f0 [ 606.415359][ T3928] ? __kasan_check_write+0x14/0x20 [ 606.420495][ T3928] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 606.426057][ T3928] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 606.431938][ T3928] ? wait_for_completion+0x440/0x440 [ 606.437256][ T3928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 606.443663][ T3928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 606.449147][ T3928] ? do_syscall_64+0x26/0x790 [ 606.453860][ T3928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 606.459951][ T3928] ? do_syscall_64+0x26/0x790 [ 606.464652][ T3928] __x64_sys_bpf+0x73/0xb0 [ 606.469091][ T3928] do_syscall_64+0xfa/0x790 [ 606.473634][ T3928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 606.479555][ T3928] RIP: 0033:0x45a6f9 04:26:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c040200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:21 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 606.483463][ T3928] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 606.503074][ T3928] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 606.506902][ T3941] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 606.511933][ T3928] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 606.511942][ T3928] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 606.511950][ T3928] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:21 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:21 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 606.511958][ T3928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 606.511966][ T3928] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c050200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:21 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:21 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:21 executing program 0 (fault-call:1 fault-nth:27): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:21 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000007380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007500)=[{&(0x7f0000007400)=""/193, 0x35}], 0x1, &(0x7f0000007540)=""/217, 0xfffffffffffffd3d}, 0x3) r6 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r6, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) recvmsg(r6, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c000)}, 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000540)={'\x00\x00\x001\xefcc\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x1000}) ioctl$SIOCSIFHWADDR(r9, 0x8924, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000007380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007500)=[{&(0x7f0000007400)=""/193, 0x35}], 0x1, &(0x7f0000007540)=""/217, 0xfffffffffffffd3d}, 0x3) r11 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r11, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) recvmsg(r11, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c000)}, 0x1) r13 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r13, 0x0, 0x0, 0x0) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r14, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r14, @ANYRESOCT=r10, @ANYRES16=0x0]], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r12, 0x0, r13, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, &(0x7f000000c180)={0x4, 0x7, 0x0, 0x9}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0xe, 0x1, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r9, @ANYRESOCT=r5, @ANYRES16=0x0]], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r10, 0x0, r8, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, &(0x7f000000c180)={0x4, 0x7, 0x2, 0xc}, 0x10}, 0x78) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r15, 0xb, 0xffffffffffffffff, 0x1) r16 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r17) write$cgroup_type(r17, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r17, 0xb, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x2, [], r7, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0xfff, 0x7fff}, 0x10, 0x0, r16}, 0x12f) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000007680)=r7) r18 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r18, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0xc0, &(0x7f0000008ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008980), 0x0, 0x0, 0x0, &(0x7f00000089c0)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000008a00)={0x5, 0x7, 0x0, 0x9ed3}, &(0x7f0000008a40)=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r19, 0x4) r20 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0x8, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x6, 0x1, 0x4, 0xffffffffffffffdc, 0x4}, @ldst={0x2, 0xb70109ecdeb9791b, 0x1, 0x3, 0x2398ccfbfc4fa066, 0x10, 0x1}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20}, @map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}], &(0x7f00000004c0)='GPL\x00', 0x2304, 0xef, &(0x7f0000000a00)=""/239, 0x41000, 0x0, [], r7, 0x6, r18, 0x8, &(0x7f0000000700)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0xe, 0x8001, 0x8}, 0x10, r19, r1}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r20) close(r2) r21 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r22 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r21, 0xb, 0xffffffffffffffff, 0x1) close(r22) r23 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r23, 0x84, 0x14, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r24 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r24, 0xb, 0xffffffffffffffff, 0x1) r25 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/594], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x2ed, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r25, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795eca00", 0x0, 0x81, 0xf2ffffff, 0x7c, 0x6a, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x40) r26 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r26, 0xb, 0xffffffffffffffff, 0x1) r27 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r27) write$cgroup_type(r27, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r27) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) [ 606.804510][ T3957] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c060200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 606.965850][ T3968] FAULT_INJECTION: forcing a failure. [ 606.965850][ T3968] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 607.019446][ T3968] CPU: 0 PID: 3968 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 607.028102][ T3968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.038171][ T3968] Call Trace: [ 607.041489][ T3968] dump_stack+0x197/0x210 [ 607.045858][ T3968] should_fail.cold+0xa/0x15 [ 607.050496][ T3968] ? fault_create_debugfs_attr+0x180/0x180 [ 607.056334][ T3968] ? ___might_sleep+0x163/0x2c0 [ 607.061224][ T3968] should_fail_alloc_page+0x50/0x60 [ 607.066446][ T3968] __alloc_pages_nodemask+0x1a1/0x910 [ 607.071847][ T3968] ? find_held_lock+0x35/0x130 [ 607.076636][ T3968] ? __alloc_pages_slowpath+0x2920/0x2920 [ 607.082387][ T3968] ? lock_downgrade+0x920/0x920 [ 607.087435][ T3968] ? rwlock_bug.part.0+0x90/0x90 [ 607.092397][ T3968] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 607.098839][ T3968] alloc_pages_current+0x107/0x210 [ 607.103996][ T3968] __get_free_pages+0xc/0x40 [ 607.108604][ T3968] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 607.114273][ T3968] apply_to_page_range+0x445/0x700 [ 607.119438][ T3968] ? memset+0x40/0x40 [ 607.123444][ T3968] kasan_populate_vmalloc+0x68/0x90 [ 607.128661][ T3968] __vmalloc_node_range+0x47e/0x810 [ 607.133885][ T3968] ? bpf_map_area_alloc+0x20/0x30 [ 607.138926][ T3968] __vmalloc_node_flags_caller+0x71/0x90 [ 607.144571][ T3968] ? bpf_map_area_alloc+0x20/0x30 [ 607.149703][ T3968] __bpf_map_area_alloc+0xde/0xf0 [ 607.154833][ T3968] bpf_map_area_alloc+0x20/0x30 [ 607.159710][ T3968] htab_map_alloc+0x8d3/0x11c0 [ 607.164530][ T3968] ? htab_map_update_elem+0xca0/0xca0 [ 607.170442][ T3968] __do_sys_bpf+0x478/0x3810 [ 607.175041][ T3968] ? bpf_prog_load+0x18f0/0x18f0 [ 607.180079][ T3968] ? __kasan_check_write+0x14/0x20 [ 607.185201][ T3968] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 607.190748][ T3968] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 607.196051][ T3968] ? wait_for_completion+0x440/0x440 [ 607.201369][ T3968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 607.201398][ T3968] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 607.201412][ T3968] ? do_syscall_64+0x26/0x790 [ 607.201425][ T3968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.201436][ T3968] ? do_syscall_64+0x26/0x790 [ 607.201456][ T3968] __x64_sys_bpf+0x73/0xb0 [ 607.201470][ T3968] do_syscall_64+0xfa/0x790 [ 607.201487][ T3968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.201498][ T3968] RIP: 0033:0x45a6f9 [ 607.201512][ T3968] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.201519][ T3968] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 607.201531][ T3968] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 607.201545][ T3968] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 607.217884][ T3968] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 607.217895][ T3968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 607.217904][ T3968] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:22 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00@\x00\xa0\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:22 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c070200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 607.218229][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 607.321704][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:26:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c0a0200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:22 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f'}, 0x12, 0x0}, 0x0) 04:26:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c0e0200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:22 executing program 0 (fault-call:1 fault-nth:28): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:22 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) [ 607.667878][ T4007] FAULT_INJECTION: forcing a failure. [ 607.667878][ T4007] name failslab, interval 1, probability 0, space 0, times 0 [ 607.688771][ T4007] CPU: 1 PID: 4007 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 607.697429][ T4007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.707500][ T4007] Call Trace: [ 607.710814][ T4007] dump_stack+0x197/0x210 [ 607.715210][ T4007] should_fail.cold+0xa/0x15 [ 607.719828][ T4007] ? fault_create_debugfs_attr+0x180/0x180 [ 607.726010][ T4007] ? ___might_sleep+0x163/0x2c0 [ 607.730890][ T4007] __should_failslab+0x121/0x190 [ 607.735854][ T4007] should_failslab+0x9/0x14 [ 607.740391][ T4007] kmem_cache_alloc_node_trace+0x274/0x750 [ 607.746218][ T4007] ? __kasan_check_read+0x11/0x20 [ 607.751266][ T4007] __get_vm_area_node+0x12b/0x4f0 [ 607.757780][ T4007] __vmalloc_node_range+0xd4/0x810 [ 607.762901][ T4007] ? pcpu_mem_zalloc+0x8a/0xf0 [ 607.762983][ T4007] ? __kmalloc+0x608/0x770 [ 607.763003][ T4007] __vmalloc+0x44/0x50 [ 607.776232][ T4007] ? pcpu_mem_zalloc+0x8a/0xf0 [ 607.781014][ T4007] pcpu_mem_zalloc+0x8a/0xf0 [ 607.785611][ T4007] pcpu_create_chunk+0xe0/0x7f0 [ 607.790461][ T4007] pcpu_alloc+0x10f3/0x1380 [ 607.794990][ T4007] ? pcpu_alloc_area+0x820/0x820 [ 607.799944][ T4007] ? bpf_map_area_alloc+0x20/0x30 [ 607.804997][ T4007] __alloc_percpu_gfp+0x28/0x30 [ 607.809860][ T4007] htab_map_alloc+0xdb9/0x11c0 [ 607.814664][ T4007] ? htab_map_update_elem+0xca0/0xca0 [ 607.820052][ T4007] __do_sys_bpf+0x478/0x3810 [ 607.824669][ T4007] ? bpf_prog_load+0x18f0/0x18f0 [ 607.829628][ T4007] ? __kasan_check_write+0x14/0x20 [ 607.834790][ T4007] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 607.840345][ T4007] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 607.845655][ T4007] ? wait_for_completion+0x440/0x440 [ 607.850990][ T4007] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 607.857269][ T4007] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 607.862746][ T4007] ? do_syscall_64+0x26/0x790 [ 607.867595][ T4007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.873654][ T4007] ? do_syscall_64+0x26/0x790 [ 607.878324][ T4007] __x64_sys_bpf+0x73/0xb0 [ 607.883421][ T4007] do_syscall_64+0xfa/0x790 [ 607.887963][ T4007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.893835][ T4007] RIP: 0033:0x45a6f9 [ 607.897722][ T4007] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:26:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) sendmsg$sock(r1, &(0x7f0000000200)={&(0x7f00000000c0)=@sco={0x1f, {0x8, 0x23, 0x80, 0x20, 0x1, 0x1}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000300)="80868668810f04e0838b79d47b27e5ae93e4f0981e338ab1c5665721fa4167be100ba3356037f838eebb79925766595176f08ddfcf5edbe8fa98880da5d7633800c515cefeada7d8c2efbb803b32d11a193928f765a2f8dc728f216c928cfa41d56616ca0b287f8cc85a32a8b284039fb36e0dd94b40b173d9635fead9932e03bb35dcb6374a88bb5a21e92c1ae8c7f2250570b6e3e98fe1e41f63c0f53a4b68096a982b9f3378718a109e292bb2", 0xae}, {&(0x7f00000003c0)="439a880020757566f6dc57c657aa15c8d6b655046f76f1d4e333fa5fc6f0c39df03082e0879fab39d57416ee4c2216e3fe7e30c9d5626b9f57462dbf43f4d0e7afa5ff5a52ce31f37f42be2cefba8a9c984b09b1d620fb01435b2356def2f448e7b336af0cb70b719be42910d431828895902bf06088a6eb9a141cc907626016abca16fb40505b5337e3981241988e0cd9580a400d", 0x95}], 0x2, &(0x7f0000000480)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0xbd76}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0x90}, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 607.917303][ T4007] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 607.925704][ T4007] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 607.933688][ T4007] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 607.941638][ T4007] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 607.949587][ T4007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 607.957534][ T4007] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:23 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c0f0200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:23 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:23 executing program 0 (fault-call:1 fault-nth:29): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 608.096410][ T4027] FAULT_INJECTION: forcing a failure. [ 608.096410][ T4027] name failslab, interval 1, probability 0, space 0, times 0 [ 608.129532][ T4027] CPU: 0 PID: 4027 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 608.138170][ T4027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.148229][ T4027] Call Trace: [ 608.148254][ T4027] dump_stack+0x197/0x210 [ 608.148277][ T4027] should_fail.cold+0xa/0x15 [ 608.148295][ T4027] ? fault_create_debugfs_attr+0x180/0x180 [ 608.148312][ T4027] ? ___might_sleep+0x163/0x2c0 [ 608.148329][ T4027] __should_failslab+0x121/0x190 [ 608.148346][ T4027] should_failslab+0x9/0x14 [ 608.148365][ T4027] kmem_cache_alloc_node_trace+0x274/0x750 [ 608.187089][ T4027] ? __kasan_check_read+0x11/0x20 [ 608.192143][ T4027] __get_vm_area_node+0x12b/0x4f0 [ 608.197229][ T4027] __vmalloc_node_range+0xd4/0x810 [ 608.202357][ T4027] ? pcpu_mem_zalloc+0x8a/0xf0 [ 608.207198][ T4027] ? __kmalloc+0x608/0x770 [ 608.211634][ T4027] __vmalloc+0x44/0x50 [ 608.215720][ T4027] ? pcpu_mem_zalloc+0x8a/0xf0 [ 608.220503][ T4027] pcpu_mem_zalloc+0x8a/0xf0 [ 608.225117][ T4027] pcpu_create_chunk+0xe0/0x7f0 [ 608.230022][ T4027] pcpu_alloc+0x10f3/0x1380 [ 608.234555][ T4027] ? pcpu_alloc_area+0x820/0x820 [ 608.239602][ T4027] ? bpf_map_area_alloc+0x20/0x30 [ 608.244670][ T4027] __alloc_percpu_gfp+0x28/0x30 [ 608.249683][ T4027] htab_map_alloc+0xdb9/0x11c0 [ 608.254492][ T4027] ? htab_map_update_elem+0xca0/0xca0 [ 608.259895][ T4027] __do_sys_bpf+0x478/0x3810 [ 608.264514][ T4027] ? bpf_prog_load+0x18f0/0x18f0 [ 608.269995][ T4027] ? __kasan_check_write+0x14/0x20 [ 608.275130][ T4027] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 608.280695][ T4027] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 608.286355][ T4027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:26:23 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff'}, 0x12, 0x0}, 0x0) 04:26:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 608.292617][ T4027] ? debug_smp_processor_id+0x33/0x18a [ 608.298104][ T4027] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 608.304332][ T4027] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 608.309806][ T4027] ? do_syscall_64+0x26/0x790 [ 608.314503][ T4027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.320586][ T4027] ? do_syscall_64+0x26/0x790 [ 608.325291][ T4027] __x64_sys_bpf+0x73/0xb0 [ 608.330252][ T4027] do_syscall_64+0xfa/0x790 [ 608.334778][ T4027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.340673][ T4027] RIP: 0033:0x45a6f9 [ 608.340688][ T4027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 608.340695][ T4027] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 608.340708][ T4027] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 608.340715][ T4027] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:23 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c480200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 608.340722][ T4027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 608.340731][ T4027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 608.340738][ T4027] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 608.455076][ T4042] __nla_validate_parse: 5 callbacks suppressed [ 608.455086][ T4042] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'bond0\x00', 0x1000}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c4c0200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:23 executing program 0 (fault-call:1 fault-nth:30): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 608.576150][ T4050] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:23 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff'}, 0x12, 0x0}, 0x0) 04:26:23 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 608.672086][ T4056] FAULT_INJECTION: forcing a failure. [ 608.672086][ T4056] name failslab, interval 1, probability 0, space 0, times 0 [ 608.759352][ T4056] CPU: 0 PID: 4056 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 608.768439][ T4056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.778522][ T4056] Call Trace: [ 608.781845][ T4056] dump_stack+0x197/0x210 [ 608.786242][ T4056] should_fail.cold+0xa/0x15 [ 608.790861][ T4056] ? fault_create_debugfs_attr+0x180/0x180 [ 608.796695][ T4056] ? ___might_sleep+0x163/0x2c0 [ 608.801588][ T4056] __should_failslab+0x121/0x190 [ 608.806568][ T4056] should_failslab+0x9/0x14 [ 608.811078][ T4056] kmem_cache_alloc_node+0x268/0x740 [ 608.816366][ T4056] ? ___might_sleep+0x163/0x2c0 [ 608.821242][ T4056] alloc_vmap_area+0x147/0x2030 [ 608.826114][ T4056] ? __get_vm_area_node+0x12b/0x4f0 [ 608.831324][ T4056] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 608.836878][ T4056] ? purge_vmap_area_lazy+0x40/0x40 [ 608.842097][ T4056] ? __kasan_check_read+0x11/0x20 [ 608.847155][ T4056] __get_vm_area_node+0x179/0x4f0 [ 608.852298][ T4056] __vmalloc_node_range+0xd4/0x810 [ 608.859225][ T4056] ? pcpu_mem_zalloc+0x8a/0xf0 [ 608.864057][ T4056] ? __kmalloc+0x608/0x770 [ 608.868660][ T4056] __vmalloc+0x44/0x50 [ 608.872812][ T4056] ? pcpu_mem_zalloc+0x8a/0xf0 [ 608.877589][ T4056] pcpu_mem_zalloc+0x8a/0xf0 [ 608.882196][ T4056] pcpu_create_chunk+0xe0/0x7f0 [ 608.887162][ T4056] pcpu_alloc+0x10f3/0x1380 [ 608.891794][ T4056] ? pcpu_alloc_area+0x820/0x820 [ 608.896750][ T4056] ? bpf_map_area_alloc+0x20/0x30 [ 608.901807][ T4056] __alloc_percpu_gfp+0x28/0x30 04:26:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 608.906691][ T4056] htab_map_alloc+0xdb9/0x11c0 [ 608.911754][ T4056] ? htab_map_update_elem+0xca0/0xca0 [ 608.917417][ T4056] __do_sys_bpf+0x478/0x3810 [ 608.922034][ T4056] ? bpf_prog_load+0x18f0/0x18f0 [ 608.927013][ T4056] ? __kasan_check_write+0x14/0x20 [ 608.932145][ T4056] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 608.937789][ T4056] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 608.943100][ T4056] ? wait_for_completion+0x440/0x440 [ 608.948466][ T4056] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 608.954831][ T4056] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 608.960412][ T4056] ? do_syscall_64+0x26/0x790 [ 608.966073][ T4056] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.972260][ T4056] ? do_syscall_64+0x26/0x790 [ 608.976958][ T4056] __x64_sys_bpf+0x73/0xb0 [ 608.981437][ T4056] do_syscall_64+0xfa/0x790 [ 608.985966][ T4056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.991961][ T4056] RIP: 0033:0x45a6f9 04:26:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x021Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 608.995865][ T4056] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.015576][ T4056] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 609.024007][ T4056] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 609.032082][ T4056] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 609.040072][ T4056] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 609.048151][ T4056] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 04:26:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c600200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 609.056137][ T4056] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:24 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x200, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x3, 0xffffffffffffffff, 0x8) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vxcan1\x00', 0x4000}) r2 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:24 executing program 0 (fault-call:1 fault-nth:31): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 609.185076][ T4086] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:24 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:24 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c680200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x041Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r1) r2 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x8, 0x40, 0x8, 0x6, 0x0, 0x9, 0x40, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x6, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1204, 0x10000, 0x8, 0xb, 0x2ff, 0xff, 0x5}, 0x0, 0xd, r1, 0xc) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 609.435001][ T4101] FAULT_INJECTION: forcing a failure. [ 609.435001][ T4101] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 609.438498][ T4104] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 609.462721][ T4101] CPU: 1 PID: 4101 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 609.471362][ T4101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.481467][ T4101] Call Trace: [ 609.484968][ T4101] dump_stack+0x197/0x210 [ 609.489336][ T4101] should_fail.cold+0xa/0x15 [ 609.493955][ T4101] ? fault_create_debugfs_attr+0x180/0x180 [ 609.499777][ T4101] ? ___might_sleep+0x163/0x2c0 [ 609.504656][ T4101] should_fail_alloc_page+0x50/0x60 [ 609.509873][ T4101] __alloc_pages_nodemask+0x1a1/0x910 [ 609.515258][ T4101] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 609.520816][ T4101] ? __alloc_pages_slowpath+0x2920/0x2920 [ 609.526557][ T4101] ? kasan_unpoison_shadow+0x35/0x50 [ 609.531859][ T4101] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 609.538112][ T4101] alloc_pages_current+0x107/0x210 [ 609.543244][ T4101] __vmalloc_node_range+0x4f8/0x810 [ 609.543268][ T4101] __vmalloc+0x44/0x50 [ 609.543282][ T4101] ? pcpu_mem_zalloc+0x8a/0xf0 [ 609.543297][ T4101] pcpu_mem_zalloc+0x8a/0xf0 [ 609.562160][ T4101] pcpu_create_chunk+0xe0/0x7f0 [ 609.567044][ T4101] pcpu_alloc+0x10f3/0x1380 [ 609.571581][ T4101] ? pcpu_alloc_area+0x820/0x820 [ 609.576540][ T4101] ? bpf_map_area_alloc+0x20/0x30 [ 609.581597][ T4101] __alloc_percpu_gfp+0x28/0x30 [ 609.587348][ T4101] htab_map_alloc+0xdb9/0x11c0 [ 609.592138][ T4101] ? htab_map_update_elem+0xca0/0xca0 [ 609.597538][ T4101] __do_sys_bpf+0x478/0x3810 [ 609.602156][ T4101] ? bpf_prog_load+0x18f0/0x18f0 [ 609.607113][ T4101] ? __kasan_check_write+0x14/0x20 [ 609.612249][ T4101] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 609.617813][ T4101] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 609.623121][ T4101] ? wait_for_completion+0x440/0x440 [ 609.628434][ T4101] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 609.634707][ T4101] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 609.640187][ T4101] ? do_syscall_64+0x26/0x790 [ 609.643188][ T4117] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 609.644888][ T4101] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.644906][ T4101] ? do_syscall_64+0x26/0x790 [ 609.644926][ T4101] __x64_sys_bpf+0x73/0xb0 [ 609.644946][ T4101] do_syscall_64+0xfa/0x790 [ 609.669574][ T4101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.679967][ T4101] RIP: 0033:0x45a6f9 04:26:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:24 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c6c0200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:24 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 609.683885][ T4101] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.703503][ T4101] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 609.703518][ T4101] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 609.703525][ T4101] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 609.703531][ T4101] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 609.703538][ T4101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 609.703545][ T4101] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c740200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:24 executing program 0 (fault-call:1 fault-nth:32): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:24 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00'}, 0x12, 0x0}, 0x0) 04:26:25 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x4000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x40, 0x40, 0x6, 0x6, 0x0, 0xffffffff, 0x4a041, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x5, @perf_config_ext={0x72, 0x8}, 0x2020, 0x0, 0x28, 0x5, 0x0, 0x0, 0x9}, r1, 0x10, r2, 0x8) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 609.946720][ T4133] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c7a0200053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:25 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) [ 610.073269][ T4140] FAULT_INJECTION: forcing a failure. [ 610.073269][ T4140] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 610.169502][ T4149] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 610.220467][ T4140] CPU: 0 PID: 4140 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 610.229120][ T4140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.239190][ T4140] Call Trace: [ 610.242660][ T4140] dump_stack+0x197/0x210 [ 610.247029][ T4140] should_fail.cold+0xa/0x15 [ 610.251651][ T4140] ? fault_create_debugfs_attr+0x180/0x180 [ 610.257488][ T4140] ? ___might_sleep+0x163/0x2c0 [ 610.262370][ T4140] should_fail_alloc_page+0x50/0x60 04:26:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x4000a0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 610.267579][ T4140] __alloc_pages_nodemask+0x1a1/0x910 [ 610.272962][ T4140] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 610.278784][ T4140] ? __alloc_pages_slowpath+0x2920/0x2920 [ 610.284531][ T4140] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 610.291492][ T4140] alloc_pages_current+0x107/0x210 [ 610.296654][ T4140] ? ___might_sleep+0x163/0x2c0 [ 610.301888][ T4140] __vmalloc_node_range+0x4f8/0x810 [ 610.307293][ T4140] __vmalloc+0x44/0x50 [ 610.311378][ T4140] ? pcpu_mem_zalloc+0x8a/0xf0 [ 610.316169][ T4140] pcpu_mem_zalloc+0x8a/0xf0 04:26:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x1000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 610.320792][ T4140] pcpu_create_chunk+0xe0/0x7f0 [ 610.325663][ T4140] pcpu_alloc+0x10f3/0x1380 [ 610.330238][ T4140] ? pcpu_alloc_area+0x820/0x820 [ 610.335203][ T4140] ? bpf_map_area_alloc+0x20/0x30 [ 610.340270][ T4140] __alloc_percpu_gfp+0x28/0x30 [ 610.345143][ T4140] htab_map_alloc+0xdb9/0x11c0 [ 610.349943][ T4140] ? htab_map_update_elem+0xca0/0xca0 [ 610.355331][ T4140] __do_sys_bpf+0x478/0x3810 [ 610.360112][ T4140] ? bpf_prog_load+0x18f0/0x18f0 [ 610.365066][ T4140] ? __kasan_check_write+0x14/0x20 [ 610.370200][ T4140] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 610.375773][ T4140] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 610.381082][ T4140] ? wait_for_completion+0x440/0x440 [ 610.386484][ T4140] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 610.392785][ T4140] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 610.398260][ T4140] ? do_syscall_64+0x26/0x790 [ 610.402949][ T4140] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.409549][ T4140] ? do_syscall_64+0x26/0x790 [ 610.414257][ T4140] __x64_sys_bpf+0x73/0xb0 [ 610.418699][ T4140] do_syscall_64+0xfa/0x790 [ 610.423232][ T4140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.429141][ T4140] RIP: 0033:0x45a6f9 [ 610.433139][ T4140] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.452756][ T4140] RSP: 002b:00007f93e4b59c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 610.461177][ T4140] RAX: ffffffffffffffda RBX: 00007f93e4b59c90 RCX: 000000000045a6f9 04:26:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x2000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000300053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 610.469165][ T4140] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 610.477156][ T4140] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 610.485143][ T4140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b5a6d4 [ 610.493129][ T4140] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000900053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:25 executing program 0 (fault-call:1 fault-nth:33): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x4000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 610.644510][ T4178] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 610.660788][ T4178] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:25 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}, 0x12, 0x0}, 0x0) 04:26:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000a00053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:25 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f'}, 0x12, 0x0}, 0x0) [ 610.812727][ T4184] FAULT_INJECTION: forcing a failure. [ 610.812727][ T4184] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 610.872041][ T4184] CPU: 0 PID: 4184 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 610.881219][ T4184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.891274][ T4184] Call Trace: [ 610.894565][ T4184] dump_stack+0x197/0x210 [ 610.899851][ T4184] should_fail.cold+0xa/0x15 [ 610.904960][ T4184] ? fault_create_debugfs_attr+0x180/0x180 [ 610.910950][ T4184] ? ___might_sleep+0x163/0x2c0 [ 610.915809][ T4184] should_fail_alloc_page+0x50/0x60 [ 610.921014][ T4184] __alloc_pages_nodemask+0x1a1/0x910 [ 610.926373][ T4184] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 610.932081][ T4184] ? __alloc_pages_slowpath+0x2920/0x2920 [ 610.937801][ T4184] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 610.944033][ T4184] alloc_pages_current+0x107/0x210 [ 610.949167][ T4184] ? ___might_sleep+0x163/0x2c0 [ 610.954009][ T4184] __vmalloc_node_range+0x4f8/0x810 [ 610.959226][ T4184] __vmalloc+0x44/0x50 [ 610.963312][ T4184] ? pcpu_mem_zalloc+0x8a/0xf0 [ 610.968497][ T4184] pcpu_mem_zalloc+0x8a/0xf0 [ 610.973081][ T4184] pcpu_create_chunk+0xe0/0x7f0 [ 610.977926][ T4184] pcpu_alloc+0x10f3/0x1380 [ 610.982449][ T4184] ? pcpu_alloc_area+0x820/0x820 [ 610.987386][ T4184] ? bpf_map_area_alloc+0x20/0x30 [ 610.992403][ T4184] __alloc_percpu_gfp+0x28/0x30 [ 610.997259][ T4184] htab_map_alloc+0xdb9/0x11c0 [ 611.002032][ T4184] ? htab_map_update_elem+0xca0/0xca0 [ 611.007400][ T4184] __do_sys_bpf+0x478/0x3810 [ 611.011980][ T4184] ? bpf_prog_load+0x18f0/0x18f0 [ 611.016901][ T4184] ? __kasan_check_write+0x14/0x20 [ 611.022018][ T4184] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 611.027576][ T4184] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 611.032859][ T4184] ? wait_for_completion+0x440/0x440 [ 611.038138][ T4184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 611.044375][ T4184] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 611.049819][ T4184] ? do_syscall_64+0x26/0x790 [ 611.054484][ T4184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.060570][ T4184] ? do_syscall_64+0x26/0x790 [ 611.065267][ T4184] __x64_sys_bpf+0x73/0xb0 [ 611.069677][ T4184] do_syscall_64+0xfa/0x790 [ 611.074173][ T4184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.080096][ T4184] RIP: 0033:0x45a6f9 [ 611.083990][ T4184] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 611.103587][ T4184] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 611.112070][ T4184] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 611.120025][ T4184] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 611.127982][ T4184] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 611.135940][ T4184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 611.143907][ T4184] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:26 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x40000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 611.181707][ T4193] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c004000053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:26 executing program 0 (fault-call:1 fault-nth:34): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:26 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff'}, 0x12, 0x0}, 0x0) 04:26:26 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) [ 611.362685][ T4207] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 611.427223][ T4211] FAULT_INJECTION: forcing a failure. [ 611.427223][ T4211] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:26 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0xa0004000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 611.499546][ T4211] CPU: 0 PID: 4211 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 611.508294][ T4211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.518723][ T4211] Call Trace: [ 611.522050][ T4211] dump_stack+0x197/0x210 [ 611.522075][ T4211] should_fail.cold+0xa/0x15 [ 611.522095][ T4211] ? fault_create_debugfs_attr+0x180/0x180 [ 611.522111][ T4211] ? ___might_sleep+0x163/0x2c0 [ 611.522132][ T4211] should_fail_alloc_page+0x50/0x60 [ 611.522145][ T4211] __alloc_pages_nodemask+0x1a1/0x910 [ 611.522160][ T4211] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 611.522174][ T4211] ? __alloc_pages_slowpath+0x2920/0x2920 [ 611.522197][ T4211] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 611.522212][ T4211] alloc_pages_current+0x107/0x210 [ 611.522223][ T4211] ? ___might_sleep+0x163/0x2c0 [ 611.522244][ T4211] __vmalloc_node_range+0x4f8/0x810 [ 611.522272][ T4211] __vmalloc+0x44/0x50 [ 611.589721][ T4211] ? pcpu_mem_zalloc+0x8a/0xf0 [ 611.594535][ T4211] pcpu_mem_zalloc+0x8a/0xf0 [ 611.599153][ T4211] pcpu_create_chunk+0xe0/0x7f0 [ 611.604022][ T4211] pcpu_alloc+0x10f3/0x1380 [ 611.608550][ T4211] ? pcpu_alloc_area+0x820/0x820 [ 611.613511][ T4211] ? bpf_map_area_alloc+0x20/0x30 [ 611.618559][ T4211] __alloc_percpu_gfp+0x28/0x30 [ 611.623421][ T4211] htab_map_alloc+0xdb9/0x11c0 [ 611.628255][ T4211] ? htab_map_update_elem+0xca0/0xca0 [ 611.633660][ T4211] __do_sys_bpf+0x478/0x3810 [ 611.638274][ T4211] ? bpf_prog_load+0x18f0/0x18f0 [ 611.643231][ T4211] ? __kasan_check_write+0x14/0x20 [ 611.648356][ T4211] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 611.653906][ T4211] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 611.653924][ T4211] ? wait_for_completion+0x440/0x440 [ 611.653945][ T4211] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 611.653972][ T4211] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 611.653984][ T4211] ? do_syscall_64+0x26/0x790 [ 611.654003][ T4211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.670807][ T4211] ? do_syscall_64+0x26/0x790 [ 611.670828][ T4211] __x64_sys_bpf+0x73/0xb0 04:26:26 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x1000000000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 611.670844][ T4211] do_syscall_64+0xfa/0x790 [ 611.670863][ T4211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.670879][ T4211] RIP: 0033:0x45a6f9 [ 611.711410][ T4211] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 611.731740][ T4211] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 611.740286][ T4211] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c005a00053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 611.748482][ T4211] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 611.757674][ T4211] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 611.767572][ T4211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 611.775575][ T4211] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c006300053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:26 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x4000a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:26 executing program 0 (fault-call:1 fault-nth:35): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:27 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r0, 0x6, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x10000000000001ca, 0x0, 0x6f}, 0x0) close(r1) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x45, 0x0, 0x9, 0x0, 0x0, 0x8, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x2}, 0x100, 0x800, 0x10001, 0xf, 0xea, 0x2, 0x3}, r0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x4, 0x7f, 0x7d, 0x78, 0x0, 0x100000001, 0x8000, 0x9, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x2, 0x8}, 0x20000, 0x7, 0x3, 0x4, 0xff, 0x1, 0x5}, r0, 0x5, r1, 0x2) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) close(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$kcm(0x29, 0x3, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r3, 0xb, 0xffffffffffffffff, 0x1) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000340)=0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000300)={0x3, 0x0, [0x0, 0x0, 0x0]}) 04:26:27 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c006800053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 612.042260][ T4242] FAULT_INJECTION: forcing a failure. [ 612.042260][ T4242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 612.110951][ T4242] CPU: 1 PID: 4242 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 612.119601][ T4242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.129967][ T4242] Call Trace: [ 612.133284][ T4242] dump_stack+0x197/0x210 [ 612.137644][ T4242] should_fail.cold+0xa/0x15 [ 612.142264][ T4242] ? fault_create_debugfs_attr+0x180/0x180 [ 612.148083][ T4242] ? ___might_sleep+0x163/0x2c0 [ 612.152962][ T4242] should_fail_alloc_page+0x50/0x60 [ 612.159221][ T4242] __alloc_pages_nodemask+0x1a1/0x910 [ 612.164616][ T4242] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 612.170199][ T4242] ? __alloc_pages_slowpath+0x2920/0x2920 [ 612.175958][ T4242] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 612.182315][ T4242] alloc_pages_current+0x107/0x210 [ 612.187445][ T4242] ? ___might_sleep+0x163/0x2c0 [ 612.192346][ T4242] __vmalloc_node_range+0x4f8/0x810 [ 612.197658][ T4242] __vmalloc+0x44/0x50 [ 612.201744][ T4242] ? pcpu_mem_zalloc+0x8a/0xf0 [ 612.207310][ T4242] pcpu_mem_zalloc+0x8a/0xf0 [ 612.211919][ T4242] pcpu_create_chunk+0xe0/0x7f0 [ 612.216881][ T4242] pcpu_alloc+0x10f3/0x1380 [ 612.221416][ T4242] ? pcpu_alloc_area+0x820/0x820 [ 612.226372][ T4242] ? bpf_map_area_alloc+0x20/0x30 [ 612.231430][ T4242] __alloc_percpu_gfp+0x28/0x30 [ 612.236327][ T4242] htab_map_alloc+0xdb9/0x11c0 [ 612.241328][ T4242] ? htab_map_update_elem+0xca0/0xca0 [ 612.246737][ T4242] __do_sys_bpf+0x478/0x3810 [ 612.251356][ T4242] ? bpf_prog_load+0x18f0/0x18f0 [ 612.256416][ T4242] ? __kasan_check_write+0x14/0x20 [ 612.261550][ T4242] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 612.267111][ T4242] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 612.272504][ T4242] ? wait_for_completion+0x440/0x440 [ 612.277818][ T4242] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 612.284110][ T4242] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 612.284127][ T4242] ? do_syscall_64+0x26/0x790 [ 612.284144][ T4242] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.284158][ T4242] ? do_syscall_64+0x26/0x790 [ 612.284181][ T4242] __x64_sys_bpf+0x73/0xb0 04:26:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000300053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000400053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000900053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:27 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x100000000000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 612.284199][ T4242] do_syscall_64+0xfa/0x790 [ 612.284215][ T4242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.284225][ T4242] RIP: 0033:0x45a6f9 [ 612.284243][ T4242] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.295237][ T4242] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 612.328902][ T4264] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 612.344355][ T4242] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 612.344363][ T4242] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 612.344370][ T4242] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 612.344376][ T4242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 612.344383][ T4242] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000a00053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:27 executing program 0 (fault-call:1 fault-nth:36): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:27 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x200000000000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:27 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:27 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff'}, 0x12, 0x0}, 0x0) [ 612.615672][ T4279] FAULT_INJECTION: forcing a failure. [ 612.615672][ T4279] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 612.643094][ T4279] CPU: 0 PID: 4279 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 612.651842][ T4279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.662114][ T4279] Call Trace: [ 612.665507][ T4279] dump_stack+0x197/0x210 [ 612.669855][ T4279] should_fail.cold+0xa/0x15 [ 612.674469][ T4279] ? fault_create_debugfs_attr+0x180/0x180 [ 612.680290][ T4279] ? ___might_sleep+0x163/0x2c0 [ 612.685289][ T4279] should_fail_alloc_page+0x50/0x60 [ 612.691453][ T4279] __alloc_pages_nodemask+0x1a1/0x910 [ 612.691468][ T4279] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 612.691482][ T4279] ? __alloc_pages_slowpath+0x2920/0x2920 [ 612.691505][ T4279] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 612.691524][ T4279] alloc_pages_current+0x107/0x210 [ 612.691534][ T4279] ? ___might_sleep+0x163/0x2c0 [ 612.691554][ T4279] __vmalloc_node_range+0x4f8/0x810 [ 612.730498][ T4279] __vmalloc+0x44/0x50 [ 612.734682][ T4279] ? pcpu_mem_zalloc+0x8a/0xf0 [ 612.739557][ T4279] pcpu_mem_zalloc+0x8a/0xf0 [ 612.744186][ T4279] pcpu_create_chunk+0xe0/0x7f0 [ 612.749064][ T4279] pcpu_alloc+0x10f3/0x1380 [ 612.753598][ T4279] ? pcpu_alloc_area+0x820/0x820 [ 612.758897][ T4279] ? bpf_map_area_alloc+0x20/0x30 [ 612.763947][ T4279] __alloc_percpu_gfp+0x28/0x30 [ 612.768810][ T4279] htab_map_alloc+0xdb9/0x11c0 [ 612.773783][ T4279] ? htab_map_update_elem+0xca0/0xca0 [ 612.779209][ T4279] __do_sys_bpf+0x478/0x3810 [ 612.784248][ T4279] ? bpf_prog_load+0x18f0/0x18f0 [ 612.789200][ T4279] ? __kasan_check_write+0x14/0x20 [ 612.794327][ T4279] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 612.799889][ T4279] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 612.807030][ T4279] ? wait_for_completion+0x440/0x440 [ 612.812350][ T4279] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 612.818624][ T4279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 612.824464][ T4279] ? do_syscall_64+0x26/0x790 [ 612.829428][ T4279] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.835502][ T4279] ? do_syscall_64+0x26/0x790 [ 612.835523][ T4279] __x64_sys_bpf+0x73/0xb0 [ 612.835537][ T4279] do_syscall_64+0xfa/0x790 [ 612.835553][ T4279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.835564][ T4279] RIP: 0033:0x45a6f9 04:26:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:27 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x400000000000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c005a00053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 612.835578][ T4279] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.835584][ T4279] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 612.835596][ T4279] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 612.835603][ T4279] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 612.835611][ T4279] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c006300053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 612.835619][ T4279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 612.835628][ T4279] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:28 executing program 0 (fault-call:1 fault-nth:37): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:28 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x4000000000000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:28 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:28 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:28 executing program 5: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x17, &(0x7f00000000c0), 0x86) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000300)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f') close(r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='\x00') close(r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c006800053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 613.215076][ T4308] FAULT_INJECTION: forcing a failure. [ 613.215076][ T4308] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 613.304186][ T4308] CPU: 0 PID: 4308 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 613.312834][ T4308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.323025][ T4308] Call Trace: [ 613.326340][ T4308] dump_stack+0x197/0x210 [ 613.330714][ T4308] should_fail.cold+0xa/0x15 [ 613.335342][ T4308] ? fault_create_debugfs_attr+0x180/0x180 [ 613.341608][ T4308] ? ___might_sleep+0x163/0x2c0 [ 613.346485][ T4308] should_fail_alloc_page+0x50/0x60 [ 613.351699][ T4308] __alloc_pages_nodemask+0x1a1/0x910 [ 613.357122][ T4308] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 613.362700][ T4308] ? __alloc_pages_slowpath+0x2920/0x2920 [ 613.368452][ T4308] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 613.374806][ T4308] alloc_pages_current+0x107/0x210 [ 613.379950][ T4308] ? ___might_sleep+0x163/0x2c0 [ 613.384822][ T4308] __vmalloc_node_range+0x4f8/0x810 [ 613.391174][ T4308] __vmalloc+0x44/0x50 [ 613.395436][ T4308] ? pcpu_mem_zalloc+0x8a/0xf0 [ 613.400487][ T4308] pcpu_mem_zalloc+0x8a/0xf0 [ 613.405102][ T4308] pcpu_create_chunk+0xe0/0x7f0 [ 613.409971][ T4308] pcpu_alloc+0x10f3/0x1380 [ 613.414495][ T4308] ? pcpu_alloc_area+0x820/0x820 [ 613.419446][ T4308] ? bpf_map_area_alloc+0x20/0x30 [ 613.424502][ T4308] __alloc_percpu_gfp+0x28/0x30 [ 613.429467][ T4308] htab_map_alloc+0xdb9/0x11c0 [ 613.434266][ T4308] ? htab_map_update_elem+0xca0/0xca0 [ 613.440791][ T4308] __do_sys_bpf+0x478/0x3810 [ 613.445423][ T4308] ? bpf_prog_load+0x18f0/0x18f0 [ 613.450480][ T4308] ? __kasan_check_write+0x14/0x20 [ 613.455619][ T4308] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 613.461195][ T4308] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 613.469131][ T4308] ? wait_for_completion+0x440/0x440 [ 613.473942][ T4329] __nla_validate_parse: 10 callbacks suppressed [ 613.473951][ T4329] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 613.474531][ T4308] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 613.474563][ T4308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 613.474579][ T4308] ? do_syscall_64+0x26/0x790 [ 613.474593][ T4308] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.474611][ T4308] ? do_syscall_64+0x26/0x790 [ 613.517545][ T4308] __x64_sys_bpf+0x73/0xb0 [ 613.521982][ T4308] do_syscall_64+0xfa/0x790 [ 613.526502][ T4308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.532403][ T4308] RIP: 0033:0x45a6f9 [ 613.536309][ T4308] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.555717][ T4331] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 613.556005][ T4308] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 613.574392][ T4308] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 613.582381][ T4308] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 613.590397][ T4308] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000202053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000203053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000204053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000205053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:28 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0xffffffffa0004000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 613.598572][ T4308] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 613.607103][ T4308] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:28 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:28 executing program 0 (fault-call:1 fault-nth:38): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 613.702531][ T4339] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000206053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:28 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:28 executing program 3: r0 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="d16e29c9180f07f50972be22a6d9ca48e5587d5d6538e3bcfc56fdee9896df394d382014db14f57f1a7eed4ee431008189c1b643806b", 0x36}, {&(0x7f0000000140)="1decb72900ae30177ff667fce31beb3e3a1e6b1fd4913c410821cd4c072ee3d3587886d0e9f1105462aa20d3c46a1da14a6d45b9fde0d477b280621903c803a290f57c4ab77dbf040218", 0x4a}, {&(0x7f00000001c0)="737628c264b076c532747cfaffaaabcd5b012155dd72c97941ec554e2c534830056e0cb1f6dabb5d458f489c4b926dc9b8d697807308b1270a2f5389b07625f8fe5f1610340c22a7703572b7c440b46bcb5d059c05d0c408d569d963f72482b6053900e006345400ac81fda8c5e21b5e5e87f1e4fc00d2bcc909582a22e887e0f371a4c3bc52fa2a28dc0d0ee9df99378e594b153df5d6720598c0c2debef9863ed4d58690fde89b141c065f07e555b7fbd7566bb83c630d2f4287ffdf27f62bc6e78f9708b9883f32e8e0a3722fe7fcf767c984af69db", 0xd7}, {&(0x7f0000000640)="498496ec156b669ae780a76bed2625a2a047f0b825f228a6fcd99fa59f09511323ba49d12ee2be00bc2f344275b75cdfcffdfc705c4bd181fbfc457e0618b1eaac784337530dc1ad30243bcc0dff457a2ae374fe2271bea71b7051fde376125a180164a45f2a0395690c9bde1d4b924f024aee1c5486830e88a26dd9c6379b8de0b115ae4d78c451358711307cc56335a5c9293eb6b77919", 0x98}, {&(0x7f0000000700)="139a7a32845d6587a09446316c80cf1b5ba394b92dc59f1627913f77e0f012c4092962706344f538e6537354516783247af58e316569d9fc79d38e5e2fb1325a18133d2002c0e5c652cb263111a3dee9aa3961fbb44056b508e9148c5dac5e9f5306197603570a6d8b3feff100d988a75642a587f9f1c6e1fc24f92762f1e56f4002cd5f73dac15ccbcc1a724225e92784d7a08bdad4dafdca3db79a081ea9e75d4223e8735ec664f854773710bb1a6865539855f2f2ce45903f81f09505a9aa0bb6fe109adcd50448c28d8f60f2", 0xce}], 0x5, &(0x7f0000000800)=[{0xb8, 0x116, 0xa4, "255f88e6969b0b96521ae06af4c7fcacd1ed52e39ef8ab1788df5bc07ba879e6a613f9dbaabeb2b884d11d726ebc2586cb61be8971df097b21a8f7f5694d1cc8ecf4d8cc83adc40db675153b20909e8df1241fe6b19997e21a0835ed511fd159ee6d53e982caf80ac860fd7f30d8c85f0fb867ae18c0bf1eab86c7e2b129ae22f6a0debb66026a54df623e3ce9dd85312068b09a7d2ef6841141e906c3ce483d16177e7dc9"}], 0xb8}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r5, 0xb, 0xffffffffffffffff, 0x1) write$cgroup_int(r5, &(0x7f0000000980)=0x4, 0x12) write$cgroup_type(r3, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r6, 0xb, 0xffffffffffffffff, 0x1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r7, 0xb, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f0000000900)={0x4, 0x70, 0x3, 0x2, 0xa9, 0xcd, 0x0, 0x0, 0x5c08, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x4, 0x5}, 0x120c0, 0x8, 0x0, 0x6, 0x956a, 0x0, 0x6}, r7, 0x3, r0, 0x865446facf4d9160) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$TUNSETVNETBE(r6, 0x400454de, &(0x7f0000000000)=0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 613.867595][ T4346] FAULT_INJECTION: forcing a failure. [ 613.867595][ T4346] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 613.888869][ T4349] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 613.926886][ T4346] CPU: 0 PID: 4346 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 613.937298][ T4346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.947895][ T4346] Call Trace: [ 613.951210][ T4346] dump_stack+0x197/0x210 [ 613.955587][ T4346] should_fail.cold+0xa/0x15 [ 613.960227][ T4346] ? fault_create_debugfs_attr+0x180/0x180 [ 613.966322][ T4346] ? ___might_sleep+0x163/0x2c0 [ 613.971474][ T4346] should_fail_alloc_page+0x50/0x60 [ 613.976706][ T4346] __alloc_pages_nodemask+0x1a1/0x910 [ 613.982102][ T4346] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 613.987853][ T4346] ? __alloc_pages_slowpath+0x2920/0x2920 [ 613.993699][ T4346] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 614.000099][ T4346] alloc_pages_current+0x107/0x210 [ 614.005558][ T4346] ? ___might_sleep+0x163/0x2c0 [ 614.010715][ T4346] __vmalloc_node_range+0x4f8/0x810 [ 614.015945][ T4346] __vmalloc+0x44/0x50 [ 614.020041][ T4346] ? pcpu_mem_zalloc+0x8a/0xf0 [ 614.024830][ T4346] pcpu_mem_zalloc+0x8a/0xf0 [ 614.029503][ T4346] pcpu_create_chunk+0xe0/0x7f0 [ 614.034544][ T4346] pcpu_alloc+0x10f3/0x1380 [ 614.039087][ T4346] ? pcpu_alloc_area+0x820/0x820 [ 614.044923][ T4346] ? bpf_map_area_alloc+0x20/0x30 [ 614.050439][ T4346] __alloc_percpu_gfp+0x28/0x30 [ 614.055313][ T4346] htab_map_alloc+0xdb9/0x11c0 [ 614.060122][ T4346] ? htab_map_update_elem+0xca0/0xca0 [ 614.065796][ T4346] __do_sys_bpf+0x478/0x3810 [ 614.070500][ T4346] ? bpf_prog_load+0x18f0/0x18f0 [ 614.075457][ T4346] ? __kasan_check_write+0x14/0x20 [ 614.080591][ T4346] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 614.086163][ T4346] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 614.091473][ T4346] ? wait_for_completion+0x440/0x440 [ 614.097226][ T4346] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 614.103510][ T4346] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 614.109005][ T4346] ? do_syscall_64+0x26/0x790 [ 614.113709][ T4346] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.119800][ T4346] ? do_syscall_64+0x26/0x790 [ 614.124542][ T4346] __x64_sys_bpf+0x73/0xb0 [ 614.130212][ T4346] do_syscall_64+0xfa/0x790 [ 614.134742][ T4346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.140650][ T4346] RIP: 0033:0x45a6f9 [ 614.144556][ T4346] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.166015][ T4346] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 04:26:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r2, 0x6, 0xffffffffffffffff, 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r3, 0xb, 0xffffffffffffffff, 0x1) close(r4) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x80, 0x8, 0xf5, 0xf9, 0x0, 0x4, 0x20000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x7f, 0x7, 0x0, 0x1, 0xffff, 0x7}, r2, 0x2, r4, 0xb) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r5, 0xb, 0xffffffffffffffff, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000680)={r5}) sendmsg$kcm(r6, &(0x7f0000002900)={&(0x7f00000006c0)=@l2={0x1f, 0x7ff, {0x0, 0x7, 0xda, 0x0, 0x3, 0x1}, 0x7, 0x5f}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000740)="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", 0x1000}], 0x1, &(0x7f0000001780)=[{0x60, 0x3a, 0x8, "2f56d50621d56eb3e1ac262d5df2199a858e06981026611501c834ff1b1065d74acec5edc989f85d253462332e5230ff1f52e9609011f7ffbf48edd4f846ab3e6b026bb8f865748568"}, {0x68, 0x110, 0x1000, "b0b1c083b39c9a75290487bede4eb80f0b060f1f2cdf860fb0597c82b565affe9a808c0d5a87a8a5a78deae7b45589c216cf9ad002ecd0fc04634f4c4109d79a36517bc6075394737429010a5ac8a102b6afea44ea9e"}, {0x1010, 0x3b79aa660d0dba91, 0xe57, "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"}, {0x98, 0x109, 0x7, "e8ff04e80960a761a59de439720662d11082ff2ebc72c013bb0d97ddcb323f9066824194f2b6559922db82709a694e16af2bd0c0a9fc564c27cac859b755e18709fa6c0bbb4bce4abe5c6cd9fe9019ed208689ee34c4fc9a7bb79dbf5c070ee1afadacafb22aa2356420f65ab71efbc7c787b2571afcf995deae47c5f63097144211978158cffeca"}], 0x1170}, 0x80) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:29 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000207053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:29 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x8, 0x1, 0x6, 0x1, 0x0, 0x7, 0x4869, 0xa, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x3}, 0xce87e47f6e141d35, 0xffffffff, 0x200, 0x1, 0xe0ca, 0x5, 0x100}, 0x0, 0xffffffffffffffff, r1, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:29 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r0, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x8d, 0x20, 0x8, 0x2, 0x0, 0x9c49, 0x800, 0xe, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x8108, 0x7, 0x6, 0x3, 0x8, 0x9, 0x1}, r0, 0xa, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'rdma'}, {0x50, 'io'}]}, 0xa) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r4, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 614.174446][ T4346] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 614.182437][ T4346] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 614.187919][ T4364] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 614.190502][ T4346] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 614.190511][ T4346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 614.190520][ T4346] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x2761, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x28, &(0x7f0000000300)}, 0x10) openat$cgroup_int(r2, &(0x7f00000004c0)='cgroup.max.descendants\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r3, 0xb, 0xffffffffffffffff, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/594], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x2ed, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795eca00", 0x0, 0x81, 0xf2ffffff, 0x7c, 0x6a, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x40) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) 04:26:29 executing program 0 (fault-call:1 fault-nth:39): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:29 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff'}, 0x12, 0x0}, 0x0) 04:26:29 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:29 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) socket$kcm(0x29, 0x5, 0x0) write$cgroup_type(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xdd1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c00020a053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 614.413355][ T4377] FAULT_INJECTION: forcing a failure. [ 614.413355][ T4377] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 614.469157][ T4377] CPU: 1 PID: 4377 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 614.477825][ T4377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.487888][ T4377] Call Trace: [ 614.491211][ T4377] dump_stack+0x197/0x210 [ 614.495572][ T4377] should_fail.cold+0xa/0x15 [ 614.500179][ T4377] ? fault_create_debugfs_attr+0x180/0x180 [ 614.500199][ T4377] ? ___might_sleep+0x163/0x2c0 [ 614.512254][ T4377] should_fail_alloc_page+0x50/0x60 [ 614.517594][ T4377] __alloc_pages_nodemask+0x1a1/0x910 [ 614.522990][ T4377] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 614.528644][ T4377] ? __alloc_pages_slowpath+0x2920/0x2920 [ 614.534488][ T4377] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 614.540753][ T4377] alloc_pages_current+0x107/0x210 [ 614.546234][ T4377] ? ___might_sleep+0x163/0x2c0 [ 614.551135][ T4377] __vmalloc_node_range+0x4f8/0x810 [ 614.556367][ T4377] __vmalloc+0x44/0x50 [ 614.560444][ T4377] ? pcpu_mem_zalloc+0x8a/0xf0 [ 614.560457][ T4377] pcpu_mem_zalloc+0x8a/0xf0 [ 614.560475][ T4377] pcpu_create_chunk+0xe0/0x7f0 [ 614.574677][ T4377] pcpu_alloc+0x10f3/0x1380 [ 614.579267][ T4377] ? pcpu_alloc_area+0x820/0x820 [ 614.585445][ T4377] ? bpf_map_area_alloc+0x20/0x30 [ 614.590544][ T4377] __alloc_percpu_gfp+0x28/0x30 [ 614.595526][ T4377] htab_map_alloc+0xdb9/0x11c0 [ 614.600320][ T4377] ? htab_map_update_elem+0xca0/0xca0 [ 614.605711][ T4377] __do_sys_bpf+0x478/0x3810 [ 614.605739][ T4377] ? bpf_prog_load+0x18f0/0x18f0 [ 614.615362][ T4377] ? __kasan_check_write+0x14/0x20 [ 614.620579][ T4377] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 614.626132][ T4377] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 614.626153][ T4377] ? wait_for_completion+0x440/0x440 [ 614.626175][ T4377] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 614.642981][ T4377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 614.648482][ T4377] ? do_syscall_64+0x26/0x790 [ 614.653175][ T4377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.659263][ T4377] ? do_syscall_64+0x26/0x790 [ 614.662378][ T4390] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 614.664317][ T4377] __x64_sys_bpf+0x73/0xb0 [ 614.664337][ T4377] do_syscall_64+0xfa/0x790 [ 614.664361][ T4377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.688565][ T4377] RIP: 0033:0x45a6f9 [ 614.692480][ T4377] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:26:29 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) close(r3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1acd00000) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 614.712089][ T4377] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 614.712102][ T4377] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 614.712109][ T4377] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 614.712117][ T4377] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 614.712124][ T4377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 614.712131][ T4377] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c00020e053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:29 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000)="6f3dcc5a3849f3c51b774350749f9849637c971ef7d864063411ee97d10c", &(0x7f00000000c0)=""/108}, 0x20) 04:26:29 executing program 0 (fault-call:1 fault-nth:40): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:30 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:30 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}, 0x12, 0x0}, 0x0) [ 614.981636][ T4405] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 615.092168][ T4411] FAULT_INJECTION: forcing a failure. [ 615.092168][ T4411] name failslab, interval 1, probability 0, space 0, times 0 [ 615.130906][ T4411] CPU: 0 PID: 4411 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 615.130916][ T4411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.130922][ T4411] Call Trace: [ 615.130944][ T4411] dump_stack+0x197/0x210 [ 615.130969][ T4411] should_fail.cold+0xa/0x15 [ 615.130991][ T4411] ? fault_create_debugfs_attr+0x180/0x180 [ 615.131011][ T4411] ? ___might_sleep+0x163/0x2c0 [ 615.131030][ T4411] __should_failslab+0x121/0x190 [ 615.131051][ T4411] should_failslab+0x9/0x14 [ 615.182895][ T4411] kmem_cache_alloc_node_trace+0x274/0x750 [ 615.188723][ T4411] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 615.194727][ T4411] ? apply_to_page_range+0x562/0x700 [ 615.200646][ T4411] __get_vm_area_node+0x12b/0x4f0 [ 615.205707][ T4411] __vmalloc_node_range+0xd4/0x810 [ 615.210846][ T4411] ? pcpu_mem_zalloc+0x8a/0xf0 [ 615.215643][ T4411] __vmalloc+0x44/0x50 [ 615.219906][ T4411] ? pcpu_mem_zalloc+0x8a/0xf0 [ 615.224705][ T4411] pcpu_mem_zalloc+0x8a/0xf0 [ 615.229319][ T4411] pcpu_create_chunk+0x12d/0x7f0 [ 615.234377][ T4411] pcpu_alloc+0x10f3/0x1380 [ 615.238913][ T4411] ? pcpu_alloc_area+0x820/0x820 [ 615.244058][ T4411] ? bpf_map_area_alloc+0x20/0x30 [ 615.249136][ T4411] __alloc_percpu_gfp+0x28/0x30 [ 615.251362][ T4419] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 615.254010][ T4411] htab_map_alloc+0xdb9/0x11c0 [ 615.254038][ T4411] ? htab_map_update_elem+0xca0/0xca0 [ 615.254056][ T4411] __do_sys_bpf+0x478/0x3810 [ 615.254075][ T4411] ? bpf_prog_load+0x18f0/0x18f0 [ 615.254090][ T4411] ? __kasan_check_write+0x14/0x20 [ 615.254112][ T4411] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 615.293809][ T4411] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 615.299221][ T4411] ? wait_for_completion+0x440/0x440 [ 615.304537][ T4411] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 615.310814][ T4411] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.317082][ T4411] ? do_syscall_64+0x26/0x790 [ 615.321796][ T4411] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.327887][ T4411] ? do_syscall_64+0x26/0x790 [ 615.332596][ T4411] __x64_sys_bpf+0x73/0xb0 [ 615.337041][ T4411] do_syscall_64+0xfa/0x790 [ 615.341585][ T4411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.347492][ T4411] RIP: 0033:0x45a6f9 [ 615.351437][ T4411] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.371057][ T4411] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 615.379487][ T4411] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:30 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xffffffff}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c00020f053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:30 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r1) perf_event_open(&(0x7f0000000880)={0x3, 0x70, 0x43, 0x1, 0x2, 0x80, 0x0, 0x32, 0x1000, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0xffffffff, 0xd143}, 0x20571, 0x3f, 0x5, 0x8, 0x2, 0x5, 0x8001}, 0x0, 0x0, r1, 0x1) r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) recvmsg(r4, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x9) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000200)=""/102, 0x66}, {&(0x7f0000000300)=""/47, 0x2f}, {&(0x7f00000003c0)=""/153, 0x99}, {&(0x7f0000000640)=""/126, 0x7e}, {&(0x7f00000006c0)=""/29, 0x1d}], 0x5, &(0x7f0000000780)=""/153, 0x99}, 0x101) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000248053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 615.387654][ T4411] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 615.395640][ T4411] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 615.403630][ T4411] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 615.411646][ T4411] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:30 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:30 executing program 0 (fault-call:1 fault-nth:41): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 615.530518][ T4434] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:30 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff'}, 0x12, 0x0}, 0x0) 04:26:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c00024c053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:30 executing program 3: r0 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x6, 0x6, 0x0, 0xcf, 0x0, 0xffffffffffff7fff, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x3, @perf_config_ext={0x3, 0x7}, 0x20000, 0x3, 0x59c, 0x7, 0x5, 0x7, 0x68fc}, 0x0, 0x6, r0, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r3) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0x9) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup(r3, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) close(r1) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:30 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) [ 615.713063][ T4444] FAULT_INJECTION: forcing a failure. [ 615.713063][ T4444] name failslab, interval 1, probability 0, space 0, times 0 [ 615.787942][ T4444] CPU: 0 PID: 4444 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 615.796589][ T4444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.806658][ T4444] Call Trace: [ 615.809969][ T4444] dump_stack+0x197/0x210 [ 615.814349][ T4444] should_fail.cold+0xa/0x15 [ 615.818984][ T4444] ? fault_create_debugfs_attr+0x180/0x180 [ 615.824809][ T4444] ? ___might_sleep+0x163/0x2c0 [ 615.829687][ T4444] __should_failslab+0x121/0x190 [ 615.834651][ T4444] should_failslab+0x9/0x14 [ 615.835702][ T4455] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 615.839172][ T4444] kmem_cache_alloc_node_trace+0x274/0x750 [ 615.839190][ T4444] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 615.839203][ T4444] ? apply_to_page_range+0x562/0x700 [ 615.839226][ T4444] __get_vm_area_node+0x12b/0x4f0 [ 615.870688][ T4444] __vmalloc_node_range+0xd4/0x810 [ 615.875850][ T4444] ? pcpu_mem_zalloc+0x8a/0xf0 [ 615.880649][ T4444] __vmalloc+0x44/0x50 04:26:30 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x448, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x254}, 0xffffffffffffffff, 0x7ffe, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000180)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) write$cgroup_type(r2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x0, 0x47, 0x8, 0x86, 0x0, 0x200, 0x0, 0x12, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8296d9783f9e9e26}, 0x10000, 0x1, 0x7, 0x5, 0x1, 0x9}, r4, 0x7, r2, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 615.884731][ T4444] ? pcpu_mem_zalloc+0x8a/0xf0 [ 615.889596][ T4444] pcpu_mem_zalloc+0x8a/0xf0 [ 615.894208][ T4444] pcpu_create_chunk+0x12d/0x7f0 [ 615.899163][ T4444] pcpu_alloc+0x10f3/0x1380 [ 615.903695][ T4444] ? pcpu_alloc_area+0x820/0x820 [ 615.908691][ T4444] ? bpf_map_area_alloc+0x20/0x30 [ 615.913740][ T4444] __alloc_percpu_gfp+0x28/0x30 [ 615.918611][ T4444] htab_map_alloc+0xdb9/0x11c0 [ 615.923524][ T4444] ? htab_map_update_elem+0xca0/0xca0 [ 615.928919][ T4444] __do_sys_bpf+0x478/0x3810 [ 615.933618][ T4444] ? bpf_prog_load+0x18f0/0x18f0 04:26:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000260053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 615.938571][ T4444] ? __kasan_check_write+0x14/0x20 [ 615.943692][ T4444] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 615.950385][ T4444] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 615.955790][ T4444] ? wait_for_completion+0x440/0x440 [ 615.961103][ T4444] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 615.967371][ T4444] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.973455][ T4444] ? do_syscall_64+0x26/0x790 [ 615.978174][ T4444] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.984282][ T4444] ? do_syscall_64+0x26/0x790 [ 615.988995][ T4444] __x64_sys_bpf+0x73/0xb0 [ 615.993419][ T4444] do_syscall_64+0xfa/0x790 [ 615.993439][ T4444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.993449][ T4444] RIP: 0033:0x45a6f9 [ 615.993463][ T4444] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.993471][ T4444] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 615.993483][ T4444] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 615.993490][ T4444] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 615.993498][ T4444] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 615.993506][ T4444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 615.993514][ T4444] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:31 executing program 0 (fault-call:1 fault-nth:42): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000268053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:31 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:31 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000008, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1a) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x70, 0x4, 0x80, 0x8, 0x1, 0x0, 0x40, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x7, @perf_config_ext={0x7, 0x9}, 0x4000, 0x80000001, 0x427, 0xb, 0x0, 0xd, 0xffcb}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) close(0xffffffffffffffff) 04:26:31 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}, 0x12, 0x0}, 0x0) [ 616.284622][ T4473] FAULT_INJECTION: forcing a failure. [ 616.284622][ T4473] name failslab, interval 1, probability 0, space 0, times 0 04:26:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c00026c053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 616.421037][ T4473] CPU: 1 PID: 4473 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 616.429694][ T4473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.439763][ T4473] Call Trace: [ 616.443077][ T4473] dump_stack+0x197/0x210 [ 616.447440][ T4473] should_fail.cold+0xa/0x15 [ 616.452090][ T4473] ? fault_create_debugfs_attr+0x180/0x180 [ 616.458621][ T4473] ? ___might_sleep+0x163/0x2c0 [ 616.463505][ T4473] __should_failslab+0x121/0x190 04:26:31 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 616.468591][ T4473] should_failslab+0x9/0x14 [ 616.473113][ T4473] kmem_cache_alloc_node_trace+0x274/0x750 [ 616.479008][ T4473] ? do_raw_spin_unlock+0x178/0x270 [ 616.484236][ T4473] __kmalloc_node+0x3d/0x70 [ 616.488772][ T4473] __vmalloc_node_range+0x1db/0x810 [ 616.494003][ T4473] __vmalloc+0x44/0x50 [ 616.498692][ T4473] ? pcpu_mem_zalloc+0x8a/0xf0 [ 616.498705][ T4473] pcpu_mem_zalloc+0x8a/0xf0 [ 616.498719][ T4473] pcpu_create_chunk+0x12d/0x7f0 [ 616.498736][ T4473] pcpu_alloc+0x10f3/0x1380 [ 616.498762][ T4473] ? pcpu_alloc_area+0x820/0x820 [ 616.513047][ T4473] ? bpf_map_area_alloc+0x20/0x30 [ 616.513076][ T4473] __alloc_percpu_gfp+0x28/0x30 [ 616.513099][ T4473] htab_map_alloc+0xdb9/0x11c0 [ 616.513129][ T4473] ? htab_map_update_elem+0xca0/0xca0 [ 616.542659][ T4473] __do_sys_bpf+0x478/0x3810 [ 616.547301][ T4473] ? bpf_prog_load+0x18f0/0x18f0 [ 616.552266][ T4473] ? __kasan_check_write+0x14/0x20 [ 616.557415][ T4473] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 616.562987][ T4473] ? rcu_read_lock_bh_held+0xb0/0xb0 04:26:31 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000000280)={0x3, 0x4, 0x2, 0x8}, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x8000000000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00 ', @ANYRES32=0x1, @ANYBLOB="9a89555f53843917"], &(0x7f0000000040)='GPL\x00', 0x40, 0xb7, &(0x7f00000000c0)=""/183, 0x41100, 0x0, [], 0x0, 0x3, r1, 0x8, &(0x7f0000000180)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x1, 0x4, 0x9}, 0x10, r4, r2}, 0x78) write$cgroup_type(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r7) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x3, 0x9, &(0x7f00000008c0)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r2}, @ldst={0x1, 0x0, 0x0, 0x5, 0x0, 0x4, 0x10}, @ldst={0x0, 0x0, 0x0, 0xe, 0xb, 0x0, 0x8}, @alu={0x3, 0x0, 0xac579067be116169, 0xa, 0x0, 0xd09ac30930a74d46}, @map={0x18, 0x2, 0x1, 0x0, r2}, @generic={0x40, 0x1, 0xe, 0x2, 0x7ff}, @call={0x85, 0x0, 0x0, 0x19}], &(0x7f0000000640)='GPL\x00', 0x1c4, 0x31, &(0x7f0000000940)=""/49, 0x40f00, 0x4, [], 0x0, 0x8, r6, 0x8, &(0x7f0000000980)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x5, 0xfffffff8, 0x40, 0x8}, 0x10, r4, r7}, 0x78) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r5, 0xb, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000840)={r5, &(0x7f0000000700)="95bd651172ba08b280c2d9337876dd4c3246e2b5f42aee0f4cf70726b88418627a6eeb6e3d9430cc253006d8742d032f26c63d24dc6efead822a8e8b3afda38d18b2d672c65eae1bdcbc6abfefa895da4564046c69ac6ba3154ce526815e3c12dcfafc40c3ab1a6026abe559064e3217c0c75551ed39942b1d894ae7fd83a515c0f18e79c7cfaca89065a0e035f5c894e1f985c4afcfb9800828fa", &(0x7f00000007c0)=""/106}, 0x20) [ 616.568302][ T4473] ? wait_for_completion+0x440/0x440 [ 616.573612][ T4473] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 616.579893][ T4473] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 616.585368][ T4473] ? do_syscall_64+0x26/0x790 [ 616.590069][ T4473] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.596495][ T4473] ? do_syscall_64+0x26/0x790 [ 616.601197][ T4473] __x64_sys_bpf+0x73/0xb0 [ 616.601213][ T4473] do_syscall_64+0xfa/0x790 [ 616.601233][ T4473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.601243][ T4473] RIP: 0033:0x45a6f9 [ 616.601261][ T4473] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.641937][ T4473] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 616.650545][ T4473] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 616.650554][ T4473] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000274053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 616.650563][ T4473] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 616.650572][ T4473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 616.650581][ T4473] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:31 executing program 0 (fault-call:1 fault-nth:43): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:31 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:31 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c00027a053582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000007380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007500)=[{&(0x7f0000007400)=""/193, 0x35}], 0x1, &(0x7f0000007540)=""/217, 0xfffffffffffffd3d}, 0x3) r3 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) recvmsg(r3, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c000)}, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000540)={'\x00\x00\x001\xefcc\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x1000}) ioctl$SIOCSIFHWADDR(r6, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r6, @ANYRESOCT=r2, @ANYRES16=0x0]], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, r5, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, &(0x7f000000c180)={0x4, 0x7, 0x0, 0x9}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0x20000000000001f0, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x4, 0xffffffffffffff56, 0x0, 0x41000, 0x2, [], r4, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4}, 0xaa, 0x10, &(0x7f0000000500)={0x4, 0xe, 0xfff, 0x7fff}, 0x10}, 0x432) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000007680)=r4) sendmsg$kcm(r0, &(0x7f0000002f80)={&(0x7f0000001cc0)=@can={0x1d, r4}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000001d40)="e56367bb4bb8eeaeede956fcf6d235e746b3174a71f49fb9026e02bb45edddf35cd75d99d9a10b386fd75b5c4f85882aece8d62434c02978c5175803901daab1eb1cd75b719ca3f4893730971f3bf1f4a6f594d64c5513e997e329021f32fbd29f727dd697a81117510da80014407538eef338ab7820f1e0dba10d0bfc41dd748bfeb31dd1b6b29c7e58b617df4f34552fed56ab650c472cf23c1cb1b2e8f9be27451c0b049b324c743b6efc64b4a4140e40f13f532b2f4fd06b504bf69f4463008d90642ffdcfa8a73e79b3c66129355c48a14f2ca44fb6d27298d850bd", 0xde}, {&(0x7f0000001e40)="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", 0x1000}, {&(0x7f0000002e40)="ca074ce736061094c0e50a5d46e5117ca2845c628a64b36c6f37155622a9608748c147767d300c48bced7e6ba8c9148a6f4dc2a21f167f09d095715d2ce8d8f0c746daab870da0f9b83836fb246f09b6b543d454e1d5747b3b5677c763158ee743881d5a80ffd1cf964f0f5aa72007ba41ecc03f3fa510260da7db9c8d1a025599e551c6226651b69e91", 0x8a}, {&(0x7f0000002f00)="4b2589d77abcdc7e6b", 0x9}], 0x4}, 0x60000893) r7 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r8, 0xb, 0xffffffffffffffff, 0x1) ioctl$TUNDETACHFILTER(r8, 0x401054d6, 0x0) close(r7) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 616.881985][ T4505] FAULT_INJECTION: forcing a failure. [ 616.881985][ T4505] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 617.040863][ T4505] CPU: 1 PID: 4505 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 617.049541][ T4505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.059910][ T4505] Call Trace: [ 617.063224][ T4505] dump_stack+0x197/0x210 [ 617.067723][ T4505] should_fail.cold+0xa/0x15 [ 617.072646][ T4505] ? fault_create_debugfs_attr+0x180/0x180 [ 617.078484][ T4505] ? ___might_sleep+0x163/0x2c0 [ 617.083368][ T4505] should_fail_alloc_page+0x50/0x60 04:26:32 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0xc0, &(0x7f0000008ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008980), 0x0, 0x0, 0x0, &(0x7f00000089c0)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000008a00)={0x5, 0x7, 0x0, 0x9ed3}, &(0x7f0000008a40)=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r2, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=""/126, 0x7e, r2}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=r3, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r4, 0xb, 0xffffffffffffffff, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r5, 0xb, 0xffffffffffffffff, 0x1) close(r6) r7 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000440)={0xc, 0x2}, 0x0, 0x0, &(0x7f0000000480)={0x0, 0xe, 0x7fff, 0xffffffff}, &(0x7f00000004c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0xc}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r7, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='(\']@\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r6, 0x0, 0x89, &(0x7f0000000640)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', r8}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r10, 0xb, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0xb7f1bb221fe7fb97, 0x70, 0x80, 0xfb, 0x0, 0x7f, 0x0, 0x335a8b89, 0x800, 0xd, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x6, @perf_bp={&(0x7f0000000240), 0x8}, 0x10000, 0x9, 0x81, 0x8, 0x6, 0x80, 0xc503}, r9, 0xa, r10, 0xd) openat$cgroup_subtree(r4, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 617.088848][ T4505] __alloc_pages_nodemask+0x1a1/0x910 [ 617.094249][ T4505] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 617.099823][ T4505] ? __alloc_pages_slowpath+0x2920/0x2920 [ 617.105584][ T4505] ? kasan_unpoison_shadow+0x35/0x50 [ 617.110900][ T4505] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 617.117172][ T4505] alloc_pages_current+0x107/0x210 [ 617.122326][ T4505] __vmalloc_node_range+0x4f8/0x810 [ 617.127790][ T4505] __vmalloc+0x44/0x50 [ 617.131887][ T4505] ? pcpu_mem_zalloc+0x8a/0xf0 [ 617.136678][ T4505] pcpu_mem_zalloc+0x8a/0xf0 [ 617.141302][ T4505] pcpu_create_chunk+0x12d/0x7f0 [ 617.146361][ T4505] pcpu_alloc+0x10f3/0x1380 [ 617.150899][ T4505] ? pcpu_alloc_area+0x820/0x820 [ 617.155861][ T4505] ? bpf_map_area_alloc+0x20/0x30 [ 617.161153][ T4505] __alloc_percpu_gfp+0x28/0x30 [ 617.166040][ T4505] htab_map_alloc+0xdb9/0x11c0 [ 617.170988][ T4505] ? htab_map_update_elem+0xca0/0xca0 [ 617.176385][ T4505] __do_sys_bpf+0x478/0x3810 04:26:32 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0x5b, 0x0, 0x4, 0x9, 0x0, 0x616, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000000), 0x4}, 0xe0b61a6b6715fd27, 0x7ff, 0x1f, 0x1, 0x6, 0xffffffff, 0x81}, r1, 0x8, 0xffffffffffffffff, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 617.186617][ T4505] ? bpf_prog_load+0x18f0/0x18f0 [ 617.192192][ T4505] ? __kasan_check_write+0x14/0x20 [ 617.197331][ T4505] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 617.202906][ T4505] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 617.208219][ T4505] ? wait_for_completion+0x440/0x440 [ 617.213655][ T4505] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 617.219943][ T4505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 617.225441][ T4505] ? do_syscall_64+0x26/0x790 [ 617.230272][ T4505] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.236363][ T4505] ? do_syscall_64+0x26/0x790 [ 617.241073][ T4505] __x64_sys_bpf+0x73/0xb0 [ 617.245524][ T4505] do_syscall_64+0xfa/0x790 [ 617.250063][ T4505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.255979][ T4505] RIP: 0033:0x45a6f9 [ 617.259893][ T4505] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.279654][ T4505] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 04:26:32 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x4, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x12) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x20, 0xd5, 0x0, 0x0, 0x7fff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x7}, 0x100, 0xfff, 0x8, 0x8, 0xb3, 0xfff, 0x3615}, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = openat$cgroup_ro(r2, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200063582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 617.288173][ T4505] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 617.296162][ T4505] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 617.304153][ T4505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 617.312139][ T4505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 617.320157][ T4505] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200093582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 617.399266][ T4538] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:32 executing program 0 (fault-call:1 fault-nth:44): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:32 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xa000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r2}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r3, &(0x7f0000000700)="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", &(0x7f0000000180)=""/30, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r2, 0x6, 0x10}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r2, 0x7fff, 0x10}, 0xc) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r5, &(0x7f0000010e80)={&(0x7f0000010cc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000010e40)=[{&(0x7f0000010d40)=""/116, 0x74}, {&(0x7f0000010dc0)=""/94, 0x5e}], 0x2}, 0x10042) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0xc0, &(0x7f0000008ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008980), 0x0, 0x0, 0x0, &(0x7f00000089c0)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000008a00)={0x5, 0x7, 0x0, 0x9ed3}, &(0x7f0000008a40)=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r7, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r8, 0xb, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000010f40)={0xf, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@map={0x18, 0x2, 0x1, 0x0, r4}, @generic={0x5, 0x2, 0xc, 0x9, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00', 0x200, 0x75, &(0x7f0000000100)=""/117, 0x40f00, 0x1, [], r6, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000010ec0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000010f00)={0x0, 0x3, 0x2, 0x25f}, 0x10, r7, r8}, 0x78) gettid() openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r9, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 617.488929][ T4541] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:32 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x12, 0x0}, 0x0) 04:26:32 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f'}, 0x12, 0x0}, 0x0) 04:26:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c0002000a3582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:32 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='cpuacct.stat\x00', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TUNSETLINK(r1, 0x400454cd, 0x200) close(0xffffffffffffffff) [ 617.701851][ T4559] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 617.704389][ T4558] FAULT_INJECTION: forcing a failure. [ 617.704389][ T4558] name failslab, interval 1, probability 0, space 0, times 0 [ 617.756929][ T4558] CPU: 0 PID: 4558 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 617.765580][ T4558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.775645][ T4558] Call Trace: [ 617.778975][ T4558] dump_stack+0x197/0x210 [ 617.783327][ T4558] should_fail.cold+0xa/0x15 [ 617.787940][ T4558] ? fault_create_debugfs_attr+0x180/0x180 [ 617.793772][ T4558] ? ___might_sleep+0x163/0x2c0 [ 617.798645][ T4558] __should_failslab+0x121/0x190 [ 617.803598][ T4558] should_failslab+0x9/0x14 [ 617.808105][ T4558] kmem_cache_alloc_node_trace+0x274/0x750 [ 617.813925][ T4558] ? do_raw_spin_unlock+0x178/0x270 [ 617.819142][ T4558] __kmalloc_node+0x3d/0x70 [ 617.823641][ T4558] __vmalloc_node_range+0x1db/0x810 [ 617.823664][ T4558] __vmalloc+0x44/0x50 [ 617.823679][ T4558] ? pcpu_mem_zalloc+0x8a/0xf0 [ 617.823692][ T4558] pcpu_mem_zalloc+0x8a/0xf0 [ 617.823706][ T4558] pcpu_create_chunk+0x12d/0x7f0 [ 617.823721][ T4558] pcpu_alloc+0x10f3/0x1380 [ 617.823743][ T4558] ? pcpu_alloc_area+0x820/0x820 [ 617.823762][ T4558] ? bpf_map_area_alloc+0x20/0x30 [ 617.851795][ T4558] __alloc_percpu_gfp+0x28/0x30 [ 617.851812][ T4558] htab_map_alloc+0xdb9/0x11c0 [ 617.851838][ T4558] ? htab_map_update_elem+0xca0/0xca0 [ 617.851858][ T4558] __do_sys_bpf+0x478/0x3810 [ 617.881570][ T4558] ? bpf_prog_load+0x18f0/0x18f0 [ 617.886522][ T4558] ? __kasan_check_write+0x14/0x20 [ 617.892091][ T4558] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 617.897669][ T4558] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 617.902973][ T4558] ? wait_for_completion+0x440/0x440 [ 617.908285][ T4558] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 617.914550][ T4558] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 617.914564][ T4558] ? do_syscall_64+0x26/0x790 [ 617.914585][ T4558] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.930808][ T4558] ? do_syscall_64+0x26/0x790 [ 617.935498][ T4558] __x64_sys_bpf+0x73/0xb0 [ 617.935517][ T4558] do_syscall_64+0xfa/0x790 [ 617.935539][ T4558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.950328][ T4558] RIP: 0033:0x45a6f9 04:26:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x6, 0x8, &(0x7f00000000c0)) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:32 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200403582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 617.954234][ T4558] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.967853][ T4568] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 617.973846][ T4558] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 617.973861][ T4558] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 617.973869][ T4558] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000740)=[{&(0x7f00000000c0)=""/140, 0x8c}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000200)=""/55, 0x37}, {&(0x7f0000000240)=""/79, 0x4f}, {&(0x7f00000003c0)=""/141, 0x8d}, {&(0x7f00000002c0)=""/106, 0x6a}, {&(0x7f0000000640)=""/139, 0x8b}, {&(0x7f0000000700)=""/56, 0x38}], 0x8, &(0x7f00000007c0)=""/108, 0x6c}, 0x2011) 04:26:33 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) [ 617.973878][ T4558] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 617.973886][ T4558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 617.973893][ T4558] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x292, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x40000008000, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:33 executing program 0 (fault-call:1 fault-nth:45): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:33 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c0002005a3582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000000040)='./cgroup\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x3f, 0x1, 0x40, 0x1, 0x0, 0x100, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xaea, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x28808, 0x1, 0x0, 0x8, 0x3e, 0x7, 0xa553}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:33 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff'}, 0x12, 0x0}, 0x0) 04:26:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x14, 0x0, 0x0) socketpair$unix(0x1, 0xaa6f30ce6d3bf0e1, 0x0, &(0x7f00000000c0)) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x20}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000004c0)={r1, r2}) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)="24762c262eb58bda14330785070f335ff76601f23e5f27aa5b5e2806a4a640c7ed6834cb4df57381581c13f26fe27a738a4445cfe2c08a99bbaa7a71e11749e8d3e8b8dad2dad58a8ae22e29d18dd41ba3d49d75eaf8dc6b5a9505db8d95222fcf2f51c97c30cf4419bd70030347a2f631f828ffb4803c521489dac2be2cc255d65c9b7a869f67d879b3dad4fadb99b8e79b1a0a5eb1643e9d047d8af4b92563891d7f2f73e2ad1d86fbc98382c840923af94262978113ddde036603bfaedcbdb613212316", 0xc5}, {&(0x7f0000000100)="a0818c140fee255be202c9bc9768ab47655b3759e6db2f6e49a16590231bcd2445c3d8337b5a12f108c9d575037e3554f8", 0x31}, {&(0x7f0000004900)="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", 0x124}, {&(0x7f0000000200)="aed5b96ebef0d5039d824061dfe65b1cff63572f66c580f59d3c062863a5e4fb9701d91e4a124e59b513e4f63f7e32ac77dc3e71cf1c1c3efd8865e9d2d6817bcc9c1aefd36455677e04c8cbf4425c426ff649943d7c0ab6ee1948c9", 0x5c}], 0x4, &(0x7f0000004a40)=[{0x1010, 0x88, 0x1, "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"}, {0x40, 0x88, 0xffffffff, "4dc80d831f9c40486c804a098c6fa5bd79216c0977c2683006c75d056ef25b0685ee9597316fc8babc1d143c"}, {0x118, 0x114, 0x7, "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"}, {0x1010, 0x6, 0x401, "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"}, {0x88, 0x3b9, 0x9, "6c89023daadd3beceda5723f53d6fb4203b5ce80837c06a1752a7f877af70ed6e0ec8d1a5d9a0c3d420c8281c01a770cb53183ea2152565c6596a224b7a3676c64692ec450f1a23be65309906dcef52f512b84339c9b53b6e4c6d518abadca05a90f1e785ae3292f63c6db15217a85a20d1d"}, {0x28, 0x0, 0x7fffffff, "4fe46e98d61efbbc5e3582a0ca02d36ed9fd11b5325b7a"}, {0x48, 0x103, 0xca9, "e906212b6aa698e8f0ebebccaa7cdfc8774ebece800a5f83a6961f441bebefa5ccea9e902d6ec80c040f580cef82159faf9938bb56e1fc02"}], 0x2270}, 0x40014) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 618.370224][ T4596] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 618.465011][ T4603] FAULT_INJECTION: forcing a failure. [ 618.465011][ T4603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200683582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 618.520855][ T4603] CPU: 1 PID: 4603 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 618.529500][ T4603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.529512][ T4603] Call Trace: [ 618.542886][ T4603] dump_stack+0x197/0x210 [ 618.547324][ T4603] should_fail.cold+0xa/0x15 [ 618.552976][ T4603] ? fault_create_debugfs_attr+0x180/0x180 [ 618.558791][ T4603] ? ___might_sleep+0x163/0x2c0 [ 618.564192][ T4603] should_fail_alloc_page+0x50/0x60 04:26:33 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0xf, 0x0}, 0x0) 04:26:33 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) [ 618.569405][ T4603] __alloc_pages_nodemask+0x1a1/0x910 [ 618.574795][ T4603] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 618.580354][ T4603] ? __alloc_pages_slowpath+0x2920/0x2920 [ 618.586177][ T4603] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 618.592435][ T4603] alloc_pages_current+0x107/0x210 [ 618.597647][ T4603] ? ___might_sleep+0x163/0x2c0 [ 618.602538][ T4603] __vmalloc_node_range+0x4f8/0x810 [ 618.607768][ T4603] __vmalloc+0x44/0x50 [ 618.611846][ T4603] ? pcpu_mem_zalloc+0x8a/0xf0 [ 618.611861][ T4603] pcpu_mem_zalloc+0x8a/0xf0 [ 618.611875][ T4603] pcpu_create_chunk+0x12d/0x7f0 [ 618.611894][ T4603] pcpu_alloc+0x10f3/0x1380 [ 618.631233][ T4603] ? pcpu_alloc_area+0x820/0x820 [ 618.636276][ T4603] ? bpf_map_area_alloc+0x20/0x30 [ 618.641333][ T4603] __alloc_percpu_gfp+0x28/0x30 [ 618.646742][ T4603] htab_map_alloc+0xdb9/0x11c0 [ 618.651891][ T4603] ? htab_map_update_elem+0xca0/0xca0 [ 618.657287][ T4603] __do_sys_bpf+0x478/0x3810 [ 618.661901][ T4603] ? bpf_prog_load+0x18f0/0x18f0 [ 618.666846][ T4603] ? __kasan_check_write+0x14/0x20 [ 618.671973][ T4603] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 618.671988][ T4603] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 618.672003][ T4603] ? wait_for_completion+0x440/0x440 [ 618.672023][ T4603] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 618.672049][ T4603] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 618.672066][ T4603] ? do_syscall_64+0x26/0x790 [ 618.705287][ T4603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.711496][ T4603] ? do_syscall_64+0x26/0x790 [ 618.716285][ T4603] __x64_sys_bpf+0x73/0xb0 [ 618.720906][ T4603] do_syscall_64+0xfa/0x790 [ 618.725433][ T4603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.731335][ T4603] RIP: 0033:0x45a6f9 [ 618.735347][ T4603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.754970][ T4603] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 618.763400][ T4603] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:33 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 618.771390][ T4603] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 618.779371][ T4603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 618.780971][ T4624] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 618.787343][ T4603] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 618.787352][ T4603] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:33 executing program 0 (fault-call:1 fault-nth:46): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 618.847998][ T4624] __nla_validate_parse: 10 callbacks suppressed [ 618.848006][ T4624] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:34 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) sendmsg$tipc(r1, &(0x7f0000000100)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x6d1580f5a89dea6e, {{0x40, 0x3}, 0x2}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000140)="bad806b18a325d1dc8b5632daeb025a0a0043524b5a918e3f770ef64ab440ac47aafb0f741068325fff80017ade37aa5964d6663bd05443ca286060fd7fca13784e7489fa6a3fc0ddc47c6f8a657f849996555f1959f3c76b2dddbf34df827043d50b0a102034f2d1178be", 0x6b}, {&(0x7f00000001c0)="5e9a43f660891c4a9c324136434fe27b4662b5cfdfa1adb727ec39ac922920485a93d92d928fbabc24eeea67abaaafa5e8819b2dbab2b351099f751c53c5851693a83d296d5c2bbc797af0617e5699bec5d0650185d39e1f653de8f9e9d0a309eba9849605f2b8f63fcca35dac58ee300d26366eef291cf7de762bbe9d29db2ddf376e515de51f82a1f3b30f3206471a558cf60eee6141e665189cd5ee34fdc885e2604ded03bf8d6ecf2143cd859811fcb313b5680b951309d85c8c8b8da555461dd1a7887c3699aa8b0065ccca0ba7ff40e1ceb385f87a5a3a6d8ce968e9e6d4e0a9f29aa65ae746baec24", 0xec}, {&(0x7f00000000c0)="3fad75bc3b6607ed93a01760b44cbca71d53082929c1ca4d6927afcd1aaffe6d71bf85f6c83a350604b6", 0x2a}, {&(0x7f00000002c0)="65244ae902355c3bd39150a753f5d80d8d7e1bd173b0efca6217b1c071f182b93d43a76a8b9f2f55696d01946a25984104cda1f985afab48a9ebea27206ce6b47ca3e3b21184399fe972044a9ca3b0a6fc14cf873979172a14fff7a86554d2516973091999482166c7", 0x69}, {&(0x7f0000000700)="07e435535e47c1eb382146ed7b6bcb314b0012c583fa9e691b458302195c71aa194928739d32bc06ded0ca2f99e6a4660664eb8f7878e3079e3492f56ba168c4a1bb6d2e8a6319fc8f602758a8fbf97e93a030b948beaf57dfe231f93106441771f89fe6ff25dc9d518fb8b0a424d8b7050f704f523ac050df4e7af2601cb1057797874f18f800b1e1ceb8da2103d1d08f26a8ce325de2e81655d35d2bf83b4b41588719793c20eb21861da4db7a344cb4303c9f0533d5131a0d1544bbf7b7ed37", 0xc1}, {&(0x7f00000003c0)="ad8a3cce6ec9efe0f76b7051c27b9e57a97bba0094c8a50cd2c635875a61a229035f1e2914c753184196292c37d65042cf1d5d291b13a6aab9cebb1b974fbb7efc1919f19b3575db197a6ff1617d008818e35d5594764ab34aa72844ab3b", 0x5e}], 0x6, 0x0, 0x0, 0x425b99e86c48c8c}, 0x8000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:34 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x200000d2, 0x0}, 0x0) [ 618.947344][ T4634] FAULT_INJECTION: forcing a failure. [ 618.947344][ T4634] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200043582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x100, 0x4}, 0x0, 0x2000000000000, 0xffffffffffffffff, 0x3) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 619.065934][ T4634] CPU: 1 PID: 4634 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 619.074590][ T4634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.084662][ T4634] Call Trace: [ 619.088153][ T4634] dump_stack+0x197/0x210 [ 619.092513][ T4634] should_fail.cold+0xa/0x15 [ 619.097142][ T4634] ? fault_create_debugfs_attr+0x180/0x180 [ 619.103060][ T4634] ? ___might_sleep+0x163/0x2c0 [ 619.107936][ T4634] should_fail_alloc_page+0x50/0x60 [ 619.113160][ T4634] __alloc_pages_nodemask+0x1a1/0x910 [ 619.118568][ T4634] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 619.124138][ T4634] ? __alloc_pages_slowpath+0x2920/0x2920 [ 619.129891][ T4634] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 619.130269][ T4647] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 619.136144][ T4634] alloc_pages_current+0x107/0x210 [ 619.136160][ T4634] ? ___might_sleep+0x163/0x2c0 [ 619.136180][ T4634] __vmalloc_node_range+0x4f8/0x810 [ 619.136204][ T4634] __vmalloc+0x44/0x50 04:26:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200063582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 619.136219][ T4634] ? pcpu_mem_zalloc+0x8a/0xf0 [ 619.136232][ T4634] pcpu_mem_zalloc+0x8a/0xf0 [ 619.136250][ T4634] pcpu_create_chunk+0x12d/0x7f0 [ 619.162260][ T4647] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 619.163546][ T4634] pcpu_alloc+0x10f3/0x1380 [ 619.163573][ T4634] ? pcpu_alloc_area+0x820/0x820 [ 619.163587][ T4634] ? bpf_map_area_alloc+0x20/0x30 [ 619.163613][ T4634] __alloc_percpu_gfp+0x28/0x30 [ 619.196687][ T4634] htab_map_alloc+0xdb9/0x11c0 [ 619.211338][ T4634] ? htab_map_update_elem+0xca0/0xca0 [ 619.216738][ T4634] __do_sys_bpf+0x478/0x3810 [ 619.221441][ T4634] ? bpf_prog_load+0x18f0/0x18f0 [ 619.221458][ T4634] ? __kasan_check_write+0x14/0x20 [ 619.221475][ T4634] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 619.221490][ T4634] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 619.221506][ T4634] ? wait_for_completion+0x440/0x440 [ 619.221525][ T4634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 619.221552][ T4634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 619.247755][ T4634] ? do_syscall_64+0x26/0x790 [ 619.247773][ T4634] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.247787][ T4634] ? do_syscall_64+0x26/0x790 [ 619.247817][ T4634] __x64_sys_bpf+0x73/0xb0 [ 619.270502][ T4634] do_syscall_64+0xfa/0x790 [ 619.270519][ T4634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.270530][ T4634] RIP: 0033:0x45a6f9 [ 619.270545][ T4634] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:26:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffa51a, 0x5, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x1, 0x1, 0x1, 0xf9, 0x0, 0x2, 0xc0288, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000140), 0xe}, 0x100, 0x3, 0x10000, 0x9, 0x5a, 0x4222, 0x3}, 0x0, 0xf, r1, 0x2) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r4, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="2d4e2b72b5202b6d656d6f727d200072646d612024cf3409d79a812d72646d6120066d656d6f7279a02b637008000000000000002b6370"], 0x37) close(0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) [ 619.270553][ T4634] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 619.270568][ T4634] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 619.270577][ T4634] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 619.270585][ T4634] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 619.270593][ T4634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 619.270608][ T4634] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 619.285990][ T4653] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 619.377660][ T4653] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:34 executing program 0 (fault-call:1 fault-nth:47): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:34 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x4}, 0x0) 04:26:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200093582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:34 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}, 0x12, 0x0}, 0x0) 04:26:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)={0x1, 0xa, [@local, @local, @local, @local, @local, @random="884fe50e4997", @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @link_local, @local]}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000100)=0x800) 04:26:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 619.583229][ T4667] FAULT_INJECTION: forcing a failure. [ 619.583229][ T4667] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 619.612673][ T4670] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 619.655872][ T4667] CPU: 0 PID: 4667 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 619.664529][ T4667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.664536][ T4667] Call Trace: [ 619.664560][ T4667] dump_stack+0x197/0x210 [ 619.664584][ T4667] should_fail.cold+0xa/0x15 [ 619.664602][ T4667] ? fault_create_debugfs_attr+0x180/0x180 [ 619.664617][ T4667] ? ___might_sleep+0x163/0x2c0 [ 619.664640][ T4667] should_fail_alloc_page+0x50/0x60 [ 619.664655][ T4667] __alloc_pages_nodemask+0x1a1/0x910 [ 619.664671][ T4667] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 619.664690][ T4667] ? __alloc_pages_slowpath+0x2920/0x2920 [ 619.690076][ T4670] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 619.692873][ T4667] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 619.692892][ T4667] alloc_pages_current+0x107/0x210 [ 619.692906][ T4667] ? ___might_sleep+0x163/0x2c0 [ 619.692925][ T4667] __vmalloc_node_range+0x4f8/0x810 [ 619.692950][ T4667] __vmalloc+0x44/0x50 [ 619.692965][ T4667] ? pcpu_mem_zalloc+0x8a/0xf0 [ 619.692978][ T4667] pcpu_mem_zalloc+0x8a/0xf0 [ 619.692992][ T4667] pcpu_create_chunk+0x12d/0x7f0 [ 619.693010][ T4667] pcpu_alloc+0x10f3/0x1380 [ 619.721496][ T4667] ? pcpu_alloc_area+0x820/0x820 [ 619.721512][ T4667] ? bpf_map_area_alloc+0x20/0x30 [ 619.721535][ T4667] __alloc_percpu_gfp+0x28/0x30 [ 619.721552][ T4667] htab_map_alloc+0xdb9/0x11c0 [ 619.721580][ T4667] ? htab_map_update_elem+0xca0/0xca0 [ 619.721594][ T4667] __do_sys_bpf+0x478/0x3810 04:26:34 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0xfd, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x1000}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c0002000a3582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 619.721614][ T4667] ? bpf_prog_load+0x18f0/0x18f0 [ 619.810407][ T4667] ? __kasan_check_write+0x14/0x20 [ 619.815550][ T4667] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 619.821116][ T4667] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 619.826418][ T4667] ? wait_for_completion+0x440/0x440 [ 619.831789][ T4667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 619.831817][ T4667] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 619.831830][ T4667] ? do_syscall_64+0x26/0x790 [ 619.831844][ T4667] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.831855][ T4667] ? do_syscall_64+0x26/0x790 [ 619.831875][ T4667] __x64_sys_bpf+0x73/0xb0 [ 619.831892][ T4667] do_syscall_64+0xfa/0x790 [ 619.831908][ T4667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.831918][ T4667] RIP: 0033:0x45a6f9 [ 619.831933][ T4667] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:26:34 executing program 0 (fault-call:1 fault-nth:48): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 619.831940][ T4667] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 619.831954][ T4667] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 619.831961][ T4667] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 619.831968][ T4667] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 619.831976][ T4667] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 619.831983][ T4667] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 619.965705][ T4686] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 619.974669][ T4686] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 620.005019][ T4689] FAULT_INJECTION: forcing a failure. 04:26:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c0002005a3582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 620.005019][ T4689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 620.032053][ T4689] CPU: 0 PID: 4689 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 620.040693][ T4689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.051189][ T4689] Call Trace: [ 620.051218][ T4689] dump_stack+0x197/0x210 [ 620.051243][ T4689] should_fail.cold+0xa/0x15 [ 620.051263][ T4689] ? fault_create_debugfs_attr+0x180/0x180 [ 620.051279][ T4689] ? ___might_sleep+0x163/0x2c0 [ 620.051304][ T4689] should_fail_alloc_page+0x50/0x60 [ 620.051317][ T4689] __alloc_pages_nodemask+0x1a1/0x910 [ 620.051333][ T4689] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 620.051346][ T4689] ? __alloc_pages_slowpath+0x2920/0x2920 [ 620.051369][ T4689] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 620.063616][ T4689] alloc_pages_current+0x107/0x210 [ 620.063631][ T4689] ? ___might_sleep+0x163/0x2c0 [ 620.063651][ T4689] __vmalloc_node_range+0x4f8/0x810 [ 620.079969][ T4689] __vmalloc+0x44/0x50 [ 620.079985][ T4689] ? pcpu_mem_zalloc+0x8a/0xf0 [ 620.080004][ T4689] pcpu_mem_zalloc+0x8a/0xf0 [ 620.090109][ T4693] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 620.091265][ T4689] pcpu_create_chunk+0x12d/0x7f0 [ 620.091283][ T4689] pcpu_alloc+0x10f3/0x1380 [ 620.091305][ T4689] ? pcpu_alloc_area+0x820/0x820 [ 620.091320][ T4689] ? bpf_map_area_alloc+0x20/0x30 [ 620.091344][ T4689] __alloc_percpu_gfp+0x28/0x30 [ 620.091358][ T4689] htab_map_alloc+0xdb9/0x11c0 [ 620.091393][ T4689] ? htab_map_update_elem+0xca0/0xca0 [ 620.109530][ T4689] __do_sys_bpf+0x478/0x3810 [ 620.109550][ T4689] ? bpf_prog_load+0x18f0/0x18f0 [ 620.109568][ T4689] ? __kasan_check_write+0x14/0x20 [ 620.192531][ T4689] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 620.198110][ T4689] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 620.203439][ T4689] ? wait_for_completion+0x440/0x440 [ 620.208753][ T4689] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 04:26:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200683582c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200050a82c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 620.213450][ T4698] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 620.215021][ T4689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 620.215040][ T4689] ? do_syscall_64+0x26/0x790 [ 620.234475][ T4689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.240560][ T4689] ? do_syscall_64+0x26/0x790 [ 620.245267][ T4689] __x64_sys_bpf+0x73/0xb0 [ 620.249707][ T4689] do_syscall_64+0xfa/0x790 [ 620.254236][ T4689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.260142][ T4689] RIP: 0033:0x45a6f9 [ 620.264051][ T4689] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 620.283748][ T4689] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 620.283762][ T4689] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 620.283769][ T4689] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 620.283776][ T4689] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x5) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x28, &(0x7f00000000c0)}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:35 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x40000}, 0x0) 04:26:35 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) [ 620.283784][ T4689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 620.283791][ T4689] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:35 executing program 0 (fault-call:1 fault-nth:49): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 620.368709][ T4703] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400440, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r3, 0xb, 0xffffffffffffffff, 0x1) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x4, 0x81, 0x8, 0x419}, {0x100, 0x81, 0x5, 0x2}]}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1ff) close(0xffffffffffffffff) 04:26:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200052382c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:35 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0xffffff7f}, 0x0) [ 620.509392][ T4708] FAULT_INJECTION: forcing a failure. [ 620.509392][ T4708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:35 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f'}, 0x12, 0x0}, 0x0) [ 620.662902][ T4724] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 620.683920][ T4708] CPU: 0 PID: 4708 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 620.692565][ T4708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.702637][ T4708] Call Trace: [ 620.705953][ T4708] dump_stack+0x197/0x210 04:26:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200052b82c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 620.710314][ T4708] should_fail.cold+0xa/0x15 [ 620.714932][ T4708] ? fault_create_debugfs_attr+0x180/0x180 [ 620.720759][ T4708] ? ___might_sleep+0x163/0x2c0 [ 620.725644][ T4708] should_fail_alloc_page+0x50/0x60 [ 620.730884][ T4708] __alloc_pages_nodemask+0x1a1/0x910 [ 620.736269][ T4708] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 620.741830][ T4708] ? __alloc_pages_slowpath+0x2920/0x2920 [ 620.747585][ T4708] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 620.753859][ T4708] alloc_pages_current+0x107/0x210 [ 620.758983][ T4708] ? ___might_sleep+0x163/0x2c0 [ 620.763836][ T4708] __vmalloc_node_range+0x4f8/0x810 [ 620.763864][ T4708] __vmalloc+0x44/0x50 [ 620.763880][ T4708] ? pcpu_mem_zalloc+0x8a/0xf0 [ 620.763894][ T4708] pcpu_mem_zalloc+0x8a/0xf0 [ 620.763914][ T4708] pcpu_create_chunk+0x12d/0x7f0 [ 620.763932][ T4708] pcpu_alloc+0x10f3/0x1380 [ 620.763954][ T4708] ? pcpu_alloc_area+0x820/0x820 [ 620.763969][ T4708] ? bpf_map_area_alloc+0x20/0x30 [ 620.763992][ T4708] __alloc_percpu_gfp+0x28/0x30 [ 620.764011][ T4708] htab_map_alloc+0xdb9/0x11c0 [ 620.811803][ T4708] ? htab_map_update_elem+0xca0/0xca0 [ 620.817202][ T4708] __do_sys_bpf+0x478/0x3810 [ 620.821816][ T4708] ? bpf_prog_load+0x18f0/0x18f0 [ 620.826777][ T4708] ? __kasan_check_write+0x14/0x20 [ 620.828379][ T4733] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 620.831904][ T4708] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 620.831921][ T4708] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 620.831937][ T4708] ? wait_for_completion+0x440/0x440 [ 620.831958][ T4708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 04:26:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200052d82c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 620.831986][ T4708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 620.831999][ T4708] ? do_syscall_64+0x26/0x790 [ 620.832014][ T4708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.832027][ T4708] ? do_syscall_64+0x26/0x790 [ 620.832046][ T4708] __x64_sys_bpf+0x73/0xb0 [ 620.832065][ T4708] do_syscall_64+0xfa/0x790 [ 620.893653][ T4708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.899552][ T4708] RIP: 0033:0x45a6f9 [ 620.903446][ T4708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 620.903453][ T4708] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 620.903466][ T4708] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 620.903474][ T4708] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 620.903481][ T4708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb22171f2328616d9, 0xf, &(0x7f0000000000)=@raw=[@map={0x18, 0x8, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x71}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x6, 0x6be8ea531b83f065, 0xfffffffffffffff4, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x2}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3b8, 0x0, 0x0, 0x0, 0xff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfff}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0x4e, &(0x7f0000000100)=""/78, 0x41000, 0x1, [], 0x0, 0x2a67b41b8505da2e, r2, 0x8, &(0x7f0000000180)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xb, 0x84e4, 0x5}, 0x10, 0x0, r1}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r3, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000007380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007500)=[{&(0x7f0000007400)=""/193, 0x35}], 0x1, &(0x7f0000007540)=""/217, 0xfffffffffffffd3d}, 0x3) r9 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r9, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) recvmsg(r9, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c000)}, 0x1) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r11, 0x0, 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000540)={'\x00\x00\x001\xefcc\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x1000}) ioctl$SIOCSIFHWADDR(r12, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r12, @ANYRESOCT=r8, @ANYRES16=0x0]], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r10, 0x0, r11, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, &(0x7f000000c180)={0x4, 0x7, 0x0, 0x9}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0x20000000000001f0, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x4, 0xffffffffffffff56, 0x0, 0x41000, 0x2, [], r10, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4}, 0xaa, 0x10, &(0x7f0000000500)={0x4, 0xe, 0xfff, 0x7fff}, 0x10}, 0x432) ioctl$TUNSETIFINDEX(r7, 0x400454da, &(0x7f0000007680)=r10) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r13) write$cgroup_type(r13, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r14, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r14, 0xc0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=0x3f, 0x0, 0x0, 0x0, &(0x7f00000007c0)={0x9, 0x1}, 0x0, 0x0, &(0x7f0000000800)={0x4, 0xc, 0x3, 0xfffffff9}, &(0x7f0000000840)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=0xffffffffffffffff}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x943, 0x0, 0x0, 0x0, 0x80000001}, [@map_val={0x18, 0x4, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x40}, @map_val={0x18, 0x3, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x3cf}]}, &(0x7f00000003c0)='GPL\x00', 0x490, 0x70, &(0x7f0000000400)=""/112, 0x40f00, 0x0, [], r10, 0x6, r13, 0x8, &(0x7f0000000700)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0x9, 0x8b, 0x10000}, 0x10, r15}, 0x78) write$cgroup_type(r5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053082c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:36 executing program 0 (fault-call:1 fault-nth:50): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 620.903489][ T4708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 620.903496][ T4708] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 620.970779][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 620.979257][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 620.985162][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 620.991012][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 620.996941][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 621.002777][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:26:36 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:36 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x4000000000000}, 0x0) [ 621.136115][ T4746] FAULT_INJECTION: forcing a failure. [ 621.136115][ T4746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 621.191037][ T4746] CPU: 1 PID: 4746 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 621.203338][ T4746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.213411][ T4746] Call Trace: [ 621.216723][ T4746] dump_stack+0x197/0x210 [ 621.221089][ T4746] should_fail.cold+0xa/0x15 [ 621.225714][ T4746] ? fault_create_debugfs_attr+0x180/0x180 [ 621.231542][ T4746] ? ___might_sleep+0x163/0x2c0 [ 621.236432][ T4746] should_fail_alloc_page+0x50/0x60 [ 621.241740][ T4746] __alloc_pages_nodemask+0x1a1/0x910 [ 621.247150][ T4746] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 621.252726][ T4746] ? __alloc_pages_slowpath+0x2920/0x2920 [ 621.258504][ T4746] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 621.264772][ T4746] alloc_pages_current+0x107/0x210 [ 621.269896][ T4746] ? ___might_sleep+0x163/0x2c0 [ 621.274767][ T4746] __vmalloc_node_range+0x4f8/0x810 [ 621.280025][ T4746] __vmalloc+0x44/0x50 [ 621.284113][ T4746] ? pcpu_mem_zalloc+0x8a/0xf0 [ 621.288904][ T4746] pcpu_mem_zalloc+0x8a/0xf0 [ 621.293519][ T4746] pcpu_create_chunk+0x12d/0x7f0 [ 621.298481][ T4746] pcpu_alloc+0x10f3/0x1380 [ 621.303013][ T4746] ? pcpu_alloc_area+0x820/0x820 [ 621.307967][ T4746] ? bpf_map_area_alloc+0x20/0x30 [ 621.313018][ T4746] __alloc_percpu_gfp+0x28/0x30 [ 621.317982][ T4746] htab_map_alloc+0xdb9/0x11c0 [ 621.322777][ T4746] ? htab_map_update_elem+0xca0/0xca0 [ 621.328163][ T4746] __do_sys_bpf+0x478/0x3810 [ 621.328186][ T4746] ? bpf_prog_load+0x18f0/0x18f0 [ 621.328202][ T4746] ? __kasan_check_write+0x14/0x20 [ 621.328219][ T4746] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 621.328238][ T4746] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 621.342857][ T4746] ? wait_for_completion+0x440/0x440 [ 621.342884][ T4746] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 621.342912][ T4746] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 621.342933][ T4746] ? do_syscall_64+0x26/0x790 [ 621.359037][ T4746] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.359059][ T4746] ? do_syscall_64+0x26/0x790 [ 621.370746][ T4746] __x64_sys_bpf+0x73/0xb0 [ 621.370763][ T4746] do_syscall_64+0xfa/0x790 [ 621.370785][ T4746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.400990][ T4746] RIP: 0033:0x45a6f9 [ 621.404905][ T4746] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 621.425076][ T4746] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 621.433506][ T4746] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], 0x1}, 0x20) 04:26:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200055a82c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200056882c137153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 621.441497][ T4746] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 621.449481][ T4746] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 621.457467][ T4746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 621.465562][ T4746] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0x2, 0xffffffffffffffff, 0x1) openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r3) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f00000001c0)='syz0\x00', 0x1ff) r5 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r5, 0x6, 0xffffffffffffffff, 0x8) r6 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) recvmsg(r6, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r6) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x6, 0x2, 0x1, 0x2, 0x0, 0x4, 0x10, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x31b2ccdc, 0x6}, 0x4000, 0x80000000, 0x8, 0x9, 0x4, 0x800, 0xfff}, r5, 0x10, r6, 0x11) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r4, 0x0, 0x26e1, 0x0) write$cgroup_type(r7, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:36 executing program 0 (fault-call:1 fault-nth:51): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:36 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:36 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0xffffff7f00000000}, 0x0) 04:26:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7d16, 0xfffffffffffffffe}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c10a153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 621.768684][ T4775] FAULT_INJECTION: forcing a failure. [ 621.768684][ T4775] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)=r1) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r3) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2c, 0x1, 0x3e30, 0xff19, 0x611, 0x1, 0x5, [], 0x0, r4, 0x1, 0x5}, 0x3c) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000007380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007500)=[{&(0x7f0000007400)=""/193, 0x35}], 0x1, &(0x7f0000007540)=""/217, 0xfffffffffffffd3d}, 0x3) r8 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r8, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) recvmsg(r8, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c000)}, 0x1) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r10, 0x0, 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000540)={'\x00\x00\x001\xefcc\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x1000}) ioctl$SIOCSIFHWADDR(r11, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r11, @ANYRESOCT=r7, @ANYRES16=0x0]], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r9, 0x0, r10, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, &(0x7f000000c180)={0x4, 0x7, 0x0, 0x9}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0x20000000000001f0, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x4, 0xffffffffffffff56, 0x0, 0x41000, 0x2, [], r9, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4}, 0xaa, 0x10, &(0x7f0000000500)={0x4, 0xe, 0xfff, 0x7fff}, 0x10}, 0x432) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000007680)=r9) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r12, 0xb, 0xffffffffffffffff, 0x1) r13 = openat$cgroup_ro(r12, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xb, 0xa, &(0x7f00000000c0)=@raw=[@exit, @ldst={0x3, 0x1, 0x3, 0x9, 0x5, 0xfffffffffffffffe, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0x5, 0x3, 0x4, 0xfffffffffffffffc}, @map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @generic={0x0, 0x2, 0xb, 0x100, 0x8}, @alu={0x7, 0x1, 0xc, 0x4}, @generic={0x3, 0x9, 0x9, 0x3, 0x6}, @map_val={0x18, 0x9, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x7, [], r9, 0xe, r1, 0x8, &(0x7f0000000180)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xd, 0x7, 0x5}, 0x10, 0x0, r13}, 0x78) close(0xffffffffffffffff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) [ 621.850988][ T4775] CPU: 1 PID: 4775 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 621.859647][ T4775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.869717][ T4775] Call Trace: [ 621.873030][ T4775] dump_stack+0x197/0x210 [ 621.877390][ T4775] should_fail.cold+0xa/0x15 [ 621.882012][ T4775] ? fault_create_debugfs_attr+0x180/0x180 [ 621.887926][ T4775] ? ___might_sleep+0x163/0x2c0 [ 621.892812][ T4775] should_fail_alloc_page+0x50/0x60 [ 621.898028][ T4775] __alloc_pages_nodemask+0x1a1/0x910 [ 621.903417][ T4775] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 621.908983][ T4775] ? __alloc_pages_slowpath+0x2920/0x2920 [ 621.917267][ T4775] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 621.923559][ T4775] alloc_pages_current+0x107/0x210 [ 621.928693][ T4775] ? ___might_sleep+0x163/0x2c0 [ 621.933570][ T4775] __vmalloc_node_range+0x4f8/0x810 [ 621.938804][ T4775] __vmalloc+0x44/0x50 [ 621.942913][ T4775] ? pcpu_mem_zalloc+0x8a/0xf0 [ 621.947700][ T4775] pcpu_mem_zalloc+0x8a/0xf0 [ 621.952312][ T4775] pcpu_create_chunk+0x12d/0x7f0 [ 621.957265][ T4775] pcpu_alloc+0x10f3/0x1380 [ 621.961790][ T4775] ? pcpu_alloc_area+0x820/0x820 [ 621.966742][ T4775] ? bpf_map_area_alloc+0x20/0x30 [ 621.971886][ T4775] __alloc_percpu_gfp+0x28/0x30 [ 621.976786][ T4775] htab_map_alloc+0xdb9/0x11c0 [ 621.981584][ T4775] ? htab_map_update_elem+0xca0/0xca0 [ 621.986973][ T4775] __do_sys_bpf+0x478/0x3810 [ 621.991584][ T4775] ? bpf_prog_load+0x18f0/0x18f0 [ 621.996550][ T4775] ? __kasan_check_write+0x14/0x20 [ 622.001680][ T4775] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 622.007247][ T4775] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 622.012555][ T4775] ? wait_for_completion+0x440/0x440 [ 622.017894][ T4775] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 622.024177][ T4775] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 622.029698][ T4775] ? do_syscall_64+0x26/0x790 [ 622.034424][ T4775] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.040517][ T4775] ? do_syscall_64+0x26/0x790 [ 622.045308][ T4775] __x64_sys_bpf+0x73/0xb0 [ 622.049745][ T4775] do_syscall_64+0xfa/0x790 [ 622.054281][ T4775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.060231][ T4775] RIP: 0033:0x45a6f9 [ 622.064141][ T4775] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 622.085151][ T4775] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 622.093582][ T4775] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c15a153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c168153e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c1375a3e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137683e37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137155a37090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137156837090400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 622.101914][ T4775] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 622.109904][ T4775] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 622.117906][ T4775] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 622.125930][ T4775] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:37 executing program 0 (fault-call:1 fault-nth:52): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:37 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0xf, 0x0}, 0x0) 04:26:37 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x4}, 0x0) [ 622.319808][ T4813] FAULT_INJECTION: forcing a failure. [ 622.319808][ T4813] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 622.341996][ T4813] CPU: 1 PID: 4813 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 622.350611][ T4813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.360677][ T4813] Call Trace: [ 622.364035][ T4813] dump_stack+0x197/0x210 [ 622.368393][ T4813] should_fail.cold+0xa/0x15 [ 622.373010][ T4813] ? fault_create_debugfs_attr+0x180/0x180 [ 622.378842][ T4813] ? ___might_sleep+0x163/0x2c0 [ 622.383736][ T4813] should_fail_alloc_page+0x50/0x60 [ 622.388956][ T4813] __alloc_pages_nodemask+0x1a1/0x910 [ 622.394430][ T4813] ? __alloc_pages_slowpath+0x2920/0x2920 [ 622.400174][ T4813] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 622.405748][ T4813] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 622.411752][ T4813] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 622.418018][ T4813] alloc_pages_current+0x107/0x210 [ 622.423154][ T4813] __get_free_pages+0xc/0x40 [ 622.427765][ T4813] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 622.433428][ T4813] apply_to_page_range+0x445/0x700 [ 622.438828][ T4813] ? memset+0x40/0x40 [ 622.442836][ T4813] kasan_populate_vmalloc+0x68/0x90 [ 622.448064][ T4813] __vmalloc_node_range+0x47e/0x810 [ 622.453295][ T4813] __vmalloc+0x44/0x50 [ 622.457478][ T4813] ? pcpu_mem_zalloc+0x8a/0xf0 [ 622.462261][ T4813] pcpu_mem_zalloc+0x8a/0xf0 [ 622.466879][ T4813] pcpu_create_chunk+0x12d/0x7f0 [ 622.472621][ T4813] pcpu_alloc+0x10f3/0x1380 [ 622.477153][ T4813] ? pcpu_alloc_area+0x820/0x820 [ 622.482108][ T4813] ? bpf_map_area_alloc+0x20/0x30 [ 622.487164][ T4813] __alloc_percpu_gfp+0x28/0x30 [ 622.492030][ T4813] htab_map_alloc+0xdb9/0x11c0 [ 622.496820][ T4813] ? htab_map_update_elem+0xca0/0xca0 [ 622.502218][ T4813] __do_sys_bpf+0x478/0x3810 [ 622.506831][ T4813] ? bpf_prog_load+0x18f0/0x18f0 [ 622.512046][ T4813] ? __kasan_check_write+0x14/0x20 [ 622.517181][ T4813] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 622.522745][ T4813] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 622.528052][ T4813] ? wait_for_completion+0x440/0x440 [ 622.533370][ T4813] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 622.539651][ T4813] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 622.545482][ T4813] ? do_syscall_64+0x26/0x790 [ 622.550177][ T4813] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.556277][ T4813] ? do_syscall_64+0x26/0x790 [ 622.561077][ T4813] __x64_sys_bpf+0x73/0xb0 [ 622.565520][ T4813] do_syscall_64+0xfa/0x790 [ 622.570047][ T4813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.575953][ T4813] RIP: 0033:0x45a6f9 [ 622.579866][ T4813] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 622.600215][ T4813] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 622.609345][ T4813] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x94b94887aa28d49c}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) close(r0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:37 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) write$cgroup_type(r0, &(0x7f0000000300)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x8240, 0x0) close(r2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r4, 0xb, 0xffffffffffffffff, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r5, 0xb, 0xffffffffffffffff, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xf, 0x4, 0x401, 0x4, 0x0, r4, 0x4, [], 0x0, r5, 0x1, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000140)="6fcc93c7f10ca79ea86a5ae80e18d4175d316e311edeb519ff6e91df00e1807c252c0af15ef48f24421944691f7d0583eefae60197c1cc4ef0f7e7e16570aa2987e00bf7", &(0x7f00000001c0)="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", 0x1ed1c28b74af5cc8}, 0x20) close(0xffffffffffffffff) 04:26:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e0a090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r0, 0x14}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400400, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000040)=0x8) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000000}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 04:26:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e5a090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e68090400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:37 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) [ 622.618379][ T4813] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 622.626370][ T4813] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 622.634360][ T4813] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 622.642723][ T4813] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:37 executing program 3: r0 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r3, 0x6, 0xffffffffffffffff, 0x8) write$cgroup_pid(r2, &(0x7f0000000180)=r3, 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) r6 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r6, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xff, 0x0, 0x20, 0x2, 0x0, 0x100000001, 0x1000, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x4000, 0x3, 0x0, 0x10, 0xffffffffffffff01, 0xfffffffa, 0xfff}, r6, 0xd, r2, 0x8) r7 = openat$cgroup_int(r2, &(0x7f00000001c0)='io.weight\x00', 0x2, 0x0) close(r7) [ 622.767683][ T4843] validate_nla: 18 callbacks suppressed [ 622.767693][ T4843] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:37 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x40000}, 0x0) 04:26:37 executing program 0 (fault-call:1 fault-nth:53): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:37 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x200000d2, 0x0}, 0x0) 04:26:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37030000802f64170400bd", 0x2e}], 0x1}, 0x0) [ 622.960829][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 622.966661][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 622.968728][ T4856] FAULT_INJECTION: forcing a failure. [ 622.968728][ T4856] name failslab, interval 1, probability 0, space 0, times 0 [ 622.996085][ T4856] CPU: 0 PID: 4856 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 623.004819][ T4856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.014894][ T4856] Call Trace: [ 623.018215][ T4856] dump_stack+0x197/0x210 [ 623.022627][ T4856] should_fail.cold+0xa/0x15 [ 623.027681][ T4856] ? fault_create_debugfs_attr+0x180/0x180 [ 623.033520][ T4856] ? ___might_sleep+0x163/0x2c0 [ 623.038402][ T4856] __should_failslab+0x121/0x190 [ 623.043368][ T4856] should_failslab+0x9/0x14 [ 623.047895][ T4856] kmem_cache_alloc_node_trace+0x274/0x750 [ 623.053723][ T4856] ? __sanitizer_cov_trace_cmp8+0x18/0x20 04:26:38 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r2) close(r2) [ 623.059489][ T4856] ? apply_to_page_range+0x562/0x700 [ 623.064975][ T4856] __get_vm_area_node+0x12b/0x4f0 [ 623.070025][ T4856] __vmalloc_node_range+0xd4/0x810 [ 623.075163][ T4856] ? pcpu_mem_zalloc+0x8a/0xf0 [ 623.080336][ T4856] __vmalloc+0x44/0x50 [ 623.084433][ T4856] ? pcpu_mem_zalloc+0x8a/0xf0 [ 623.089608][ T4856] pcpu_mem_zalloc+0x8a/0xf0 [ 623.095578][ T4856] pcpu_create_chunk+0x196/0x7f0 [ 623.101679][ T4856] pcpu_alloc+0x10f3/0x1380 04:26:38 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) close(0xffffffffffffffff) [ 623.103426][ T4863] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 623.106218][ T4856] ? pcpu_alloc_area+0x820/0x820 [ 623.106236][ T4856] ? bpf_map_area_alloc+0x20/0x30 [ 623.106269][ T4856] __alloc_percpu_gfp+0x28/0x30 [ 623.129170][ T4856] htab_map_alloc+0xdb9/0x11c0 [ 623.134078][ T4856] ? htab_map_update_elem+0xca0/0xca0 [ 623.139580][ T4856] __do_sys_bpf+0x478/0x3810 [ 623.144287][ T4856] ? bpf_prog_load+0x18f0/0x18f0 [ 623.149239][ T4856] ? __kasan_check_write+0x14/0x20 [ 623.154366][ T4856] ? __mutex_unlock_slowpath+0xf0/0x6a0 04:26:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e370a0000802f64170400bd", 0x2e}], 0x1}, 0x0) [ 623.160460][ T4856] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 623.165858][ T4856] ? wait_for_completion+0x440/0x440 [ 623.171170][ T4856] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 623.177474][ T4856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 623.183008][ T4856] ? do_syscall_64+0x26/0x790 [ 623.187729][ T4856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.194184][ T4856] ? do_syscall_64+0x26/0x790 [ 623.198868][ T4856] __x64_sys_bpf+0x73/0xb0 [ 623.203287][ T4856] do_syscall_64+0xfa/0x790 [ 623.203307][ T4856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.203317][ T4856] RIP: 0033:0x45a6f9 [ 623.203330][ T4856] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 623.203338][ T4856] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 623.203350][ T4856] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 623.203357][ T4856] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 623.203364][ T4856] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 623.203371][ T4856] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 623.203379][ T4856] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 623.303781][ T4874] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:38 executing program 3: perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1}, 0x830, 0xfffffffffffffff7, 0x2dfa}, 0xffffffffffffffff, 0x8004, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37020400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:38 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x4}, 0x0) 04:26:38 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) close(0xffffffffffffffff) [ 623.519812][ T4888] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:38 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 04:26:38 executing program 0 (fault-call:1 fault-nth:54): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:38 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x40000}, 0x0) [ 623.724876][ T4898] FAULT_INJECTION: forcing a failure. [ 623.724876][ T4898] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x8000000000000000, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37030400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x844, 0x0, 0x3}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 623.820221][ T4907] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 623.856939][ T4898] CPU: 0 PID: 4898 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 623.865590][ T4898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.875660][ T4898] Call Trace: [ 623.878978][ T4898] dump_stack+0x197/0x210 [ 623.883336][ T4898] should_fail.cold+0xa/0x15 [ 623.887940][ T4898] ? fault_create_debugfs_attr+0x180/0x180 [ 623.893759][ T4898] ? ___might_sleep+0x163/0x2c0 [ 623.898634][ T4898] should_fail_alloc_page+0x50/0x60 [ 623.903859][ T4898] __alloc_pages_nodemask+0x1a1/0x910 [ 623.909243][ T4898] ? find_held_lock+0x35/0x130 [ 623.914014][ T4898] ? __alloc_pages_slowpath+0x2920/0x2920 04:26:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37040400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 623.914033][ T4898] ? lock_downgrade+0x920/0x920 [ 623.914049][ T4898] ? rwlock_bug.part.0+0x90/0x90 [ 623.914064][ T4898] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 623.914081][ T4898] alloc_pages_current+0x107/0x210 [ 623.914099][ T4898] __get_free_pages+0xc/0x40 [ 623.914112][ T4898] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 623.914131][ T4898] apply_to_page_range+0x445/0x700 [ 623.914146][ T4898] ? memset+0x40/0x40 [ 623.914164][ T4898] kasan_populate_vmalloc+0x68/0x90 [ 623.914179][ T4898] __vmalloc_node_range+0x47e/0x810 [ 623.914202][ T4898] __vmalloc+0x44/0x50 [ 623.976036][ T4898] ? pcpu_mem_zalloc+0x8a/0xf0 [ 623.978531][ T4918] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 623.980845][ T4898] pcpu_mem_zalloc+0x8a/0xf0 [ 623.980863][ T4898] pcpu_create_chunk+0x12d/0x7f0 [ 623.980880][ T4898] pcpu_alloc+0x10f3/0x1380 [ 623.980903][ T4898] ? pcpu_alloc_area+0x820/0x820 [ 623.980918][ T4898] ? bpf_map_area_alloc+0x20/0x30 [ 623.980941][ T4898] __alloc_percpu_gfp+0x28/0x30 04:26:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37050400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 623.980958][ T4898] htab_map_alloc+0xdb9/0x11c0 [ 623.980982][ T4898] ? htab_map_update_elem+0xca0/0xca0 [ 623.980996][ T4898] __do_sys_bpf+0x478/0x3810 [ 623.981016][ T4898] ? bpf_prog_load+0x18f0/0x18f0 [ 623.990570][ T4918] __nla_validate_parse: 17 callbacks suppressed [ 623.990578][ T4918] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 623.994985][ T4898] ? __kasan_check_write+0x14/0x20 [ 623.995002][ T4898] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 623.995016][ T4898] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 623.995032][ T4898] ? wait_for_completion+0x440/0x440 [ 623.995055][ T4898] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 623.995085][ T4898] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 623.995097][ T4898] ? do_syscall_64+0x26/0x790 [ 623.995111][ T4898] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.995121][ T4898] ? do_syscall_64+0x26/0x790 [ 623.995143][ T4898] __x64_sys_bpf+0x73/0xb0 [ 624.039392][ T4898] do_syscall_64+0xfa/0x790 [ 624.054893][ T4898] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:26:39 executing program 0 (fault-call:1 fault-nth:55): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:39 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r1, 0xf}, 0x10) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 624.054906][ T4898] RIP: 0033:0x45a6f9 [ 624.054922][ T4898] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.054936][ T4898] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 624.086362][ T4920] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 624.088868][ T4898] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37060400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 624.088878][ T4898] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 624.088886][ T4898] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 624.088895][ T4898] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 624.088903][ T4898] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 624.176088][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 624.192668][ T4920] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 624.257926][ T4926] FAULT_INJECTION: forcing a failure. [ 624.257926][ T4926] name failslab, interval 1, probability 0, space 0, times 0 [ 624.284283][ T4926] CPU: 1 PID: 4926 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 624.292934][ T4926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.303025][ T4926] Call Trace: [ 624.306340][ T4926] dump_stack+0x197/0x210 [ 624.310704][ T4926] should_fail.cold+0xa/0x15 [ 624.315341][ T4926] ? fault_create_debugfs_attr+0x180/0x180 [ 624.321175][ T4926] ? ___might_sleep+0x163/0x2c0 [ 624.326065][ T4926] __should_failslab+0x121/0x190 [ 624.331028][ T4926] should_failslab+0x9/0x14 [ 624.335553][ T4926] kmem_cache_alloc_node_trace+0x274/0x750 [ 624.341402][ T4926] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 624.347152][ T4926] ? apply_to_page_range+0x562/0x700 [ 624.352639][ T4926] __get_vm_area_node+0x12b/0x4f0 [ 624.357764][ T4926] __vmalloc_node_range+0xd4/0x810 [ 624.362894][ T4926] ? pcpu_mem_zalloc+0x8a/0xf0 [ 624.367978][ T4926] __vmalloc+0x44/0x50 [ 624.372288][ T4926] ? pcpu_mem_zalloc+0x8a/0xf0 [ 624.377064][ T4926] pcpu_mem_zalloc+0x8a/0xf0 [ 624.381650][ T4926] pcpu_create_chunk+0x196/0x7f0 [ 624.386647][ T4926] pcpu_alloc+0x10f3/0x1380 [ 624.391263][ T4926] ? pcpu_alloc_area+0x820/0x820 [ 624.396203][ T4926] ? bpf_map_area_alloc+0x20/0x30 [ 624.401224][ T4926] __alloc_percpu_gfp+0x28/0x30 [ 624.406140][ T4926] htab_map_alloc+0xdb9/0x11c0 [ 624.410925][ T4926] ? htab_map_update_elem+0xca0/0xca0 [ 624.416298][ T4926] __do_sys_bpf+0x478/0x3810 [ 624.422379][ T4926] ? bpf_prog_load+0x18f0/0x18f0 [ 624.427308][ T4926] ? __kasan_check_write+0x14/0x20 [ 624.432582][ T4926] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 624.438138][ T4926] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 624.443413][ T4926] ? wait_for_completion+0x440/0x440 [ 624.448715][ T4926] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 624.454975][ T4926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 624.461031][ T4926] ? do_syscall_64+0x26/0x790 [ 624.465692][ T4926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.471782][ T4926] ? do_syscall_64+0x26/0x790 [ 624.476478][ T4926] __x64_sys_bpf+0x73/0xb0 [ 624.480970][ T4926] do_syscall_64+0xfa/0x790 [ 624.485468][ T4926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.491383][ T4926] RIP: 0033:0x45a6f9 [ 624.495279][ T4926] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.516186][ T4926] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 624.524600][ T4926] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 624.532583][ T4926] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 624.540559][ T4926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 624.548530][ T4926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 04:26:39 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) socketpair(0x9, 0x4, 0x2, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 624.556578][ T4926] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 624.585779][ T4931] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 624.594101][ T4931] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:39 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0) 04:26:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37070400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:39 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0xffffff7f}, 0x0) 04:26:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) close(r0) r2 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x14, 0x0, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:39 executing program 0 (fault-call:1 fault-nth:56): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 624.711538][ T4935] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 624.719685][ T4935] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:39 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28040}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)sp\xcb\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\x9b\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 04:26:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37080400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:40 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x29, 0x1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) close(0xffffffffffffffff) [ 624.965225][ T4956] FAULT_INJECTION: forcing a failure. [ 624.965225][ T4956] name failslab, interval 1, probability 0, space 0, times 0 [ 624.981581][ T4956] CPU: 0 PID: 4956 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 624.990200][ T4956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.000275][ T4956] Call Trace: [ 625.003589][ T4956] dump_stack+0x197/0x210 [ 625.007950][ T4956] should_fail.cold+0xa/0x15 [ 625.008604][ T4958] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 625.012581][ T4956] ? fault_create_debugfs_attr+0x180/0x180 [ 625.012603][ T4956] ? ___might_sleep+0x163/0x2c0 [ 625.012623][ T4956] __should_failslab+0x121/0x190 [ 625.012639][ T4956] should_failslab+0x9/0x14 [ 625.012652][ T4956] kmem_cache_alloc_node_trace+0x274/0x750 [ 625.012667][ T4956] ? do_raw_spin_unlock+0x178/0x270 [ 625.012689][ T4956] __kmalloc_node+0x3d/0x70 [ 625.012703][ T4956] __vmalloc_node_range+0x1db/0x810 [ 625.012726][ T4956] __vmalloc+0x44/0x50 [ 625.025909][ T4958] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 625.026622][ T4956] ? pcpu_mem_zalloc+0x8a/0xf0 [ 625.026645][ T4956] pcpu_mem_zalloc+0x8a/0xf0 [ 625.084576][ T4956] pcpu_create_chunk+0x196/0x7f0 [ 625.089564][ T4956] pcpu_alloc+0x10f3/0x1380 [ 625.094082][ T4956] ? pcpu_alloc_area+0x820/0x820 [ 625.094098][ T4956] ? bpf_map_area_alloc+0x20/0x30 [ 625.094120][ T4956] __alloc_percpu_gfp+0x28/0x30 [ 625.094135][ T4956] htab_map_alloc+0xdb9/0x11c0 [ 625.094160][ T4956] ? htab_map_update_elem+0xca0/0xca0 [ 625.094176][ T4956] __do_sys_bpf+0x478/0x3810 [ 625.094195][ T4956] ? bpf_prog_load+0x18f0/0x18f0 [ 625.113849][ T4956] ? __kasan_check_write+0x14/0x20 [ 625.133823][ T4956] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 625.133840][ T4956] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 625.133857][ T4956] ? wait_for_completion+0x440/0x440 [ 625.133880][ T4956] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 625.133905][ T4956] ? trace_hardirqs_on_thunk+0x1a/0x1c 04:26:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e370a0400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:40 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x4000000000000}, 0x0) 04:26:40 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 625.133918][ T4956] ? do_syscall_64+0x26/0x790 [ 625.133931][ T4956] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.133943][ T4956] ? do_syscall_64+0x26/0x790 [ 625.133964][ T4956] __x64_sys_bpf+0x73/0xb0 [ 625.133978][ T4956] do_syscall_64+0xfa/0x790 [ 625.133998][ T4956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.156298][ T4956] RIP: 0033:0x45a6f9 [ 625.156314][ T4956] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:26:40 executing program 0 (fault-call:1 fault-nth:57): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 625.156323][ T4956] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 625.156338][ T4956] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 625.156352][ T4956] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 625.172534][ T4956] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 625.172543][ T4956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 625.172552][ T4956] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 625.280791][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 625.335395][ T4975] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 625.355920][ T4976] FAULT_INJECTION: forcing a failure. [ 625.355920][ T4976] name failslab, interval 1, probability 0, space 0, times 0 04:26:40 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) 04:26:40 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0xffffff7f00000000}, 0x0) [ 625.450910][ T4976] CPU: 0 PID: 4976 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 625.459761][ T4976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.469828][ T4976] Call Trace: [ 625.473164][ T4976] dump_stack+0x197/0x210 [ 625.477519][ T4976] should_fail.cold+0xa/0x15 [ 625.482133][ T4976] ? fault_create_debugfs_attr+0x180/0x180 [ 625.488137][ T4976] ? ___might_sleep+0x163/0x2c0 [ 625.493029][ T4976] __should_failslab+0x121/0x190 [ 625.497986][ T4976] should_failslab+0x9/0x14 [ 625.502765][ T4976] kmem_cache_alloc_node_trace+0x274/0x750 [ 625.508613][ T4976] ? do_raw_spin_unlock+0x178/0x270 [ 625.513852][ T4976] __kmalloc_node+0x3d/0x70 [ 625.518380][ T4976] __vmalloc_node_range+0x1db/0x810 [ 625.523721][ T4976] __vmalloc+0x44/0x50 [ 625.527798][ T4976] ? pcpu_mem_zalloc+0x8a/0xf0 [ 625.532583][ T4976] pcpu_mem_zalloc+0x8a/0xf0 [ 625.537184][ T4976] pcpu_create_chunk+0x196/0x7f0 [ 625.542148][ T4976] pcpu_alloc+0x10f3/0x1380 [ 625.546678][ T4976] ? pcpu_alloc_area+0x820/0x820 [ 625.551718][ T4976] ? bpf_map_area_alloc+0x20/0x30 [ 625.556759][ T4976] __alloc_percpu_gfp+0x28/0x30 [ 625.561632][ T4976] htab_map_alloc+0xdb9/0x11c0 [ 625.566406][ T4976] ? htab_map_update_elem+0xca0/0xca0 [ 625.571785][ T4976] __do_sys_bpf+0x478/0x3810 [ 625.576394][ T4976] ? bpf_prog_load+0x18f0/0x18f0 [ 625.581349][ T4976] ? __kasan_check_write+0x14/0x20 [ 625.586491][ T4976] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 625.592057][ T4976] ? rcu_read_lock_bh_held+0xb0/0xb0 04:26:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e370b0400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 625.597372][ T4976] ? wait_for_completion+0x440/0x440 [ 625.602705][ T4976] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 625.608983][ T4976] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 625.615340][ T4976] ? do_syscall_64+0x26/0x790 [ 625.620063][ T4976] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.626159][ T4976] ? do_syscall_64+0x26/0x790 [ 625.630862][ T4976] __x64_sys_bpf+0x73/0xb0 [ 625.635294][ T4976] do_syscall_64+0xfa/0x790 [ 625.639817][ T4976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.646056][ T4976] RIP: 0033:0x45a6f9 [ 625.649994][ T4976] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 625.669614][ T4976] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 625.678058][ T4976] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 625.686044][ T4976] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 625.694037][ T4976] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e370c0400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 625.698212][ T4989] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 625.702017][ T4976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 625.702026][ T4976] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:40 executing program 0 (fault-call:1 fault-nth:58): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:40 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x8, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x57e, 0x1, @perf_bp={&(0x7f0000000000), 0x1e}, 0x8d, 0x2326, 0x2, 0x2, 0x9, 0x80000001, 0x9}, 0xffffffffffffffff, 0x3, r1, 0x1) r4 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000440)={0xc, 0x2}, 0x0, 0x0, &(0x7f0000000480)={0x0, 0xe, 0x7fff, 0xffffffff}, &(0x7f00000004c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0xc}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='(\']@\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r3, 0x0, 0x18f, &(0x7f0000000140)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', r5}, 0x30) close(0xffffffffffffffff) 04:26:40 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 04:26:40 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x4}, 0x0) 04:26:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) close(r1) r2 = perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8a, 0x8, 0x0, 0x8, 0x90010, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xfffffffffffffc01, 0xfffffffffffffffa}, 0x410, 0x6, 0x401, 0x3, 0x8000, 0x8, 0x92}, 0xffffffffffffffff, 0xe, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)='\\!ð1selinux-\x00') r3 = perf_event_open(&(0x7f0000000280)={0x0, 0xffffffffffffff7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000300)={0x4, 0x70, 0x8, 0xa, 0x40, 0x68, 0x0, 0xfffffffffffffba7, 0xa0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x6, @perf_bp={&(0x7f0000000200), 0x4}, 0x8000, 0x2, 0x4, 0x9, 0x8, 0x5, 0x1}) close(r3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 625.881618][ T4996] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 625.968690][ T5004] FAULT_INJECTION: forcing a failure. [ 625.968690][ T5004] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:26:41 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x80, 0x5, 0x9, 0x80, 0x0, 0x1000, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x9, 0x10000, 0x8, 0x7, 0x3c, 0x5, 0x96}, r1, 0x2, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r4, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000007c0)={0x0, 0x70, 0x1, 0x20, 0x80, 0x81, 0x0, 0x78, 0xdc8ce34cb5883982, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffff000, 0x4, @perf_bp={&(0x7f0000000780), 0x9632fabcaabcd836}, 0x1002, 0x200, 0x9, 0x3, 0x1ff, 0x2, 0xfffd}, r4, 0x2, 0xffffffffffffffff, 0x2) write$cgroup_type(r3, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r5, &(0x7f0000000140)="a89b1bc164bb73ae38c1f0f5e69304ab6218d28734b5585d34a33cf985e6584e989b070f8030fda7a92db3e8b254f0576b07ab748de0a46adf1ad5052903568dbd0375b223d0d5fccb793880f7dfab97ae50d7c0dbadb50ee098fc3bc4a5a49738fa371c18c339c3ce357c89b9da5c34a3a5a5237ddcde5f", &(0x7f00000001c0)=""/217}, 0x20) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000740)) close(r0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r7, 0xb, 0xffffffffffffffff, 0x1) r8 = openat$cgroup_ro(r7, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000000700)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x503080, 0x0) [ 626.049298][ T5004] CPU: 0 PID: 5004 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 626.057949][ T5004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.068539][ T5004] Call Trace: [ 626.071868][ T5004] dump_stack+0x197/0x210 [ 626.071893][ T5004] should_fail.cold+0xa/0x15 [ 626.071914][ T5004] ? fault_create_debugfs_attr+0x180/0x180 [ 626.071931][ T5004] ? ___might_sleep+0x163/0x2c0 [ 626.071953][ T5004] should_fail_alloc_page+0x50/0x60 [ 626.071971][ T5004] __alloc_pages_nodemask+0x1a1/0x910 [ 626.081022][ T5004] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 626.081039][ T5004] ? __alloc_pages_slowpath+0x2920/0x2920 [ 626.081062][ T5004] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 626.081080][ T5004] alloc_pages_current+0x107/0x210 [ 626.081092][ T5004] ? ___might_sleep+0x163/0x2c0 [ 626.081108][ T5004] __vmalloc_node_range+0x4f8/0x810 [ 626.081132][ T5004] __vmalloc+0x44/0x50 [ 626.081147][ T5004] ? pcpu_mem_zalloc+0x8a/0xf0 [ 626.081160][ T5004] pcpu_mem_zalloc+0x8a/0xf0 [ 626.081179][ T5004] pcpu_create_chunk+0x196/0x7f0 [ 626.153705][ T5004] pcpu_alloc+0x10f3/0x1380 [ 626.158240][ T5004] ? pcpu_alloc_area+0x820/0x820 [ 626.163193][ T5004] ? bpf_map_area_alloc+0x20/0x30 [ 626.168249][ T5004] __alloc_percpu_gfp+0x28/0x30 [ 626.173121][ T5004] htab_map_alloc+0xdb9/0x11c0 [ 626.178013][ T5004] ? htab_map_update_elem+0xca0/0xca0 [ 626.183408][ T5004] __do_sys_bpf+0x478/0x3810 [ 626.188017][ T5004] ? bpf_prog_load+0x18f0/0x18f0 [ 626.193058][ T5004] ? __kasan_check_write+0x14/0x20 04:26:41 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) sendmsg(r1, &(0x7f0000001ac0)={&(0x7f0000000000)=@ax25={{0x3, @default, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)="34291dc18e9feb6c72d6682515a5256cead811edcd9cd3f44d40fa86b8d135422d740d1fee5c300b696bc5cfa01e024c85f9134fe16e92150e9db55de14ed24ae94aef28b9f9949605b97a03f7a3c40d0127ef2102d1e2bb07ae603196af046f", 0x60}, {&(0x7f0000000140)="a75c2f25275463c2932954b9ecea59705c228cb17ad46f8a11b604c0b3728f6407f4cbc7d0b451e69069a90b", 0x2c}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000180)="6e3710621f4cc098a1ece4d59e0b70f69b909bf5624d4003a73ef0715b1d22b457ad26b783295e1ebcea940d4bb27a4855cd5cca9273e07bf34bcbff97d4c1e5a4e63c9a8ecc08a5f31a0b92d2852bdd4c87f7b35949c82465e11ffb747a8ac4896064e47c692dec2abf279af19d3448e26908e2e506f91cfb133470e3356e2c150d70713e722943005d2f5d6584cb2f7d2d46830087a70c7aaf5a25d081035dcfbb5e04f00c53112052be6889983dece64a3b1ea369059606b5c7bc48571fb3dc75e3839fdf2899413309a15106500c71c6", 0xd2}, {&(0x7f0000000280)="d5c4670ce403d3b3fd6f7269b345dbaf2b3effbc0e6f99075f29c4979ef8812e381a53fd88b885cb3fd97b63055ec1677ad1c6d8a13b3f2426e1aac17a6fcf7f5b6d6e7e3bddb24a3bc086ce4e0f51b24a8ef381ee877452a08898d3a4320c5d848a4deeef4bb67f3372e96a9ac94f0173c6ce81", 0x74}, {&(0x7f0000000300)="a2e4e48b7b2fdc52893cdfd4d3fbc0e06d53b7711ac7ff65", 0x18}, {&(0x7f00000003c0)="c2465ae6e4122b9410e6402b5ab91f3809aa0c18d09923ece3e3c4ae406edf26b8f0d04d21055cd75f292421037645d44c8d26ae8057", 0x36}], 0x7, &(0x7f0000001b80)=ANY=[@ANYBLOB="b800000000000000130100000004000000a25376dd371b7e93641280129c1ad0c22b8d5d2d54ead27ab9a7b36096f24b2509d76de6a5469ccb9517318c34948690b25b07d43576ea88b4788e8298414c218c8ea6fe42bcf2cb8adef12671b58bd6c3a5cd5530624aee950c23c743bc8b36f67a7299c2ec7cba0c59b1b5a7bacf72138cc85ac608db327ebaf25ccdcf70fc029df99823173dfa267461406a3e05a8629e19af371d5e39acb5e9b641d0afc37d02e57c710d4e68000000000000002900000001000000c38b91fc9f4ad481c0b7d05eecdd4a5202b5bc62b265cede0037cb410234dfebbd0df8ae83183df4f33f196382146c41b1408f40b34f5a1904bbd0e4f5c6427c4566bfb0d07eeac76698b88106829447086d01000000000038000000000000000d010000040000008b67dcd7411c98e7c0503c3f39360c6df7736fc73636d0d874d6a3c69406d6809435000000000000100100000000000000000000000100000b5be1d8351ab8777130c0f33dddbd12cd25e95d615d46acfe1e9bff43e5d93e2414b08b17904e06b4f32c13d98e0004e355a957e77d458b5be3a59be4be480cd5c21ffe8e6e0b7db1f6e6c6d760a0826d6b7406acddffc66939253070af044665d12735b8a7b94c9753ffb3716fc69bee9df865ebdb3374c9d40e9358e354b7e70b2a77ce335b11570db852bc9e6a1b9aac6319a111066fad405850cd88ab1ee18accb390ef1955330e652ce33ef59996f5fed7dc7a8f91b3791ddc842fd373c9da52bdab22b949ecb052bec3267925d4bdf4ae0e08d226d959af17b2b398bda4b79b4d1d029cd6b71fc9fa495809d03059db57137576a5b0ff000000000000b00000000000000019010000008000005b8dc9e342663e3d3ceab106dd5726e9f2dd24631b55a34285beb5219cc7957cdbd910109fad9b5eb69c6ab171dddf0262c8c05ba78ca9cbda260dbac390fc2e1a1121731432d07945d8be30caf433055894312a84685f18acc10ffb12734868cfca50472a4ca2263adb090a9f7c651bf2a8e1a477c7f72dfbfd9268109128d758ee812386c33a13b2c6ca73d4843ed70e8d8f12ff151f8c0e661e37a500000068000000000000000d010000d50b0000817fa47cebae4e5302e8f71c6eb3edb91699da7a48e9c993d86e30c5f016effef2802d15493d1e5993c0311376948565021f10f664cb6b858ca737af4e7ef49af284a3585a15b01feef514bd3a62bb8ce49c9b0000000000e800000000000000020100006fcb000075d438c5d04e2b0bb4aba8fef6be436d454ee5c428f714caf5bbe8094fbaa8491cfd7309b214c39a614ddfe7d16a2493de20381416d33b3c96fe6e21afa25aba43a63ee813b32907fa8ba4ef62735134a009ff0eeb7ccac5f21dc2461d2b7ae7f85973d08f15cde9eb466e327c655fefb995b60db322a69c0eb75056f731de523cc0f80f6e63b3d127be6a82821f8889ea7163f24a54bf8375d9d675c00f7cd2933e52d93c7fb83bbb521347bf52f225a8b55c24a5fae6a6029c698c354fdc570effc6567c5e9367e60189a844cdd7091c0000000000000065fa4dcca8b46b0c23cfb895206cb7854ec2447e59d1d309df72dfb319eb55ff96bf8be87e9adc467b1d93259f92932baaba447b015639e8f16a14769ad9f0d5e48480133c9fa730b7170abaa9d957003f0d9808213c7fa73cabf80807234e3ec14f8a00a965580c1991579650245857037f24d90ce18b158d58c2944b6956729ff4"], 0x468}, 0x45) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24a, 0x6, 0x0, 0x3, 0x1, 0xf3}, r3, 0xb, 0xffffffffffffffff, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000001800)) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r6, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0xc0, &(0x7f0000008ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008980), 0x0, 0x0, 0x0, &(0x7f00000089c0)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000008a00)={0x5, 0x7, 0x0, 0x9ed3}, &(0x7f0000008a40)=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r7, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0xf, 0x2, &(0x7f0000001640)=@raw=[@exit, @exit], &(0x7f0000001680)='syzkaller\x00', 0x3, 0x15, &(0x7f00000016c0)=""/21, 0x41000, 0x5, [], 0x0, 0x17, r6, 0x8, &(0x7f0000001700)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001740)={0x3, 0xa, 0x2, 0x7}, 0x10, r7, r4}, 0x78) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000001b00)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000001b40)={r8}) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r9, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 626.198218][ T5004] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 626.203790][ T5004] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 626.209304][ T5004] ? wait_for_completion+0x440/0x440 [ 626.214621][ T5004] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 626.221001][ T5004] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 626.226482][ T5004] ? do_syscall_64+0x26/0x790 [ 626.231178][ T5004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.237264][ T5004] ? do_syscall_64+0x26/0x790 [ 626.241965][ T5004] __x64_sys_bpf+0x73/0xb0 04:26:41 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r3, 0x6, 0xffffffffffffffff, 0x8) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) recvmsg(r4, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r4) r5 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x1, 0x6, 0x1, 0x8, 0x0, 0xd88e, 0x805a, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x28405, 0x6, 0x8, 0x4, 0xfd1, 0x0, 0x8}, r3, 0x1, r4, 0x1b) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x87, 0x40, 0x0, 0x0, 0xfff, 0x2, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x5, @perf_config_ext={0x0, 0x7}, 0x1, 0x617e, 0x80, 0x6, 0x2, 0x7f, 0x1133}, r2, 0x4, r5, 0x2) close(0xffffffffffffffff) [ 626.246543][ T5004] do_syscall_64+0xfa/0x790 [ 626.251336][ T5004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.257361][ T5004] RIP: 0033:0x45a6f9 [ 626.261273][ T5004] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 626.280890][ T5004] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 626.289317][ T5004] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e370d0400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 626.297304][ T5004] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 626.297311][ T5004] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 626.297318][ T5004] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 626.297326][ T5004] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:41 executing program 0 (fault-call:1 fault-nth:59): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e370e0400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 626.356178][ T5023] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:41 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) 04:26:41 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x40000}, 0x0) [ 626.477337][ T5030] FAULT_INJECTION: forcing a failure. [ 626.477337][ T5030] name failslab, interval 1, probability 0, space 0, times 0 [ 626.515688][ T5033] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 626.530979][ T5030] CPU: 0 PID: 5030 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 626.539624][ T5030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.549695][ T5030] Call Trace: [ 626.553030][ T5030] dump_stack+0x197/0x210 [ 626.558079][ T5030] should_fail.cold+0xa/0x15 [ 626.562698][ T5030] ? fault_create_debugfs_attr+0x180/0x180 [ 626.568525][ T5030] ? ___might_sleep+0x163/0x2c0 [ 626.573436][ T5030] __should_failslab+0x121/0x190 [ 626.578416][ T5030] should_failslab+0x9/0x14 [ 626.582941][ T5030] __kmalloc+0x2e0/0x770 [ 626.587190][ T5030] ? memset+0x40/0x40 [ 626.591185][ T5030] ? pcpu_get_vm_areas+0x3d5/0x3ee0 [ 626.596411][ T5030] pcpu_get_vm_areas+0x3d5/0x3ee0 [ 626.601458][ T5030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 626.607818][ T5030] ? __vmalloc_node_range+0x4d7/0x810 [ 626.613240][ T5030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 626.619498][ T5030] pcpu_create_chunk+0x24e/0x7f0 [ 626.624556][ T5030] pcpu_alloc+0x10f3/0x1380 04:26:41 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r0, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 626.629085][ T5030] ? pcpu_alloc_area+0x820/0x820 [ 626.634037][ T5030] ? bpf_map_area_alloc+0x20/0x30 [ 626.639277][ T5030] __alloc_percpu_gfp+0x28/0x30 [ 626.644182][ T5030] htab_map_alloc+0xdb9/0x11c0 [ 626.648984][ T5030] ? htab_map_update_elem+0xca0/0xca0 [ 626.654374][ T5030] __do_sys_bpf+0x478/0x3810 [ 626.658983][ T5030] ? bpf_prog_load+0x18f0/0x18f0 [ 626.663938][ T5030] ? __kasan_check_write+0x14/0x20 [ 626.669337][ T5030] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 626.674986][ T5030] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 626.681419][ T5030] ? wait_for_completion+0x440/0x440 [ 626.686729][ T5030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 626.692994][ T5030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 626.698470][ T5030] ? do_syscall_64+0x26/0x790 [ 626.703159][ T5030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.709234][ T5030] ? do_syscall_64+0x26/0x790 [ 626.713931][ T5030] __x64_sys_bpf+0x73/0xb0 [ 626.718370][ T5030] do_syscall_64+0xfa/0x790 [ 626.722890][ T5030] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:26:41 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0xfffffffffffffe9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x2, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r1, r2, 0x7, 0x7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 626.728790][ T5030] RIP: 0033:0x45a6f9 [ 626.732689][ T5030] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 626.752301][ T5030] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 626.760726][ T5030] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 626.768712][ T5030] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:26:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae7fb52e531c8916, @perf_config_ext={0x7, 0x4}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000700)='/group.sta\x9f\xd4t\x00J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6c)\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\xb9\x0f\xf8`\xa0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xe8\xae\xaf\xfc\x94\xba\f\xf8\xfb \x05\xca~\x9b\xf07\x93\xa4\x81\x1c\bw\rt)\xaf\x9a\xd3n>m\xd1\xd7\xd8\x9bhxd\xfd\x959k\x812K\xf9\xb1\x18\x94|\x8aO\x1f\x15\x03\xe7\xb0\fd\x00\x00', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(r4, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r5, 0x84, 0x14, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x4, 0x2, 0x0, 0x4, {0xa, 0x4e21, 0x63f4, @mcast2, 0x101}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)="aa26ee2185080897c3cc4d996c792002cdb7da020dd2bb78d4d8a52e7d3d8bcabe2dbd6f269120cb17ac68ed9897fd0ce882de505ef4d494ee3b216437843f1367b98d2a7fedab4fc6e79e9e0bbfd866af8c6924b3a5041c6c0eb76fbf23b248b34b529e91f1", 0x66}, {&(0x7f00000007c0)="468a60fa9bc6f6a288248c6f04dd409228ea34baf87ec5fd76616f93c016bd7dc4349697f5481e293bd25e26a9608ad5874122eb115ba3f37733e43d51e92a3571d88ee46e0fee8282e4dff4ac0bb724f9c7613346c5b8ce5fa40fa2b5ef5af0e6383eea10f3bd95ff178655cab4dd8a2f618f56b6fe6465d42482baec9897c45b9c3221c3ba83830800056084c5faa886a6ef01157e87b62a71dd27d38ba6aa4c212cc8f8424674a2ca0ca2c08ae0f3b2760a53b1", 0xb5}, {&(0x7f0000000880)="64f3063bf1cf8d8b9ea096a948a2ef68a5c58e46e4a55e753d06019926da7c3e2b373da129d3eb0c412dfd11e68af9e251d028e798c63dace21407e54bdc4b4d1329b48f25f56d6a54130cba9bb144f3966182fc01849efe8302426fc4f43801c875e274db80523cfb2b4b50ffd2ce4a0d0d7b2d06a574065615a9c7598c389800801271e4f965989041857195797ecbd1b0e704b5f6fa06f6eba000a732118dd1d270d9eba6d375445c50e4f2f564857617d6d9232dba187b170dc06df944d029edfa", 0xc3}, {&(0x7f0000000980)="da480bd2fa56c48a8424bf4a02690fd151efedb6c371046ba9f55cec80c7ed0fefaec4222e74c539f2baad828e01219feccb3b81361dcff2cce62f3964f1e2f71887ec68fbf82cf1269bb0b36ed012ec7a41e039788ef75fb87e96aa16d45d48f30624a19a16a953d738ec428593a64042bfcaa49a61084d351fd1725530ef308a0afa7c8181064daa02271536864a9eca451083914a46667071b00587131dcd9c4b67709b", 0xa5}, {&(0x7f0000000a40)="dcbbe018d3d7496f6f8e5e5f62cf8f133a87d8388d68d8566c5ca4f520689fbf3cc5012534b776006673500001a824dd2dc91d6f42d92a60ac419056e63bc69ed49ab15e4175b62c38fb5f78174963b7f3dbe6e6ab97f0e0aa7f4c12ae03098b2280a38714a4998b7b61892dbe0bb1677efb58a48753533906c2c87b9a3281f2ed2cd93ce12dd3a534e9762555743a7d07515ebc2544f17c8fd304796c47118d87cbfeb58e2fa5bf8147e87bbeb2f79057fbc0336d5b69aab0d6dd135b3c497be3c17e9b0b9a9957f07aac13a2af9430", 0xd0}], 0x5, &(0x7f0000000b40)=[{0x80, 0x10e, 0x9, "93a44fc1d7eade1516bacf243c8005cf332c15110ff62e512856d82969e5a72cd9ec35cf16373f4c6cb97c42d951680ac2b3e80e07f31dbafdaa347bb0bb5b71495989f58b58001f252f15034f71acdb6c45eb0d4feeb6b45aade36bba875cbb9c5a68d1c42ba06c445dc95e2f"}, {0xa8, 0x84, 0x8, "d21df509693327aac9171b320200e86113b13d64e70094f6da078f41232300b5f8f89eff240ca30e9f538530324fab40a83c4a4e3ffcae687c4264937fbffe4a15cdd3a61a7846c60a476a9e027e6835964971ab940bea1239d940555db0b9f8ee8fd480078d1ae2d1833c7bb51645c29c7c2cba9a9d8ca08560a7f27040aeff63f9aa8906b59ddb8868e886ebb78438ca8bf80c"}], 0x128}, 0x8095) [ 626.776700][ T5030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 626.784701][ T5030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 626.792688][ T5030] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37100400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:41 executing program 3: r0 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) close(0xffffffffffffffff) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r3, 0x7, 0x2}, 0x10) 04:26:41 executing program 0 (fault-call:1 fault-nth:60): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:42 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 04:26:42 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 04:26:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37110400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 627.061969][ T5063] FAULT_INJECTION: forcing a failure. [ 627.061969][ T5063] name failslab, interval 1, probability 0, space 0, times 0 04:26:42 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x80000, 0xe0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000001700)=@sco, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001780)=""/58, 0x3a}, {&(0x7f00000017c0)=""/137, 0x89}, {&(0x7f0000001880)=""/39, 0x27}, {&(0x7f00000018c0)=""/124, 0x7c}, {&(0x7f0000001940)=""/156, 0x9c}, {&(0x7f0000001a00)=""/139, 0x8b}, {&(0x7f0000001ac0)=""/87, 0x57}], 0x7, &(0x7f0000001bc0)=""/205, 0xcd}, 0x21) close(0xffffffffffffffff) [ 627.142999][ T5063] CPU: 1 PID: 5063 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 627.151654][ T5063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.161734][ T5063] Call Trace: [ 627.165054][ T5063] dump_stack+0x197/0x210 [ 627.169416][ T5063] should_fail.cold+0xa/0x15 [ 627.174034][ T5063] ? fault_create_debugfs_attr+0x180/0x180 [ 627.179907][ T5063] ? ___might_sleep+0x163/0x2c0 [ 627.184780][ T5063] __should_failslab+0x121/0x190 [ 627.189742][ T5063] should_failslab+0x9/0x14 [ 627.194257][ T5063] __kmalloc+0x2e0/0x770 [ 627.198643][ T5063] ? memset+0x40/0x40 [ 627.202650][ T5063] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 627.207875][ T5063] pcpu_get_vm_areas+0x3ec/0x3ee0 [ 627.212913][ T5063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 627.219283][ T5063] ? __vmalloc_node_range+0x4d7/0x810 [ 627.224711][ T5063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 627.230976][ T5063] pcpu_create_chunk+0x24e/0x7f0 [ 627.235937][ T5063] pcpu_alloc+0x10f3/0x1380 [ 627.240496][ T5063] ? pcpu_alloc_area+0x820/0x820 [ 627.245456][ T5063] __alloc_percpu_gfp+0x28/0x30 [ 627.250417][ T5063] htab_map_alloc+0xdb9/0x11c0 [ 627.255230][ T5063] ? htab_map_update_elem+0xca0/0xca0 [ 627.260623][ T5063] __do_sys_bpf+0x478/0x3810 [ 627.265232][ T5063] ? bpf_prog_load+0x18f0/0x18f0 [ 627.270180][ T5063] ? __kasan_check_write+0x14/0x20 [ 627.275310][ T5063] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 627.280880][ T5063] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 627.286186][ T5063] ? wait_for_completion+0x440/0x440 [ 627.291497][ T5063] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 627.297949][ T5063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 627.303455][ T5063] ? do_syscall_64+0x26/0x790 [ 627.303470][ T5063] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.303482][ T5063] ? do_syscall_64+0x26/0x790 [ 627.303504][ T5063] __x64_sys_bpf+0x73/0xb0 [ 627.318928][ T5063] do_syscall_64+0xfa/0x790 [ 627.327836][ T5063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.333740][ T5063] RIP: 0033:0x45a6f9 [ 627.337648][ T5063] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 627.357285][ T5063] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 627.366438][ T5063] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 627.374431][ T5063] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 627.382432][ T5063] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37120400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:42 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)=0x2) 04:26:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e375a0400802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x4c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 04:26:42 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) openat$cgroup_ro(r2, &(0x7f0000002640)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002680)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000002740)=0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000640)="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", 0x1000}, {&(0x7f00000000c0)="bf14d27a62df211b3af6373488c037473e6685601fcdea91604aae04cd0c7ce7761b1c8c7b794e645dec908dfe3c374075a7da64ae8b43011b69d1438fa8e4256c29e2a4ebf823e5affed0ad45d3e9ab38b893eaa0fb218ae56c07f11a0b55aa57a8d6b42d5c95585f377b430f0c4b077564441ba0a18b665b37a37be792ca1869e05489111e7ccef6ba7299267933ae32b3303b134db510fa4471a88c5a3cdb1f8ecc3c28166ca25198dd4bd98c", 0xae}, {&(0x7f0000000180)="3d2065a181b91c834beef522989337a9d3ac535ac497defa6afdc35aff22401e1383a972eed12791986b04cfe724833c32361a67a6d389d20d35c9448c6d065042b8adaa6fe1a1e5bdd1c6c03023cafb05ef53f0dea0579471f67970e6f92877191d12daa1591e2bc671d23e94f31ff2d841871087347f6152e3ce61ea3ca4d2b9214215bab1584f7777c15a2be8fbf09d317421b1981ba4b57df4c0fa9180bc8d429fec275f8f49c70c71f5af71395e3c6b38f9712a80137655f703345b5f8544c92ee85f1c839066ac0375594be85ca43e3c78e73919fbb51e0493c8", 0xdd}, {&(0x7f0000001640)="2a65acafedf01f71365ec0c26c3c3981eb8f62f510266f22f86d6e7021d0f06cc395877c7bab3049124f3d9cef9f9b4424da7bfde4be8bedf346029f03d139bf833b750e2113f4a84362420007e3ec938956da95dda051ceb7ba4c3478d83a18dccf87980290b8b1ebe76c9d07fbdda39f622342b2266b5901e2cebc48a788fa274f9cc9280387b3059134a266baed1c0cc1957fa80014988a2d249a177fa750de6953ae11ada3ea91508a4ab46699f8e86a5120d80737147a2747719f2fc5c5ac7ea190b4cce2cb6b1e68ce97a950948f08a57e0e439a8581fc94312df7af9fe49c8a05e3028acbc27b2304801cd27aa2d044a737c3796f21f4aa40ad99c18f3709ecc7bbe95583cdf9aeac77edc98d46ce51a5d3d39f1e42e4a393ac1774f215d6305e179a0cdc29e98879c5cc27994377c2e412d30b67c4555f4ae8f6140088407a1d884a19c2906f2e946a1c3a1a140c4d948bf00aae1add88bb33b5159fc4c56a274aed9a963f5f47a67053f8c9e418f79e04a5e2518e36c0f85a0bd81ac40404a4fbceaab748f604664f7f505ba77ba9606007fdf1b1c8ec34c4a7d800a0b6338450d092ac048efd0bbf9abcd986f8d1fa819a7fb0205a9416b8bbb7dcb09614c0027aedf5e540e77794692bcab5ff6f7f300c6054c1e48e4fc7bf206ab1a1e246d82c6e60f7543a29254ce988e16bad123a6364dcae90dc0d4025ee8c9be4e6ff588f12f1e7e24ed529a88a5ec1ac2a9e60d78d0a00c2baa93ef8a956d0e6bb7905621d662ab3d95304e575b15d4dd0a18898ae833220edbdd524526c627160210195647114c8cbb896d053b93ec4b86257a146cfe19503f6f1ce80657fc1bc3a84aa61400ddaa0f4f76c37002f27ba7a4eba0f9203adcf687661c0bb5e6c95734a35eff4a0ccd3b098f64ffdf44001e86287bb9efd4a960837893fd4961c89cb7454af4154f4c9f317b13a62577a4b1124a29e496750c276e4f9b398a80e90d38a3a4c6b988df79c12955f563ed4d8c6e76dd4efd7b4fc301e1d64531a51c89782b7c066e5f686f509b4db2d2c47218b46ecc5f98e1bee51a8cc9cc7f1351abebfdd4ef52d38da9174da1ed7f6ed04bf0790a48d182e54ed05ee6e36dd623cde6a43a2f929699051528e8c395e7565cabd9fe89f62bfe5064ab4855a4de853b4a4126370fe55256dd9a79ff43da71998e57a058566bf08795257608bc22b8b744cac2413c890417be4ba5cc633d0668f0e24c8a424b06d4c0c6c5f4cd76085d2155a97397c8c2795359efa04332151a847559db44aff16bba7acf7d83d6f5e8a337c4a4c0d2cdf012472a353e0e4b114bc7e02ca1edcaffca92c51fe27c2a296ffbf38dea8aef733c9ddc397b1a0ac95786d8bdaa1598652a8ebaf245b4378d49592241ce6dc1b4caf6f780ccfc3b1299e7fa9722fd22a4b9ce2b57be35fcb715cd999c9878c27adec64a523c0c22f9b593f8e6f4fc24f924d2cb6cf6e0aae0639f4858acd00a6e95730b923364de16cebca9764ddb7b8581073f93eda41bb3df62cffe0f39de80a52333c67c6fbfa8d1708ef1200da626692c8343ad923a77228f86ced68b4943222ddb62237eccaec4bd9b725d5823980738e102dadef496bf22c8bf357fe047232821dbc9aa7020d6bc3ddc95a6949fcba870a5d759343533dabc7b17c16b8ac8cfb65369df5d1b52b794c2be11023d0d0a4d722159d1e35bf1ebf10a5bed1a769e12d8025e23df0500f513c8b78176d948a9822044713f6ca67612ba674091e48f8e8a4655d2cdb5b513022667ce553d5ef430f28598f257d4ec0fd66f8c641fdd7440df62f71f014fa22011a49020ca79ffd4e315196bad6a5aa26fc475f6128ad82f5a346d195740ee45d3fca30c506bc84d374fee46424ab317d5b64adc20ceca12586fbcc0229bc258efce2ee90d6effb2e9de0b9b96a66fe1c4bdb6cd640b09f2a28dee2ae02cd85851cbda29a209013948474cb342feed3e08e66d48c0e00c76fa212b9060adaccedb23c054e26b7dc6ba4ed5ba720cf33dc1e7fd722a3597c47058f2c28cd43302d70858f0b04ed86286229691d62508d14bb238b078b2c6b0bf37b2d2d5988c2e4c0120ade14c82e04e0abb4524ae848cec8b20e4c0b8e8ecc4356ef5a4c671bac2bbd30b0cb40d02513c3e75f57a59d3d4f467d09c5794324f3d96e4ba48018dfda16f46f6e4ed56bcf98c670af4cd8cbaf117dcce96a36aeeedee70f27617f4c7f8299074cd7d1de381b1b6627992aca3a5a17e0347fc85397262783e4cd1e604f85b049a5c2688585526d28dbc385ac1a2390daf57c12bcf1cc7c12f9f8d54edf9a6eb902f67f0d35d6e51ca387575285c2a6f9cad9b449e166e1b6ffc652b09847bee4ff083fa1b15d4fb0320abbbf8b9b475882621fa2669e7b73af0fe134b781e56aead794566aac0154203a3099e105b7b2e8ba0fbe142c15b5f719766397f5a3fe959c5918fa3de71f59e57c19e2c5843c603284c8abe3b8201628b1a23811afc8d416eb046086a92d05131998c3e46abcac31766d1ae57813d9a4d17f4d72164dae9d9b58c2120f2d696390bd9dabbd5d509bcffb4d0d88177f01896443c77e1157828d3bf502d5b177898d26c089a0e2ff347b363c65f676b758bc91461fadedd0788ff1ac264ca5d1a5ca845815c7ad20eacf5eb4f6428123fdc49ff61c303879f2ca440e878652b7a41fd1953efc966785eb2354066b5a2a87e5961db687adb64eac2948c5cb05623044ad15450acbd1a02dc59d7d60796c5898b7a2792c1d477e90bc832058e5d9ae2c2d102358251b8a02bc354d5a0321a5bf4d56849fd842fc4e9332df6044a3cafa05ca6c81b2ff5c0bfc2bb444f2fa26d22f56e713abf43c9d29b6078ad9ef4a04d0210f345221505df1938caf77703640891e53ef6eaa3259d8968403da6367b98da2d979a17a1aa88fd4ef4069b62b4751d0a889d2267e9fb0a70260d3ffc7cf511751138a9fe54ed092e55c21199336b8e3f03a6b22cf5a8ffa23c54e1c55950bd7c4297366139c83cb1a72f026e984a49a4d8535fcf6559ff77a66f1cdfcc974b173e919a3b0a1b922f597aeb337f09f532e45496e3864243e6f6d93f454511ff13497bc2c7ea1434f7049afd280909333c68faf8e3925b2180aa63b3cf204b3db3254229a593a8189ff3351deaffc0bc87edd5a1c9b9838921a69fe8b79f8450ffc7d6ab1f7452ffa1396600bf67b924c885081ba3efebc5a7a6477fcb5e55eca9d3f960d14df04c7317a39e9d17ebb5107791e2ab6a7c89d94e0cfb1a1d0218fd605d829b9f06d05ac39fbf4daca508246d80f3dd433a3ccbb0f9a4e32452a1655e5ea04aa474b935f2376fbb06a0763c61ae7a08beaae573b126234322bf99d4eade69d993d747572379ef2edd4e37dee12d710026c5e96da48dc54b6a7225058abd6d0cbf2a3ad7f91e5f357600d3b2f84409b30eb96bcf7a70e37415db128f410447eea6fa08a34e625ebb1e6983e9e216834bb6f4e6a9c161a559d05e9a9fa74af995d98daa85a8cca390192facf0b6acd14659e49090f52eaf6fe80914ac41544e008beed3efe759485700f16fc97a934b85e208ef5c518f9904fa491d856532221e7049c3abaf3d1cf956c88d7f7bb87149ed06325201754e815ff8fdfa92c95a92d73dc15f898017571ef26a52eae47d4774c234d65f0dcc6eedf94bd04f8d76b49d05e5710ad0ac021619b112a00da26a2d3fe521d3912c100808b1797193c38fe7c7e3a07b3839974bc4a4c8cbc5718f672d4f9784d9a05ab7a77bdf7908df2b891404ed644fe089b0777cbda2ad155707b99a60d5291acc2a8785f4fba2426ea017e7c1919c1a16dfa41a162603314d87969c44f83027a81bcbd5c6811887bd13f3b68dd8d3c04d942a0372e2f70a6effd8f550e4c5ac60276436eb9240d7db51fc03fa0be0622e69dd4c08f0d837d442dfc5dac9269e8d78f004b9354d6b25aa170fe3e74eb7a21e3d7586706e15b47991ca6e1f530c3d34848ba2b1956e14f2059625872f603e421c70ebc044930426505f67ff6237b6eb6fe2323985f3f19a74736e3c5fcd242812c1d0e85b3156a062bd8bc87aac0a67f2c3951c00dee06a69b2fcd5722e43fbcd29390b644f2dfc619121bd7642569964b205164e5110963778032734175d0fcfcbe9506ce61255c5dfb5d7192304dc61eccb1c42f7c9cbc0ef9c9844e4117ca0b3e79365baf109858b98e7b4df4cd66978f4f49fdcd524deedcfbee75ef4f653aac6f3f218ae730d515b0b9e1f2acfc92f8e205003c9993aa0fe7f33fb1270fb173f3f9c03e694cdbb8e6aff5478097c6c9d1d48c6eede5b73143d17d1acf6fce9f6dfb899222a80c0c1459c9887f0b8cd2cc179f3ff321427633ab2f3156ce185325f92dbb7f982969b54368f484766b8c2301e451ee2fa4046c137c938a84b296cd5751bd5fa89d0c4fdc564b76d459827130a69a1a0641e5cc8d563f2d2e5723f5d8d4acbf6acbbc47223f38e3cf9c7bc026607165bbdb12ab1d4dd5148f3c7ace99395d5e2cb0dd710f39305465b901b66c72173283b36da86831b492e9d748cd8cebd1509a0f2c32dc454fc2a2e1a358b56f592b8ed3606c1214c2b017b3244ca762f3402646672a96f3216ac722323cfc31da1b277fac59afc17dfa23c86d23b45a71b73239b86178a00259a06f012d171fab3fe8c9f4d2a7506341c139282a04e964e757a906b4464cffd78ccc36b0f5775bd15d11e99a515ea3cb1f42bb013dbe8e3d837650c38d7231a8993dd1783377e3da40d7ca27bb654e925936fb9aa77e297feb8d5096d6fc53238bd046eaa30aab5fd0a7db803b56782f4e2cc189528bee3436ad22dbfc51298775e9823c4bb924cc18cc242e3e252459abdd58800956a2d66bb25a08ce98bb8c13b360122dd85205a56394a36de27cb18082c7866a82dc1e5d5c6ff45228d833be232908db7af278ebcadc8355c1850c943672599ca84e1f45a1ee37d1377e59fc37048932b86c57b7a778da6c0bc41d6785b7390a5e57367823dd1decdf0e4319f079325230f62dc62c033cb0bab7cc65dfe83888c6304498a15870209c1dcad951897227d23bb1d633a5f42a369b6412393b76d27f5f8ba673c2a27b430aa05d1825c102795721e8925e44033e9a415a0d30cb3971e130b5f9be791d03e5e6582207d026156b0f361cd02114f1cbc2f22a3d4273352d546bdcbc354ac4d683bb20f8d828927f0f77ade0ce0a2ea7f8a0c80f7c690639bdf68182679733aa9ac5370159655b45d27b701e6e846223403ea980b863eb38fba2b1b371f9b859500b03f3f72d049de35f4329fd4b9255068be11802dd87395c44a812fec28da454a810f698b90d0e09fb574c0b84a74c0e9576059ec28f179808951888149c5f2ad7683c24ab2290dbeae5cc454fa072f81b61bd051d2480913cf25fe081007c5aae09379ea7e2f2bf17f80e6a85e24c357dfe9e30d41b1262f73d5d3be84ba06386457537a8ad9a870b52cd7164f93e2d68cb3bda1b7331895ba0f4d6e505983ab15b3a47ebe4b0c9f9aacb66c98045a71f814d0cb98afdc2b93dd1176e13c8588e29db32b9ce068b6655770d93ee8ff5c677223596b7d00286c7706d413cd64035724043f34de17994c0a93dcde5c503d0c1d1a9d88fda305fcb06f46ad786ae10859424c30f4a08a27e32eec772e7a77ccd8c46831b39d390811e254e751acaf00d1d64bc0153522968d65024e6e75031019000ee5be47abc56", 0x1000}, {&(0x7f0000000280)="40335fc1f68833771594bcfc9c38856a914ee0ac9feea6a78840ee375ada1f6d27d4301b446a9980109d6c5b1976b4a1060d11912062d346f5013860052fdfa2033c486c8287d0e94073ca097018ca47ad6907e83d7e8096ffe413aae86fba51723c571ee2fd8e0a12a1f7b65fdca5909dd2fd199993c30e1b28486a511aeb02e74a1ef9a8f375def53bd4f65e31fb4d0978db91caa0aeb2195aadfe28f7f2509d8eed", 0xa3}, {&(0x7f0000000000)="25afeed9b894e40c74abdb7e314d653d7ab4d47d96725339c640b2cb1e26d791f7bf439e114d2fed1be5359a79d94ec7075af064b6e55eb37c", 0x39}], 0x6, &(0x7f0000000040)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x800}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r4, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f00000026c0)=r1) close(0xffffffffffffffff) [ 627.390410][ T5063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 627.390423][ T5063] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:42 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) openat$cgroup_ro(r0, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:42 executing program 0 (fault-call:1 fault-nth:61): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:42 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0) 04:26:42 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x4) 04:26:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37680400802f64170400bd", 0x2e}], 0x1}, 0x0) [ 627.697471][ T5104] FAULT_INJECTION: forcing a failure. [ 627.697471][ T5104] name failslab, interval 1, probability 0, space 0, times 0 [ 627.779098][ T5104] CPU: 0 PID: 5104 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 627.787750][ T5104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.797834][ T5104] Call Trace: [ 627.801626][ T5104] dump_stack+0x197/0x210 [ 627.801967][ T5110] validate_nla: 9 callbacks suppressed [ 627.801976][ T5110] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 627.806009][ T5104] should_fail.cold+0xa/0x15 [ 627.806032][ T5104] ? fault_create_debugfs_attr+0x180/0x180 [ 627.806058][ T5104] ? ___might_sleep+0x163/0x2c0 [ 627.834900][ T5104] __should_failslab+0x121/0x190 [ 627.839862][ T5104] should_failslab+0x9/0x14 [ 627.844385][ T5104] kmem_cache_alloc+0x2aa/0x710 [ 627.849250][ T5104] ? memset+0x40/0x40 [ 627.853260][ T5104] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 627.858482][ T5104] pcpu_get_vm_areas+0x49e/0x3ee0 [ 627.863514][ T5104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 627.869754][ T5104] ? __vmalloc_node_range+0x4d7/0x810 [ 627.875431][ T5104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 627.881689][ T5104] pcpu_create_chunk+0x24e/0x7f0 [ 627.881710][ T5104] pcpu_alloc+0x10f3/0x1380 [ 627.881734][ T5104] ? pcpu_alloc_area+0x820/0x820 [ 627.881750][ T5104] ? bpf_map_area_alloc+0x20/0x30 [ 627.881774][ T5104] __alloc_percpu_gfp+0x28/0x30 [ 627.881790][ T5104] htab_map_alloc+0xdb9/0x11c0 [ 627.881817][ T5104] ? htab_map_update_elem+0xca0/0xca0 [ 627.891235][ T5104] __do_sys_bpf+0x478/0x3810 [ 627.891257][ T5104] ? bpf_prog_load+0x18f0/0x18f0 [ 627.891272][ T5104] ? __kasan_check_write+0x14/0x20 [ 627.891290][ T5104] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 627.891305][ T5104] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 627.891321][ T5104] ? wait_for_completion+0x440/0x440 [ 627.891345][ T5104] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 627.891376][ T5104] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 627.906156][ T5104] ? do_syscall_64+0x26/0x790 [ 627.906173][ T5104] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.906192][ T5104] ? do_syscall_64+0x26/0x790 [ 627.916313][ T5104] __x64_sys_bpf+0x73/0xb0 [ 627.916334][ T5104] do_syscall_64+0xfa/0x790 [ 627.916356][ T5104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.916374][ T5104] RIP: 0033:0x45a6f9 [ 627.992959][ T5104] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.012553][ T5104] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 628.020952][ T5104] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37090200802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:43 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(r0, &(0x7f00000002c0)='cpuacct.uSage_percpu\x00\xdf\x17\xc8P\x050\x979YE\x824N4\x19(\xc2\x18\xff\x89?w\x9b\'\x9f\xe6\xab\x0es_\x85\xbd\xe9\xad\xf6\xe3;\x93\x1a\x98\xf5\x00\xcd\xce\x94\x8e\\\xa7M\x04:\x8bJeq)\xe9\xf0\xed\xc7\xe4-\v\xf91\x92\x1e\x87\x86\xb9k.\xba\xa56\xa9\xfd\xfc\xedLp~\xca\xce', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:43 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 628.029134][ T5104] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 628.037093][ T5104] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 628.045051][ T5104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 628.053020][ T5104] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:43 executing program 0 (fault-call:1 fault-nth:62): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 628.141571][ T5118] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:43 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x40000) 04:26:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r1, 0xb, 0xffffffffffffffff, 0x1) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r2, 0xb, 0xffffffffffffffff, 0x1) openat$cgroup_ro(r2, &(0x7f0000000100)='memory.swap.current\x00', 0x0, 0x0) 04:26:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37090300802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:43 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:43 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x0) [ 628.282438][ T5126] FAULT_INJECTION: forcing a failure. [ 628.282438][ T5126] name failslab, interval 1, probability 0, space 0, times 0 [ 628.366875][ T5126] CPU: 0 PID: 5126 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 628.375961][ T5126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.386028][ T5126] Call Trace: [ 628.389336][ T5126] dump_stack+0x197/0x210 [ 628.393701][ T5126] should_fail.cold+0xa/0x15 [ 628.398322][ T5126] ? fault_create_debugfs_attr+0x180/0x180 [ 628.404676][ T5126] ? ___might_sleep+0x163/0x2c0 [ 628.409552][ T5126] __should_failslab+0x121/0x190 [ 628.414514][ T5126] should_failslab+0x9/0x14 [ 628.419040][ T5126] kmem_cache_alloc_trace+0x2d3/0x790 [ 628.424430][ T5126] ? kmem_cache_alloc+0x364/0x710 [ 628.429472][ T5126] ? memset+0x40/0x40 [ 628.433474][ T5126] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 628.438697][ T5126] pcpu_get_vm_areas+0x4d6/0x3ee0 [ 628.443738][ T5126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 628.449979][ T5126] ? __vmalloc_node_range+0x4d7/0x810 [ 628.455386][ T5126] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 628.461642][ T5126] pcpu_create_chunk+0x24e/0x7f0 [ 628.466601][ T5126] pcpu_alloc+0x10f3/0x1380 [ 628.471300][ T5126] ? pcpu_alloc_area+0x820/0x820 [ 628.476252][ T5126] ? bpf_map_area_alloc+0x20/0x30 [ 628.481296][ T5126] __alloc_percpu_gfp+0x28/0x30 [ 628.486156][ T5126] htab_map_alloc+0xdb9/0x11c0 [ 628.490944][ T5126] ? htab_map_update_elem+0xca0/0xca0 [ 628.496335][ T5126] __do_sys_bpf+0x478/0x3810 [ 628.500953][ T5126] ? bpf_prog_load+0x18f0/0x18f0 [ 628.505902][ T5126] ? __kasan_check_write+0x14/0x20 [ 628.511028][ T5126] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 628.516584][ T5126] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 628.521888][ T5126] ? wait_for_completion+0x440/0x440 [ 628.527206][ T5126] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 628.534688][ T5126] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 628.540158][ T5126] ? do_syscall_64+0x26/0x790 [ 628.545026][ T5126] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.551105][ T5126] ? do_syscall_64+0x26/0x790 [ 628.555798][ T5126] __x64_sys_bpf+0x73/0xb0 [ 628.560324][ T5126] do_syscall_64+0xfa/0x790 04:26:43 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r0, 0x6, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x0, 0x18f, &(0x7f00000000c0)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y'}, 0x30) r2 = gettid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r2, 0x6, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg(r3, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r3) r4 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000440)={0xc, 0x2}, 0x0, 0x0, &(0x7f0000000480)={0x0, 0xe, 0x7fff, 0xffffffff}, &(0x7f00000004c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0xc}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='(\']@\x00', r5}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={r6, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x0], 0x1}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r3, 0x0, 0x18f, &(0x7f0000000640)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', r5}, 0x30) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x8000, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r8, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 628.564875][ T5126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.570769][ T5126] RIP: 0033:0x45a6f9 [ 628.570786][ T5126] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.570795][ T5126] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 628.570809][ T5126] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 04:26:43 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xf6}, r3, 0xb, 0xffffffffffffffff, 0x1) close(r4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000140)={0x1, 0x70, 0x0, 0x5, 0x81, 0x5, 0x0, 0x3f, 0xdc3b8736a11ecd02, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9bb, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0x8, 0x3, 0x5, 0x0, 0x5, 0x45cf95c5, 0x1}) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x28, &(0x7f0000000040)}, 0x10) write$cgroup_type(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_int(r5, &(0x7f0000000000)='notify_on_release\x00', 0x2, 0x0) close(0xffffffffffffffff) [ 628.570819][ T5126] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 628.570827][ T5126] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 628.570835][ T5126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 628.570841][ T5126] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 628.593299][ T5143] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:26:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37090500802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:43 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0xffffff7f) 04:26:43 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 04:26:43 executing program 0 (fault-call:1 fault-nth:63): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:43 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x80000000}, 0xc) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(r1, &(0x7f0000000a00)='mem\x86vV\x04\x12R>\xe4ent\x00\x9b+\x8d\x84c\xffB\x17Q\x152\xed\xa8C\x19~\xa0+\xd1\x8c\x97\xad\x90\xef\xd4\xe4\xf2\xcce\xeaHD\xf22\xc3t3%\xf4/\x908\b\xb6\x19\x81N\x82\xf8\x16;O\xf1\xb5y\xa0\xd3\xef\x81\x18\x1f\xd8T\x92\xdb\xc6|DO\xc7Z\xa7\x98V\x97\xf1\xb00\xea\xdfD^V\xb9\xe7\x84\x02\x17R3\x9c\xc8\xc6\xcf\xdd<\xaf\xcc\xc0\xd9\x91h{\x88\xe0\xe4S\x9a6\r\xdc\x97y\xa2\xcc\x8fu\x18\xbb\xbc\xe9\x9e&*\xc0)i\x0e1_W#6g9\xa1\x14\x85\xc6\xf0\x05\x99\xf3Fl\x9f:\x14<\xd8\xe6\xfa\xab\x81\xec\xaeI\\\x1e\x1f\xe4\xb8\xfd\xdc\x85\x1eY\x14\xe4\x85\x0e\x89W\xdcnH\xe9\xa7\xea\xa2A\xc9\v\xb8n\xcd\xf8|\x98oZ\x1b\xc3\xc7/\xc9\xda\x94]\xb1\xb1\xf2\xef\xfb', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab2d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c324f99582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53d201dcc2d30f4310e8281b0cdc017f975a060ea88a2f6597e966a85c9a74ca196700218f91afe7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f3ed5a2e1cf1a60fe2dcc1a465aa8d54cb400"/586], &(0x7f0000000340)='syzkaller\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x0, 0x0, 0x200000}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r3, 0x4, 0x1}, 0x10) close(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000180)={r4}) write$cgroup_type(r5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x7ff, 0x12) [ 628.944301][ T5165] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 628.978404][ T5166] FAULT_INJECTION: forcing a failure. [ 628.978404][ T5166] name failslab, interval 1, probability 0, space 0, times 0 04:26:44 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) [ 629.009569][ T5165] __nla_validate_parse: 7 callbacks suppressed [ 629.009580][ T5165] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 629.040307][ T5166] CPU: 1 PID: 5166 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 629.049129][ T5166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.059549][ T5166] Call Trace: [ 629.062865][ T5166] dump_stack+0x197/0x210 [ 629.067226][ T5166] should_fail.cold+0xa/0x15 [ 629.071889][ T5166] ? fault_create_debugfs_attr+0x180/0x180 [ 629.077730][ T5166] ? ___might_sleep+0x163/0x2c0 [ 629.083370][ T5166] __should_failslab+0x121/0x190 [ 629.083387][ T5166] should_failslab+0x9/0x14 [ 629.083398][ T5166] kmem_cache_alloc_trace+0x2d3/0x790 [ 629.083408][ T5166] ? kmem_cache_alloc+0x364/0x710 [ 629.083418][ T5166] ? memset+0x40/0x40 [ 629.083438][ T5166] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 629.112607][ T5166] pcpu_get_vm_areas+0x4d6/0x3ee0 [ 629.117863][ T5166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.124123][ T5166] ? __vmalloc_node_range+0x4d7/0x810 [ 629.129534][ T5166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.135810][ T5166] pcpu_create_chunk+0x24e/0x7f0 [ 629.141644][ T5166] pcpu_alloc+0x10f3/0x1380 [ 629.146178][ T5166] ? pcpu_alloc_area+0x820/0x820 [ 629.151690][ T5166] ? bpf_map_area_alloc+0x20/0x30 [ 629.156916][ T5166] __alloc_percpu_gfp+0x28/0x30 [ 629.161786][ T5166] htab_map_alloc+0xdb9/0x11c0 [ 629.166580][ T5166] ? htab_map_update_elem+0xca0/0xca0 [ 629.171972][ T5166] __do_sys_bpf+0x478/0x3810 [ 629.176585][ T5166] ? bpf_prog_load+0x18f0/0x18f0 [ 629.181538][ T5166] ? __kasan_check_write+0x14/0x20 [ 629.186661][ T5166] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 629.192201][ T5166] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 629.192217][ T5166] ? wait_for_completion+0x440/0x440 [ 629.192243][ T5166] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 629.192274][ T5166] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.214499][ T5166] ? do_syscall_64+0x26/0x790 [ 629.219193][ T5166] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.225284][ T5166] ? do_syscall_64+0x26/0x790 [ 629.229992][ T5166] __x64_sys_bpf+0x73/0xb0 [ 629.230011][ T5166] do_syscall_64+0xfa/0x790 [ 629.230034][ T5166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.244819][ T5166] RIP: 0033:0x45a6f9 04:26:44 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x70, 0xf7, 0x5, 0x5, 0x81, 0x0, 0x7, 0x4, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0x24e, 0x6, 0x0, 0x3, 0x1, 0xd77}, r1, 0xb, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r3) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r4 = openat$cgroup_ro(r1, 0x0, 0x26e1, 0x0) write$cgroup_type(r4, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r5, &(0x7f00000000c0)="5a47542d0360f6f1450c5b59a9cf3abe4e79658ef39c30c9ad102d8aa080f15f5cd045acf8b9906eed38766fd667e364f74a22cf983c2804ec6f516c7d3694484332fb6a8146bc75123e0c677e9fdec72bf6219c2082fd173e8f721f69d0"}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:44 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x8003, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg(r1, &(0x7f0000000440)={&(0x7f00000000c0)=@xdp={0x2c, 0x8, 0x0, 0x17}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)="a7db76bbb87590ba1b2350f1f6f0c31cb4d2c14930036303e2e0b4fcefafa4a610f533eb11382c1ea55ae2ab62c355683801a82a31ca300f3d68e2b7e84b84d1956f6dca76e8ea8a1524993e99166d90025bba3d0334c37cb267f965a34f82d1d1e290de799cff76427d849cbb08e62e5b26f734f8053c71cb7734e338bf46f4412f21115ca68adebdadb1be4c75bebd7b9d62164290c9aa5a5ae0acd25b02", 0x9f}, {&(0x7f0000000200)="8b141920818b51241076a043755f3577a49b2ffb641db4462df084c6e70de9435e89a64d650327259b56992fa213d493416618d2297cac22fa8c1ab355bd998cbeb59f4323f6e391e81bb94c8c8fa16d515f00f4", 0x54}, {&(0x7f0000000040)="cdc2808d", 0x4}, {&(0x7f0000000280)="d4fd4c1dcfed78149727264d90ccefa0bc31c365003d68cd9dd0fa496107e9689df8ac17bdf60164f8f76c1351c56f50f69f98faf52f6adef41884b9e45b5df9c81206521d399cf2b7d44e567508dbc9f1c673d1553a4a5449980fbd7c1f3018f0aca5e84c89a81cf4854f892e0dd4721792c3b5630174481df82debcb956d1f9738df03588c6b762864816dc179352f9e442394729974367b22ea8439f066d5d53cb1aee4a2b68831c739acc8baa5", 0xaf}, {&(0x7f0000000640)="04c49894346df7c9caf6c5d0691dd378f76677b2578161fbca18d2e441c3e84eff01e20b3abc483d6fbbb1d64fe3886123b2ca779937ea1cccb96c1bef8d74096bba4de3b641eba2bbd2166e1348072d57e8faa30649aa5ea737826de371bc3766232d4a77932e7d4303db7124db751f0a06b2d5431e4604a09c96c753bcb3ca99cc99f2666c510560d6de3cf9da393f75fcd92142af7c8268cdede3b9ac0e898703483220a77af3d3dbb40ba883a568812c47e6f465779a8a05ae403be4ebb2f5d5ebb08c8afda8813f38d2b3e5674a7ed5ed90201aa200a38faf21fda6213f", 0xe0}], 0x5, &(0x7f0000000740)=[{0xe0, 0x10c, 0xfffffffc, "9e0c0e9a7c5c248a5a1560839ba68168308f7ab5e3a81f69ef2a2cdcfb4b8c77c546be7e61980b77ea7b6585ffabffc443cbacf06bb32323f895df03d819d882f2095f5ba86ce9f769fafcbb316f94ca81ea7865439422f391cac99f156e17ade2001d85dace6f0765fc195c158ccd49bfacc886e45ec1ba8fd74f2cfd697accb51bc10c71924e9fb9c9d3dc337e85f86fb68523d8dc51f0404090ba50ec85ed4872803910bde94afd3a2119226bcc9b488b9f76f13f82467d3f03f6291a928ea95ba657f0c147b8cea1"}, {0xc0, 0x0, 0x81, "b3923671e4ec0c97a9d8dd97c9b2ccec1485826abbd305a822aa8400457404576e153327b988eb0c1bc6b82791814a697b537d2d619172940f3c9012de63d4c7b06e2269d2dda2ccbe7114d677c63f8bc514ef3fb45be9d0bda30a89fb217fd6e1286f1767311b6dcb97fc23ce047cd72a4b877903a07c0d4877c6159dd2f51ca2651a547f35ac9744690732985d08fa1c53bbca779159ba52ce8de6c5b6190f3c66d030f3de2d7fa9a1c1b7124038"}, {0xf0, 0x15, 0x9, "288584b383620d5a92694f9a71133b0d0dfafdd63f79faf6b42ccd1dc6fed4edb80c388735b3d3c89f73991af7892ca4247685640c8c4fc60f7fd4a26755753512a51cd5cb7f2183bf6f8057aecdf996d60d7bb460545ca3776463a53258668ae2409a10ff835ce9fafc1e964606eb989bf5a66ca5b82a4f402adab46b11f5475108169d1a17b4a4123f254ac82c2709ac6e801dddb1a9240aab6377cc16c2bd707eec2e9db525ee885ee8b2a0f0832813a717521913ecd660359c8c18800956a4e3bbe6c7d7e783d5af1a2e1aa6fd7a7ad81adc2d0075f981e87b05"}], 0x290}, 0x40000) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) 04:26:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37090600802f64170400bd", 0x2e}], 0x1}, 0x0) [ 629.248733][ T5166] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 629.268358][ T5166] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 629.268372][ T5166] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 629.268380][ T5166] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 629.268389][ T5166] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 629.268397][ T5166] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 04:26:44 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0x4000000000000) [ 629.268404][ T5166] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 04:26:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r3, 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 629.382967][ T5186] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 629.421160][ T5186] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 04:26:44 executing program 0 (fault-call:1 fault-nth:64): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 04:26:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000508d25a80648c6394fb0424fc0012000b140c000200053582c137153e37090700802f64170400bd", 0x2e}], 0x1}, 0x0) 04:26:44 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 04:26:44 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x12, 0x0}, 0xffffff7f00000000) 04:26:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000e01007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c491248d3bf13389b2935c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d07f7ab7e43686b4d1e03e326beea7905ef7de375ef8bc8043df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a1072ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb400"/594], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x2ed, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795eca00", 0x0, 0x81, 0xf2ffffff, 0x7c, 0x6a, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x40) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) close(r4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 629.654639][ T5201] FAULT_INJECTION: forcing a failure. [ 629.654639][ T5201] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 629.685881][ T5204] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 629.708556][ T5204] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. [ 629.719414][ T5201] CPU: 1 PID: 5201 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 629.729090][ T5201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.739165][ T5201] Call Trace: [ 629.742480][ T5201] dump_stack+0x197/0x210 [ 629.747535][ T5201] should_fail.cold+0xa/0x15 [ 629.752154][ T5201] ? fault_create_debugfs_attr+0x180/0x180 [ 629.758016][ T5201] ? ___might_sleep+0x163/0x2c0 [ 629.763014][ T5201] should_fail_alloc_page+0x50/0x60 [ 629.768230][ T5201] __alloc_pages_nodemask+0x1a1/0x910 [ 629.773806][ T5201] ? find_held_lock+0x35/0x130 [ 629.778593][ T5201] ? __alloc_pages_slowpath+0x2920/0x2920 [ 629.784334][ T5201] ? lock_downgrade+0x920/0x920 [ 629.789301][ T5201] ? rwlock_bug.part.0+0x90/0x90 [ 629.794356][ T5201] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 629.800622][ T5201] alloc_pages_current+0x107/0x210 [ 629.805760][ T5201] __get_free_pages+0xc/0x40 [ 629.810365][ T5201] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 629.816035][ T5201] apply_to_page_range+0x445/0x700 [ 629.822039][ T5201] ? memset+0x40/0x40 [ 629.826305][ T5201] kasan_populate_vmalloc+0x68/0x90 [ 629.832218][ T5201] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 629.837561][ T5201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.843844][ T5201] pcpu_create_chunk+0x24e/0x7f0 [ 629.843865][ T5201] pcpu_alloc+0x10f3/0x1380 [ 629.853870][ T5201] ? pcpu_alloc_area+0x820/0x820 [ 629.858833][ T5201] ? bpf_map_area_alloc+0x20/0x30 [ 629.863884][ T5201] __alloc_percpu_gfp+0x28/0x30 [ 629.868922][ T5201] htab_map_alloc+0xdb9/0x11c0 [ 629.868952][ T5201] ? htab_map_update_elem+0xca0/0xca0 [ 629.868971][ T5201] __do_sys_bpf+0x478/0x3810 [ 629.885340][ T5201] ? bpf_prog_load+0x18f0/0x18f0 [ 629.890344][ T5201] ? __kasan_check_write+0x14/0x20 [ 629.895483][ T5201] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 629.901048][ T5201] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 629.906360][ T5201] ? wait_for_completion+0x440/0x440 [ 629.911677][ T5201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 629.917950][ T5201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.923429][ T5201] ? do_syscall_64+0x26/0x790 [ 629.928132][ T5201] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.934211][ T5201] ? do_syscall_64+0x26/0x790 [ 629.938914][ T5201] __x64_sys_bpf+0x73/0xb0 [ 629.943342][ T5201] do_syscall_64+0xfa/0x790 [ 629.947854][ T5201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.953760][ T5201] RIP: 0033:0x45a6f9 [ 629.957665][ T5201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 629.977577][ T5201] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 629.986015][ T5201] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 629.994026][ T5201] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 630.002202][ T5201] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:26:44 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x8000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='../..\x00\xf0\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) socketpair(0x8, 0x800, 0x7f, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x9) write$cgroup_type(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r3) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(r3, &(0x7f0000000040)='threaded\x00', 0x9) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) [ 630.010199][ T5201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 630.018219][ T5201] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 630.046137][ T5201] ================================================================== [ 630.054593][ T5201] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 630.062372][ T5201] Write of size 30848 at addr ffffe8ffffa00000 by task syz-executor.0/5201 [ 630.072039][ T5201] [ 630.074461][ T5201] CPU: 1 PID: 5201 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 630.083320][ T5201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.093762][ T5201] Call Trace: [ 630.097217][ T5201] dump_stack+0x197/0x210 [ 630.101545][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.106154][ T5201] print_address_description.constprop.0.cold+0x5/0x30b [ 630.113190][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.117974][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.122586][ T5201] __kasan_report.cold+0x1b/0x41 [ 630.128209][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.134059][ T5201] kasan_report+0x12/0x20 [ 630.139382][ T5201] check_memory_region+0x134/0x1a0 [ 630.144516][ T5201] memset+0x24/0x40 [ 630.148346][ T5201] pcpu_alloc+0x589/0x1380 [ 630.152811][ T5201] ? pcpu_alloc_area+0x820/0x820 [ 630.158450][ T5201] ? bpf_map_area_alloc+0x20/0x30 [ 630.163816][ T5201] __alloc_percpu_gfp+0x28/0x30 [ 630.168694][ T5201] htab_map_alloc+0xdb9/0x11c0 [ 630.173476][ T5201] ? htab_map_update_elem+0xca0/0xca0 [ 630.179174][ T5201] __do_sys_bpf+0x478/0x3810 [ 630.183964][ T5201] ? bpf_prog_load+0x18f0/0x18f0 [ 630.188939][ T5201] ? __kasan_check_write+0x14/0x20 [ 630.194103][ T5201] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 630.200821][ T5201] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 630.206112][ T5201] ? wait_for_completion+0x440/0x440 [ 630.211430][ T5201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 630.218742][ T5201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 630.224344][ T5201] ? do_syscall_64+0x26/0x790 [ 630.229030][ T5201] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.235116][ T5201] ? do_syscall_64+0x26/0x790 [ 630.239857][ T5201] __x64_sys_bpf+0x73/0xb0 [ 630.244298][ T5201] do_syscall_64+0xfa/0x790 [ 630.248839][ T5201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.254721][ T5201] RIP: 0033:0x45a6f9 [ 630.258606][ T5201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.278201][ T5201] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 630.286602][ T5201] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 630.294581][ T5201] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 630.302565][ T5201] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 630.310542][ T5201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 630.318509][ T5201] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 630.326492][ T5201] [ 630.328806][ T5201] [ 630.331122][ T5201] Memory state around the buggy address: [ 630.336772][ T5201] BUG: unable to handle page fault for address: fffff91ffff3ffe0 [ 630.344470][ T5201] #PF: supervisor read access in kernel mode [ 630.350448][ T5201] #PF: error_code(0x0000) - not-present page [ 630.356413][ T5201] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 630.363876][ T5201] Oops: 0000 [#1] PREEMPT SMP KASAN [ 630.369064][ T5201] CPU: 1 PID: 5201 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 630.377634][ T5201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.387692][ T5201] RIP: 0010:memcpy_erms+0x6/0x10 [ 630.392618][ T5201] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 630.412212][ T5201] RSP: 0018:ffffc900018e7990 EFLAGS: 00010082 [ 630.418288][ T5201] RAX: ffffc900018e799c RBX: fffff91ffff3ffe0 RCX: 0000000000000010 [ 630.426279][ T5201] RDX: 0000000000000010 RSI: fffff91ffff3ffe0 RDI: ffffc900018e799c [ 630.434330][ T5201] RBP: ffffc900018e79f0 R08: ffff88809a832380 R09: fffff5200031cf38 [ 630.442292][ T5201] R10: fffff5200031cf37 R11: ffffc900018e79be R12: fffff91ffff40000 [ 630.450272][ T5201] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 630.458591][ T5201] FS: 00007f93e4b7b700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 630.467503][ T5201] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 630.474247][ T5201] CR2: fffff91ffff3ffe0 CR3: 00000000a3798000 CR4: 00000000001406e0 [ 630.482218][ T5201] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 630.490185][ T5201] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 630.498169][ T5201] Call Trace: [ 630.501449][ T5201] ? print_shadow_for_address+0x91/0x117 [ 630.507065][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.511651][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.516232][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.520806][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.525383][ T5201] __kasan_report.cold+0x30/0x41 [ 630.530319][ T5201] ? pcpu_alloc+0x589/0x1380 [ 630.534900][ T5201] kasan_report+0x12/0x20 [ 630.539217][ T5201] check_memory_region+0x134/0x1a0 [ 630.544325][ T5201] memset+0x24/0x40 [ 630.548122][ T5201] pcpu_alloc+0x589/0x1380 [ 630.552534][ T5201] ? pcpu_alloc_area+0x820/0x820 [ 630.562164][ T5201] ? bpf_map_area_alloc+0x20/0x30 [ 630.567191][ T5201] __alloc_percpu_gfp+0x28/0x30 [ 630.572035][ T5201] htab_map_alloc+0xdb9/0x11c0 [ 630.576800][ T5201] ? htab_map_update_elem+0xca0/0xca0 [ 630.582171][ T5201] __do_sys_bpf+0x478/0x3810 [ 630.586752][ T5201] ? bpf_prog_load+0x18f0/0x18f0 [ 630.591693][ T5201] ? __kasan_check_write+0x14/0x20 [ 630.596796][ T5201] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 630.602334][ T5201] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 630.607718][ T5201] ? wait_for_completion+0x440/0x440 [ 630.613001][ T5201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 630.619243][ T5201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 630.624702][ T5201] ? do_syscall_64+0x26/0x790 [ 630.629365][ T5201] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.635419][ T5201] ? do_syscall_64+0x26/0x790 [ 630.640106][ T5201] __x64_sys_bpf+0x73/0xb0 [ 630.644521][ T5201] do_syscall_64+0xfa/0x790 [ 630.649031][ T5201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.654921][ T5201] RIP: 0033:0x45a6f9 [ 630.658820][ T5201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.678427][ T5201] RSP: 002b:00007f93e4b7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 630.686939][ T5201] RAX: ffffffffffffffda RBX: 00007f93e4b7ac90 RCX: 000000000045a6f9 [ 630.694900][ T5201] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 630.703392][ T5201] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 630.711364][ T5201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e4b7b6d4 [ 630.719320][ T5201] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000003 [ 630.727377][ T5201] Modules linked in: [ 630.731259][ T5201] CR2: fffff91ffff3ffe0 [ 630.735408][ T5201] ---[ end trace cf284e04dbdaa2c3 ]--- [ 630.741117][ T5201] RIP: 0010:memcpy_erms+0x6/0x10 [ 630.746042][ T5201] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 630.765830][ T5201] RSP: 0018:ffffc900018e7990 EFLAGS: 00010082 [ 630.771922][ T5201] RAX: ffffc900018e799c RBX: fffff91ffff3ffe0 RCX: 0000000000000010 [ 630.779900][ T5201] RDX: 0000000000000010 RSI: fffff91ffff3ffe0 RDI: ffffc900018e799c [ 630.787860][ T5201] RBP: ffffc900018e79f0 R08: ffff88809a832380 R09: fffff5200031cf38 [ 630.796817][ T5201] R10: fffff5200031cf37 R11: ffffc900018e79be R12: fffff91ffff40000 [ 630.804782][ T5201] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 630.813122][ T5201] FS: 00007f93e4b7b700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 630.822038][ T5201] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 630.828609][ T5201] CR2: fffff91ffff3ffe0 CR3: 00000000a3798000 CR4: 00000000001406e0 [ 630.836673][ T5201] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 630.844636][ T5201] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 630.852597][ T5201] Kernel panic - not syncing: Fatal exception [ 630.860138][ T5201] Kernel Offset: disabled [ 630.864994][ T5201] Rebooting in 86400 seconds..