ffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00?\x00', 0x7302}) 08:15:35 executing program 4 (fault-call:3 fault-nth:24): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb01001800000000000000c4000000c40000000c000000000000000300000d0000000007000000000000000b000000000b00000004000000010000000800000604000000000000000600000000000000000000000c0000000400000000000000020000000b000000ff030000040000000100000003000000070000000500000001000000050000000000000e0080fff1010000000500000002000004040000000e00000005000000050000000900000000000000010000000f000000000000010000000057006500010000000000000e0200000001000000003048005f2e002e00000000ab431a64a4ea905842e9f3178d7a616a8446de7af7998c81d4098edf30d5132ef9ec51f7a7f095a646c6a14d3b232b6302ab4e14814220836c41"], &(0x7f0000000600), 0xe8, 0x0, 0x1}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x100000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x5, 0x4, 0xcf, 0x7f, 0x0, 0x8, 0x8005, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x130c0, 0x0, @perf_config_ext={0x4}, 0x10100, 0x0, 0x1f, 0x0, 0x35de, 0x0, 0x1000}, 0x0, 0x4, r2, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='posix_acl_access){#ppp1&](\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r7 = gettid() r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r7, r8, 0x0, 0x23, &(0x7f0000000540)='GPLvboxnet1md5sumposix_acl_access,\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x11, &(0x7f0000000100)='posix_acl_access\x00', r6}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r11 = openat$cgroup_ro(r10, 0x0, 0x0, 0x0) r12 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r12) recvmsg(r12, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r12) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r12, 0x4008240b, &(0x7f0000000680)={0x444aeba93407fcc0, 0x70, 0x5, 0x3, 0x4, 0x62, 0x0, 0xee, 0x40000, 0xece6bcb530f52bb7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000600), 0x8}, 0x100, 0x7fff, 0x398d, 0xb, 0x3f, 0x6, 0xef7f}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r14 = gettid() r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r14, r15, 0x0, 0x23, &(0x7f0000000540)='GPLvboxnet1md5sumposix_acl_access,\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r9, r10, 0x0, 0xa, &(0x7f0000000200)='^bdevppp0\x00', r13}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r16 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r16, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r16, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r16, 0x0, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={r11, 0x17, 0x1, 0x5, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) [ 1376.963055][T16806] FAULT_INJECTION: forcing a failure. [ 1376.963055][T16806] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.988405][T16806] CPU: 0 PID: 16806 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1376.997124][T16806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1377.007186][T16806] Call Trace: [ 1377.010571][T16806] dump_stack+0x197/0x210 [ 1377.014959][T16806] should_fail.cold+0xa/0x15 [ 1377.019545][T16806] ? fault_create_debugfs_attr+0x180/0x180 [ 1377.025350][T16806] ? ___might_sleep+0x163/0x2c0 [ 1377.030193][T16806] __should_failslab+0x121/0x190 [ 1377.035244][T16806] should_failslab+0x9/0x14 [ 1377.039756][T16806] kmem_cache_alloc+0x2aa/0x710 [ 1377.044594][T16806] ? lock_downgrade+0x920/0x920 [ 1377.049506][T16806] ? kernfs_activate+0x34/0x1f0 [ 1377.054376][T16806] __kernfs_new_node+0xf0/0x6e0 [ 1377.059258][T16806] ? __kasan_check_write+0x14/0x20 [ 1377.064370][T16806] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1377.069823][T16806] ? wait_for_completion+0x440/0x440 [ 1377.075146][T16806] ? mutex_unlock+0x1b/0x30 [ 1377.079647][T16806] ? kernfs_activate+0x192/0x1f0 [ 1377.084583][T16806] kernfs_new_node+0x96/0x120 [ 1377.089249][T16806] __kernfs_create_file+0x51/0x340 [ 1377.094377][T16806] sysfs_add_file_mode_ns+0x222/0x560 [ 1377.099755][T16806] internal_create_group+0x359/0xc40 [ 1377.105046][T16806] ? remove_files.isra.0+0x190/0x190 [ 1377.110317][T16806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.116553][T16806] ? kernfs_create_link+0x1cc/0x250 [ 1377.121739][T16806] internal_create_groups.part.0+0x90/0x140 [ 1377.127617][T16806] sysfs_create_groups+0x2a/0x50 [ 1377.132535][T16806] device_add+0x7f4/0x1d00 [ 1377.136934][T16806] ? dev_set_name+0xbb/0xf0 [ 1377.141438][T16806] ? uevent_show+0x370/0x370 [ 1377.146028][T16806] ? __init_waitqueue_head+0x36/0x90 [ 1377.151314][T16806] ? pm_runtime_init+0x311/0x3b0 [ 1377.156255][T16806] netdev_register_kobject+0x183/0x3b0 [ 1377.161795][T16806] register_netdevice+0x4f4/0x1020 [ 1377.166900][T16806] ? netdev_change_features+0xb0/0xb0 [ 1377.172261][T16806] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1377.177208][T16806] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1377.182866][T16806] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1377.188678][T16806] ? _raw_spin_unlock_irq+0x59/0x80 [ 1377.193866][T16806] ? __schedule+0x93c/0x1f90 [ 1377.198441][T16806] ? tun_chr_compat_ioctl+0x30/0x30 [ 1377.203621][T16806] tun_chr_ioctl+0x2b/0x40 [ 1377.208030][T16806] do_vfs_ioctl+0x977/0x14e0 [ 1377.212613][T16806] ? compat_ioctl_preallocate+0x220/0x220 [ 1377.218319][T16806] ? preempt_schedule_irq+0xf3/0x160 [ 1377.223619][T16806] ? retint_kernel+0x2b/0x2b [ 1377.228243][T16806] ? tomoyo_file_ioctl+0x23/0x30 [ 1377.233178][T16806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.239404][T16806] ? security_file_ioctl+0x8d/0xc0 [ 1377.244520][T16806] ksys_ioctl+0xab/0xd0 [ 1377.248695][T16806] __x64_sys_ioctl+0x73/0xb0 [ 1377.253274][T16806] do_syscall_64+0xfa/0x790 [ 1377.257771][T16806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1377.263645][T16806] RIP: 0033:0x45a919 [ 1377.267523][T16806] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1377.287122][T16806] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1377.295624][T16806] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1377.303595][T16806] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1377.311551][T16806] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1377.319510][T16806] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1377.327464][T16806] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x009\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x02\x00'}) 08:15:36 executing program 4 (fault-call:3 fault-nth:25): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='(\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) 08:15:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00@\x00', 0x7302}) 08:15:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x17\x00', 0x7302}) [ 1377.837126][T16823] FAULT_INJECTION: forcing a failure. [ 1377.837126][T16823] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.860639][T16823] CPU: 1 PID: 16823 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1377.869608][T16823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1377.869615][T16823] Call Trace: [ 1377.869636][T16823] dump_stack+0x197/0x210 [ 1377.869660][T16823] should_fail.cold+0xa/0x15 [ 1377.891972][T16823] ? fault_create_debugfs_attr+0x180/0x180 [ 1377.897805][T16823] ? ___might_sleep+0x163/0x2c0 [ 1377.902681][T16823] __should_failslab+0x121/0x190 [ 1377.907637][T16823] should_failslab+0x9/0x14 [ 1377.912166][T16823] kmem_cache_alloc+0x2aa/0x710 [ 1377.917037][T16823] ? lock_downgrade+0x920/0x920 [ 1377.921902][T16823] ? kernfs_activate+0x34/0x1f0 [ 1377.926777][T16823] __kernfs_new_node+0xf0/0x6e0 [ 1377.931639][T16823] ? __kasan_check_write+0x14/0x20 [ 1377.936761][T16823] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1377.942242][T16823] ? wait_for_completion+0x440/0x440 [ 1377.947557][T16823] ? mutex_unlock+0x1b/0x30 [ 1377.952095][T16823] ? kernfs_activate+0x192/0x1f0 [ 1377.952120][T16823] kernfs_new_node+0x96/0x120 [ 1377.952140][T16823] __kernfs_create_file+0x51/0x340 [ 1377.952162][T16823] sysfs_add_file_mode_ns+0x222/0x560 [ 1377.972570][T16823] internal_create_group+0x359/0xc40 [ 1377.977873][T16823] ? remove_files.isra.0+0x190/0x190 [ 1377.977900][T16823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1377.977918][T16823] ? kernfs_create_link+0x1cc/0x250 [ 1377.977940][T16823] internal_create_groups.part.0+0x90/0x140 [ 1377.977960][T16823] sysfs_create_groups+0x2a/0x50 [ 1377.977976][T16823] device_add+0x7f4/0x1d00 [ 1377.977988][T16823] ? dev_set_name+0xbb/0xf0 [ 1377.978013][T16823] ? uevent_show+0x370/0x370 [ 1378.018981][T16823] ? __init_waitqueue_head+0x36/0x90 [ 1378.024300][T16823] ? pm_runtime_init+0x311/0x3b0 [ 1378.029262][T16823] netdev_register_kobject+0x183/0x3b0 [ 1378.034852][T16823] register_netdevice+0x4f4/0x1020 [ 1378.039995][T16823] ? netdev_change_features+0xb0/0xb0 [ 1378.045396][T16823] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1378.050357][T16823] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1378.055512][T16823] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1378.061331][T16823] ? __f_unlock_pos+0x19/0x20 [ 1378.066044][T16823] ? tun_chr_compat_ioctl+0x30/0x30 [ 1378.071258][T16823] tun_chr_ioctl+0x2b/0x40 [ 1378.075692][T16823] do_vfs_ioctl+0x977/0x14e0 [ 1378.080301][T16823] ? compat_ioctl_preallocate+0x220/0x220 [ 1378.086022][T16823] ? __fget+0x37f/0x550 [ 1378.090184][T16823] ? ksys_dup3+0x3e0/0x3e0 [ 1378.094625][T16823] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1378.100913][T16823] ? fput_many+0x12c/0x1a0 [ 1378.105352][T16823] ? tomoyo_file_ioctl+0x23/0x30 [ 1378.110288][T16823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1378.116525][T16823] ? security_file_ioctl+0x8d/0xc0 [ 1378.121635][T16823] ksys_ioctl+0xab/0xd0 [ 1378.125777][T16823] __x64_sys_ioctl+0x73/0xb0 [ 1378.130355][T16823] do_syscall_64+0xfa/0x790 [ 1378.134847][T16823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1378.140726][T16823] RIP: 0033:0x45a919 [ 1378.144616][T16823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1378.164230][T16823] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1378.172642][T16823] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1378.180637][T16823] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1378.188607][T16823] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1378.196568][T16823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1378.204611][T16823] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:15:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x03\x00'}) 08:15:37 executing program 4 (fault-call:3 fault-nth:26): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x04\x00'}) [ 1378.573842][T16846] FAULT_INJECTION: forcing a failure. [ 1378.573842][T16846] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.594064][T16846] CPU: 1 PID: 16846 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1378.602788][T16846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1378.612838][T16846] Call Trace: [ 1378.616121][T16846] dump_stack+0x197/0x210 [ 1378.620442][T16846] should_fail.cold+0xa/0x15 [ 1378.625025][T16846] ? fault_create_debugfs_attr+0x180/0x180 [ 1378.630841][T16846] ? ___might_sleep+0x163/0x2c0 [ 1378.635695][T16846] __should_failslab+0x121/0x190 [ 1378.640622][T16846] should_failslab+0x9/0x14 [ 1378.645113][T16846] kmem_cache_alloc+0x2aa/0x710 [ 1378.649945][T16846] ? lock_downgrade+0x920/0x920 [ 1378.654779][T16846] ? kernfs_activate+0x34/0x1f0 [ 1378.659619][T16846] __kernfs_new_node+0xf0/0x6e0 [ 1378.664457][T16846] ? __kasan_check_write+0x14/0x20 [ 1378.669555][T16846] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1378.675001][T16846] ? wait_for_completion+0x440/0x440 [ 1378.680283][T16846] ? mutex_unlock+0x1b/0x30 [ 1378.684781][T16846] ? kernfs_activate+0x192/0x1f0 [ 1378.689707][T16846] kernfs_new_node+0x96/0x120 [ 1378.694383][T16846] __kernfs_create_file+0x51/0x340 [ 1378.699493][T16846] sysfs_add_file_mode_ns+0x222/0x560 [ 1378.704859][T16846] internal_create_group+0x359/0xc40 [ 1378.710146][T16846] ? remove_files.isra.0+0x190/0x190 [ 1378.715424][T16846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1378.721736][T16846] ? kernfs_create_link+0x1cc/0x250 [ 1378.726925][T16846] internal_create_groups.part.0+0x90/0x140 [ 1378.732808][T16846] sysfs_create_groups+0x2a/0x50 [ 1378.737733][T16846] device_add+0x7f4/0x1d00 [ 1378.742168][T16846] ? dev_set_name+0xbb/0xf0 [ 1378.746673][T16846] ? uevent_show+0x370/0x370 [ 1378.751255][T16846] ? __init_waitqueue_head+0x36/0x90 [ 1378.756553][T16846] ? pm_runtime_init+0x311/0x3b0 [ 1378.761484][T16846] netdev_register_kobject+0x183/0x3b0 [ 1378.766938][T16846] register_netdevice+0x4f4/0x1020 [ 1378.772048][T16846] ? netdev_change_features+0xb0/0xb0 [ 1378.777413][T16846] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1378.782350][T16846] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1378.787457][T16846] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1378.793248][T16846] ? __f_unlock_pos+0x19/0x20 [ 1378.797919][T16846] ? tun_chr_compat_ioctl+0x30/0x30 [ 1378.803103][T16846] tun_chr_ioctl+0x2b/0x40 [ 1378.807517][T16846] do_vfs_ioctl+0x977/0x14e0 [ 1378.812104][T16846] ? compat_ioctl_preallocate+0x220/0x220 [ 1378.817804][T16846] ? __fget+0x37f/0x550 [ 1378.821957][T16846] ? ksys_dup3+0x3e0/0x3e0 [ 1378.826446][T16846] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1378.832670][T16846] ? fput_many+0x12c/0x1a0 [ 1378.837082][T16846] ? tomoyo_file_ioctl+0x23/0x30 [ 1378.842017][T16846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1378.848243][T16846] ? security_file_ioctl+0x8d/0xc0 [ 1378.853351][T16846] ksys_ioctl+0xab/0xd0 [ 1378.857588][T16846] __x64_sys_ioctl+0x73/0xb0 [ 1378.862164][T16846] do_syscall_64+0xfa/0x790 [ 1378.866660][T16846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1378.872536][T16846] RIP: 0033:0x45a919 [ 1378.876529][T16846] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1378.896389][T16846] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1378.904790][T16846] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1378.912744][T16846] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1378.920698][T16846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1378.928655][T16846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1378.936608][T16846] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x18\x00', 0x7302}) 08:15:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='vmnet0\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) 08:15:38 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00:\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x05\x00'}) 08:15:38 executing program 4 (fault-call:3 fault-nth:27): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00H\x00', 0x7302}) [ 1379.531547][T16867] FAULT_INJECTION: forcing a failure. [ 1379.531547][T16867] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.556887][T16867] CPU: 0 PID: 16867 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1379.565605][T16867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.575672][T16867] Call Trace: 08:15:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x06\x00'}) [ 1379.578982][T16867] dump_stack+0x197/0x210 [ 1379.583330][T16867] should_fail.cold+0xa/0x15 [ 1379.587947][T16867] ? fault_create_debugfs_attr+0x180/0x180 [ 1379.593778][T16867] ? ___might_sleep+0x163/0x2c0 [ 1379.598644][T16867] __should_failslab+0x121/0x190 [ 1379.603572][T16867] should_failslab+0x9/0x14 [ 1379.608063][T16867] kmem_cache_alloc+0x2aa/0x710 [ 1379.612917][T16867] ? lock_downgrade+0x920/0x920 [ 1379.617803][T16867] ? __this_cpu_preempt_check+0x35/0x190 [ 1379.623459][T16867] __kernfs_new_node+0xf0/0x6e0 [ 1379.628331][T16867] ? __kasan_check_write+0x14/0x20 [ 1379.633463][T16867] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1379.638930][T16867] ? wait_for_completion+0x440/0x440 [ 1379.644211][T16867] ? mutex_unlock+0x1b/0x30 [ 1379.648703][T16867] ? kernfs_activate+0x192/0x1f0 [ 1379.653626][T16867] kernfs_new_node+0x96/0x120 [ 1379.658295][T16867] __kernfs_create_file+0x51/0x340 [ 1379.663586][T16867] sysfs_add_file_mode_ns+0x222/0x560 [ 1379.668962][T16867] internal_create_group+0x359/0xc40 [ 1379.674239][T16867] ? remove_files.isra.0+0x190/0x190 [ 1379.679504][T16867] ? __this_cpu_preempt_check+0x35/0x190 [ 1379.685137][T16867] internal_create_groups.part.0+0x90/0x140 [ 1379.691219][T16867] sysfs_create_groups+0x2a/0x50 [ 1379.696142][T16867] device_add+0x7f4/0x1d00 [ 1379.700552][T16867] ? dev_set_name+0xbb/0xf0 [ 1379.705069][T16867] ? uevent_show+0x370/0x370 [ 1379.709651][T16867] ? __init_waitqueue_head+0x36/0x90 [ 1379.714923][T16867] ? pm_runtime_init+0x311/0x3b0 [ 1379.719846][T16867] netdev_register_kobject+0x183/0x3b0 [ 1379.725301][T16867] register_netdevice+0x4f4/0x1020 [ 1379.730503][T16867] ? netdev_change_features+0xb0/0xb0 [ 1379.735871][T16867] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1379.740810][T16867] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1379.745923][T16867] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1379.751713][T16867] ? __f_unlock_pos+0x19/0x20 [ 1379.756384][T16867] ? tun_chr_compat_ioctl+0x30/0x30 [ 1379.761563][T16867] tun_chr_ioctl+0x2b/0x40 [ 1379.765964][T16867] do_vfs_ioctl+0x977/0x14e0 [ 1379.770542][T16867] ? compat_ioctl_preallocate+0x220/0x220 [ 1379.776246][T16867] ? __fget+0x37f/0x550 [ 1379.780390][T16867] ? ksys_dup3+0x3e0/0x3e0 [ 1379.784802][T16867] ? tomoyo_file_ioctl+0x23/0x30 [ 1379.789731][T16867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.795956][T16867] ? security_file_ioctl+0x8d/0xc0 [ 1379.801054][T16867] ksys_ioctl+0xab/0xd0 [ 1379.805200][T16867] __x64_sys_ioctl+0x73/0xb0 [ 1379.809781][T16867] do_syscall_64+0xfa/0x790 [ 1379.814279][T16867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.820164][T16867] RIP: 0033:0x45a919 [ 1379.824052][T16867] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1379.843650][T16867] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1379.852056][T16867] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1379.860113][T16867] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1379.868259][T16867] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:15:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x2, 0x70, 0x1, 0x80, 0x9, 0x1f, 0x0, 0x246d, 0xc010, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x80, 0xffffffff, 0x158, 0x4, 0x2, 0x3, 0x1f}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) [ 1379.876413][T16867] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1379.884390][T16867] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x19\x00', 0x7302}) 08:15:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\a\x00'}) 08:15:39 executing program 4 (fault-call:3 fault-nth:28): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\b\x00'}) [ 1380.266219][T16889] FAULT_INJECTION: forcing a failure. [ 1380.266219][T16889] name failslab, interval 1, probability 0, space 0, times 0 [ 1380.293705][T16889] CPU: 1 PID: 16889 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1380.302515][T16889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1380.312584][T16889] Call Trace: [ 1380.315890][T16889] dump_stack+0x197/0x210 [ 1380.320250][T16889] should_fail.cold+0xa/0x15 [ 1380.324873][T16889] ? fault_create_debugfs_attr+0x180/0x180 [ 1380.324895][T16889] ? ___might_sleep+0x163/0x2c0 [ 1380.324916][T16889] __should_failslab+0x121/0x190 [ 1380.324932][T16889] should_failslab+0x9/0x14 [ 1380.324945][T16889] kmem_cache_alloc+0x2aa/0x710 [ 1380.324958][T16889] ? lock_downgrade+0x920/0x920 [ 1380.324974][T16889] ? kernfs_activate+0x34/0x1f0 [ 1380.325000][T16889] __kernfs_new_node+0xf0/0x6e0 [ 1380.325016][T16889] ? __kasan_check_write+0x14/0x20 [ 1380.325034][T16889] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1380.325055][T16889] ? wait_for_completion+0x440/0x440 [ 1380.381306][T16889] ? mutex_unlock+0x1b/0x30 [ 1380.385824][T16889] ? kernfs_activate+0x192/0x1f0 [ 1380.390789][T16889] kernfs_new_node+0x96/0x120 [ 1380.395489][T16889] __kernfs_create_file+0x51/0x340 [ 1380.401056][T16889] sysfs_add_file_mode_ns+0x222/0x560 [ 1380.406462][T16889] internal_create_group+0x359/0xc40 [ 1380.411765][T16889] ? remove_files.isra.0+0x190/0x190 [ 1380.417052][T16889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1380.425980][T16889] ? kernfs_create_link+0x1cc/0x250 [ 1380.431195][T16889] internal_create_groups.part.0+0x90/0x140 [ 1380.437082][T16889] sysfs_create_groups+0x2a/0x50 [ 1380.442027][T16889] device_add+0x7f4/0x1d00 [ 1380.446429][T16889] ? dev_set_name+0xbb/0xf0 [ 1380.450937][T16889] ? uevent_show+0x370/0x370 [ 1380.455517][T16889] ? __init_waitqueue_head+0x36/0x90 [ 1380.460794][T16889] ? pm_runtime_init+0x311/0x3b0 [ 1380.465737][T16889] netdev_register_kobject+0x183/0x3b0 [ 1380.471198][T16889] register_netdevice+0x4f4/0x1020 [ 1380.476329][T16889] ? netdev_change_features+0xb0/0xb0 [ 1380.481698][T16889] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1380.486628][T16889] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1380.491744][T16889] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1380.497542][T16889] ? __f_unlock_pos+0x19/0x20 [ 1380.502216][T16889] ? tun_chr_compat_ioctl+0x30/0x30 [ 1380.507512][T16889] tun_chr_ioctl+0x2b/0x40 [ 1380.511916][T16889] do_vfs_ioctl+0x977/0x14e0 [ 1380.516497][T16889] ? compat_ioctl_preallocate+0x220/0x220 [ 1380.522203][T16889] ? __fget+0x37f/0x550 [ 1380.526357][T16889] ? ksys_dup3+0x3e0/0x3e0 [ 1380.530765][T16889] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1380.536992][T16889] ? fput_many+0x12c/0x1a0 [ 1380.541401][T16889] ? tomoyo_file_ioctl+0x23/0x30 [ 1380.546345][T16889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1380.552586][T16889] ? security_file_ioctl+0x8d/0xc0 [ 1380.557687][T16889] ksys_ioctl+0xab/0xd0 [ 1380.563023][T16889] __x64_sys_ioctl+0x73/0xb0 [ 1380.568322][T16889] do_syscall_64+0xfa/0x790 [ 1380.572818][T16889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1380.578695][T16889] RIP: 0033:0x45a919 [ 1380.582578][T16889] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1380.602990][T16889] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:15:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) [ 1380.611488][T16889] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1380.621834][T16889] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1380.631043][T16889] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1380.639894][T16889] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1380.648392][T16889] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x10\x00'}) 08:15:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00;\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:40 executing program 4 (fault-call:3 fault-nth:29): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00?\x00'}) 08:15:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00L\x00', 0x7302}) 08:15:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x1a\x00', 0x7302}) 08:15:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3f, 0x5}, 0x0, 0x0, &(0x7f00000006c0)={0x3, 0x1, 0x8d2f}, &(0x7f0000000700)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x25bf583d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r2, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r2, 0x4) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) [ 1381.197360][T16911] FAULT_INJECTION: forcing a failure. [ 1381.197360][T16911] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.210446][T16911] CPU: 1 PID: 16911 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1381.219303][T16911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1381.229379][T16911] Call Trace: [ 1381.232700][T16911] dump_stack+0x197/0x210 [ 1381.237048][T16911] should_fail.cold+0xa/0x15 [ 1381.241669][T16911] ? fault_create_debugfs_attr+0x180/0x180 [ 1381.247514][T16911] ? ___might_sleep+0x163/0x2c0 [ 1381.252397][T16911] __should_failslab+0x121/0x190 [ 1381.257343][T16911] should_failslab+0x9/0x14 [ 1381.261840][T16911] kmem_cache_alloc+0x2aa/0x710 [ 1381.266700][T16911] ? lock_downgrade+0x920/0x920 [ 1381.271546][T16911] ? kernfs_activate+0x34/0x1f0 [ 1381.276402][T16911] __kernfs_new_node+0xf0/0x6e0 [ 1381.281250][T16911] ? __kasan_check_write+0x14/0x20 [ 1381.286352][T16911] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1381.291817][T16911] ? wait_for_completion+0x440/0x440 [ 1381.297095][T16911] ? mutex_unlock+0x1b/0x30 [ 1381.301585][T16911] ? kernfs_activate+0x192/0x1f0 [ 1381.306513][T16911] kernfs_new_node+0x96/0x120 [ 1381.311184][T16911] __kernfs_create_file+0x51/0x340 [ 1381.316287][T16911] sysfs_add_file_mode_ns+0x222/0x560 [ 1381.322225][T16911] internal_create_group+0x359/0xc40 [ 1381.330374][T16911] ? remove_files.isra.0+0x190/0x190 [ 1381.335667][T16911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1381.341918][T16911] ? kernfs_create_link+0x1cc/0x250 [ 1381.347132][T16911] internal_create_groups.part.0+0x90/0x140 [ 1381.353029][T16911] sysfs_create_groups+0x2a/0x50 [ 1381.357960][T16911] device_add+0x7f4/0x1d00 [ 1381.362375][T16911] ? dev_set_name+0xbb/0xf0 [ 1381.366868][T16911] ? uevent_show+0x370/0x370 [ 1381.371455][T16911] ? __init_waitqueue_head+0x36/0x90 [ 1381.376731][T16911] ? pm_runtime_init+0x311/0x3b0 [ 1381.381671][T16911] netdev_register_kobject+0x183/0x3b0 [ 1381.387121][T16911] register_netdevice+0x4f4/0x1020 [ 1381.392233][T16911] ? netdev_change_features+0xb0/0xb0 [ 1381.397597][T16911] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1381.402530][T16911] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1381.407626][T16911] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1381.413416][T16911] ? __f_unlock_pos+0x19/0x20 [ 1381.418092][T16911] ? tun_chr_compat_ioctl+0x30/0x30 [ 1381.423274][T16911] tun_chr_ioctl+0x2b/0x40 [ 1381.427676][T16911] do_vfs_ioctl+0x977/0x14e0 [ 1381.432267][T16911] ? compat_ioctl_preallocate+0x220/0x220 [ 1381.437976][T16911] ? __fget+0x37f/0x550 [ 1381.442121][T16911] ? ksys_dup3+0x3e0/0x3e0 [ 1381.446535][T16911] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1381.452763][T16911] ? fput_many+0x12c/0x1a0 [ 1381.457184][T16911] ? tomoyo_file_ioctl+0x23/0x30 [ 1381.462116][T16911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1381.468341][T16911] ? security_file_ioctl+0x8d/0xc0 [ 1381.473449][T16911] ksys_ioctl+0xab/0xd0 [ 1381.477599][T16911] __x64_sys_ioctl+0x73/0xb0 [ 1381.482177][T16911] do_syscall_64+0xfa/0x790 [ 1381.486670][T16911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1381.492556][T16911] RIP: 0033:0x45a919 [ 1381.496446][T16911] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1381.516050][T16911] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1381.524445][T16911] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1381.532495][T16911] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1381.540557][T16911] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1381.548617][T16911] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1381.560159][T16911] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:40 executing program 4 (fault-call:3 fault-nth:30): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00@\x00'}) [ 1381.877494][T16927] FAULT_INJECTION: forcing a failure. [ 1381.877494][T16927] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.890791][T16927] CPU: 1 PID: 16927 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1381.899490][T16927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1381.909628][T16927] Call Trace: [ 1381.913018][T16927] dump_stack+0x197/0x210 [ 1381.917363][T16927] should_fail.cold+0xa/0x15 [ 1381.921947][T16927] ? fault_create_debugfs_attr+0x180/0x180 [ 1381.927772][T16927] ? ___might_sleep+0x163/0x2c0 [ 1381.932624][T16927] __should_failslab+0x121/0x190 [ 1381.937549][T16927] should_failslab+0x9/0x14 [ 1381.942040][T16927] kmem_cache_alloc+0x2aa/0x710 [ 1381.946889][T16927] ? lock_downgrade+0x920/0x920 [ 1381.951734][T16927] ? kernfs_activate+0x34/0x1f0 [ 1381.956573][T16927] __kernfs_new_node+0xf0/0x6e0 [ 1381.961407][T16927] ? __kasan_check_write+0x14/0x20 [ 1381.966520][T16927] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1381.972106][T16927] ? wait_for_completion+0x440/0x440 [ 1381.977384][T16927] ? mutex_unlock+0x1b/0x30 [ 1381.981871][T16927] ? kernfs_activate+0x192/0x1f0 [ 1381.986816][T16927] kernfs_new_node+0x96/0x120 [ 1381.991513][T16927] __kernfs_create_file+0x51/0x340 [ 1381.996643][T16927] sysfs_add_file_mode_ns+0x222/0x560 [ 1382.002004][T16927] internal_create_group+0x359/0xc40 [ 1382.007303][T16927] ? remove_files.isra.0+0x190/0x190 [ 1382.012602][T16927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1382.018860][T16927] ? kernfs_create_link+0x1cc/0x250 [ 1382.024074][T16927] internal_create_groups.part.0+0x90/0x140 [ 1382.029970][T16927] sysfs_create_groups+0x2a/0x50 [ 1382.034904][T16927] device_add+0x7f4/0x1d00 [ 1382.039300][T16927] ? dev_set_name+0xbb/0xf0 [ 1382.043789][T16927] ? uevent_show+0x370/0x370 [ 1382.048374][T16927] ? __init_waitqueue_head+0x36/0x90 [ 1382.053658][T16927] ? pm_runtime_init+0x311/0x3b0 [ 1382.058582][T16927] netdev_register_kobject+0x183/0x3b0 [ 1382.064027][T16927] register_netdevice+0x4f4/0x1020 [ 1382.069166][T16927] ? netdev_change_features+0xb0/0xb0 [ 1382.074562][T16927] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1382.079773][T16927] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1382.085610][T16927] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1382.091708][T16927] ? __f_unlock_pos+0x19/0x20 [ 1382.097719][T16927] ? tun_chr_compat_ioctl+0x30/0x30 [ 1382.103492][T16927] tun_chr_ioctl+0x2b/0x40 [ 1382.108140][T16927] do_vfs_ioctl+0x977/0x14e0 [ 1382.112787][T16927] ? compat_ioctl_preallocate+0x220/0x220 [ 1382.118503][T16927] ? __fget+0x37f/0x550 [ 1382.122661][T16927] ? ksys_dup3+0x3e0/0x3e0 [ 1382.127173][T16927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1382.134218][T16927] ? fput_many+0x12c/0x1a0 [ 1382.138745][T16927] ? tomoyo_file_ioctl+0x23/0x30 [ 1382.143684][T16927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1382.150015][T16927] ? security_file_ioctl+0x8d/0xc0 [ 1382.155149][T16927] ksys_ioctl+0xab/0xd0 [ 1382.159296][T16927] __x64_sys_ioctl+0x73/0xb0 [ 1382.164328][T16927] do_syscall_64+0xfa/0x790 [ 1382.169022][T16927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1382.174910][T16927] RIP: 0033:0x45a919 [ 1382.178811][T16927] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1382.198925][T16927] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1382.207345][T16927] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1382.215319][T16927] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1382.223276][T16927] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1382.231344][T16927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1382.239333][T16927] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000280)='cgroup.stet\x00'}, 0x30) r2 = perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0xcc, 0x2, 0x2, 0x2, 0x0, 0xae, 0x800, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000440), 0x8}, 0x16659, 0x6, 0x204, 0x7, 0x7f, 0x200, 0x9}, 0x0, 0x4, r0, 0x2) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x1f, 0x80, 0x8, 0x5, 0x0, 0x200, 0x1000, 0xb, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000200), 0x4}, 0x2e016, 0x1, 0x5442, 0x6, 0xcc4c, 0x1, 0x2}, r1, 0x5, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, 0x0, 0x4) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000580)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000800)="38e84364bf2b540a6bb3195a3b9c711c980a26d043d62d63da5285558450ae0c670af827d5dc28b476c80bc24d4039c69c8edb5e822f435d3811ef12fa123dec8d3d32d31b6dcd26ede61b42b2f3426f2866a4301fe41a17f404535dd562d5a5fbcf2c89020b141559456fbdfc6d474f39d4e655fbc4c10bf061eec0b5fd88a08ed4d17cb4ed6cdfd351dead2bfb2fbdbeb9fe6314f89774", 0x98}], 0x1}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) 08:15:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00`\x00\xa0\x00'}) 08:15:41 executing program 4 (fault-call:3 fault-nth:31): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x80\x00\xa0\x00'}) [ 1382.609163][T16942] FAULT_INJECTION: forcing a failure. [ 1382.609163][T16942] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.624197][T16942] CPU: 0 PID: 16942 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1382.633607][T16942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1382.643930][T16942] Call Trace: [ 1382.647214][T16942] dump_stack+0x197/0x210 [ 1382.651539][T16942] should_fail.cold+0xa/0x15 [ 1382.656121][T16942] ? fault_create_debugfs_attr+0x180/0x180 [ 1382.661917][T16942] ? ___might_sleep+0x163/0x2c0 [ 1382.666772][T16942] __should_failslab+0x121/0x190 [ 1382.671720][T16942] should_failslab+0x9/0x14 [ 1382.676297][T16942] kmem_cache_alloc+0x2aa/0x710 [ 1382.681145][T16942] ? lock_downgrade+0x920/0x920 [ 1382.685998][T16942] ? kernfs_activate+0x34/0x1f0 [ 1382.690843][T16942] __kernfs_new_node+0xf0/0x6e0 [ 1382.695689][T16942] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1382.701314][T16942] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1382.706775][T16942] ? __this_cpu_preempt_check+0x35/0x190 [ 1382.712480][T16942] ? retint_kernel+0x2b/0x2b [ 1382.717078][T16942] kernfs_new_node+0x96/0x120 [ 1382.721754][T16942] __kernfs_create_file+0x51/0x340 [ 1382.726869][T16942] sysfs_add_file_mode_ns+0x222/0x560 [ 1382.732236][T16942] internal_create_group+0x359/0xc40 [ 1382.737534][T16942] ? remove_files.isra.0+0x190/0x190 [ 1382.742810][T16942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1382.749059][T16942] ? kernfs_create_link+0x1cc/0x250 [ 1382.754286][T16942] internal_create_groups.part.0+0x90/0x140 [ 1382.760216][T16942] sysfs_create_groups+0x2a/0x50 [ 1382.765236][T16942] device_add+0x7f4/0x1d00 [ 1382.769637][T16942] ? dev_set_name+0xbb/0xf0 [ 1382.774136][T16942] ? uevent_show+0x370/0x370 [ 1382.778713][T16942] ? __init_waitqueue_head+0x36/0x90 [ 1382.783993][T16942] ? pm_runtime_init+0x311/0x3b0 [ 1382.788926][T16942] netdev_register_kobject+0x183/0x3b0 [ 1382.794381][T16942] register_netdevice+0x4f4/0x1020 [ 1382.799496][T16942] ? netdev_change_features+0xb0/0xb0 [ 1382.804870][T16942] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1382.809814][T16942] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1382.814910][T16942] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1382.820717][T16942] ? __f_unlock_pos+0x19/0x20 [ 1382.825392][T16942] ? tun_chr_compat_ioctl+0x30/0x30 [ 1382.830594][T16942] tun_chr_ioctl+0x2b/0x40 [ 1382.834999][T16942] do_vfs_ioctl+0x977/0x14e0 [ 1382.839579][T16942] ? compat_ioctl_preallocate+0x220/0x220 [ 1382.845281][T16942] ? __fget+0x37f/0x550 [ 1382.849430][T16942] ? ksys_dup3+0x3e0/0x3e0 [ 1382.853850][T16942] ? tomoyo_file_ioctl+0x23/0x30 [ 1382.858775][T16942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1382.865000][T16942] ? security_file_ioctl+0x8d/0xc0 [ 1382.870120][T16942] ksys_ioctl+0xab/0xd0 [ 1382.874374][T16942] __x64_sys_ioctl+0x73/0xb0 [ 1382.878952][T16942] ? do_syscall_64+0x5b/0x790 [ 1382.883622][T16942] do_syscall_64+0xfa/0x790 [ 1382.888118][T16942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1382.894004][T16942] RIP: 0033:0x45a919 [ 1382.897898][T16942] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1382.917500][T16942] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1382.925913][T16942] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1382.933867][T16942] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1382.941833][T16942] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1382.949791][T16942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1382.957777][T16942] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:42 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00<\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:15:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x1b\x00', 0x7302}) 08:15:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00`\x00', 0x7302}) 08:15:42 executing program 4 (fault-call:3 fault-nth:32): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\xff\x00'}) 08:15:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\xff\xff\xff\xff\xa0\x00`\x00'}) [ 1383.431023][T16959] FAULT_INJECTION: forcing a failure. [ 1383.431023][T16959] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.448772][T16959] CPU: 0 PID: 16959 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1383.457479][T16959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.467550][T16959] Call Trace: [ 1383.470978][T16959] dump_stack+0x197/0x210 [ 1383.475342][T16959] should_fail.cold+0xa/0x15 [ 1383.479955][T16959] ? fault_create_debugfs_attr+0x180/0x180 [ 1383.485797][T16959] ? ___might_sleep+0x163/0x2c0 [ 1383.490663][T16959] __should_failslab+0x121/0x190 [ 1383.495599][T16959] should_failslab+0x9/0x14 [ 1383.500088][T16959] kmem_cache_alloc+0x2aa/0x710 [ 1383.504935][T16959] ? lock_downgrade+0x920/0x920 [ 1383.509798][T16959] ? kernfs_activate+0x34/0x1f0 [ 1383.514655][T16959] __kernfs_new_node+0xf0/0x6e0 [ 1383.519565][T16959] ? __kasan_check_write+0x14/0x20 [ 1383.524700][T16959] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1383.530161][T16959] ? wait_for_completion+0x440/0x440 [ 1383.535460][T16959] ? mutex_unlock+0x1b/0x30 [ 1383.540000][T16959] ? kernfs_activate+0x192/0x1f0 [ 1383.544959][T16959] kernfs_new_node+0x96/0x120 [ 1383.549655][T16959] __kernfs_create_file+0x51/0x340 [ 1383.554781][T16959] sysfs_add_file_mode_ns+0x222/0x560 [ 1383.560173][T16959] internal_create_group+0x359/0xc40 [ 1383.565480][T16959] ? remove_files.isra.0+0x190/0x190 [ 1383.570870][T16959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1383.577113][T16959] ? kernfs_create_link+0x1cc/0x250 [ 1383.582312][T16959] internal_create_groups.part.0+0x90/0x140 [ 1383.588212][T16959] sysfs_create_groups+0x2a/0x50 [ 1383.593168][T16959] device_add+0x7f4/0x1d00 [ 1383.597580][T16959] ? dev_set_name+0xbb/0xf0 [ 1383.602106][T16959] ? uevent_show+0x370/0x370 [ 1383.606696][T16959] ? __init_waitqueue_head+0x36/0x90 [ 1383.611972][T16959] ? pm_runtime_init+0x311/0x3b0 [ 1383.616939][T16959] netdev_register_kobject+0x183/0x3b0 [ 1383.622670][T16959] register_netdevice+0x4f4/0x1020 [ 1383.627773][T16959] ? netdev_change_features+0xb0/0xb0 [ 1383.633153][T16959] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1383.638106][T16959] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1383.643224][T16959] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1383.649050][T16959] ? tun_chr_compat_ioctl+0x30/0x30 [ 1383.654243][T16959] tun_chr_ioctl+0x2b/0x40 [ 1383.658746][T16959] do_vfs_ioctl+0x977/0x14e0 [ 1383.663355][T16959] ? compat_ioctl_preallocate+0x220/0x220 [ 1383.669676][T16959] ? __fget+0x37f/0x550 [ 1383.673840][T16959] ? ksys_dup3+0x3e0/0x3e0 [ 1383.678271][T16959] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1383.684514][T16959] ? fput_many+0x12c/0x1a0 [ 1383.689163][T16959] ? tomoyo_file_ioctl+0x23/0x30 [ 1383.695159][T16959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1383.701501][T16959] ? security_file_ioctl+0x8d/0xc0 [ 1383.706956][T16959] ksys_ioctl+0xab/0xd0 [ 1383.711101][T16959] __x64_sys_ioctl+0x73/0xb0 [ 1383.715695][T16959] do_syscall_64+0xfa/0x790 [ 1383.720211][T16959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1383.726106][T16959] RIP: 0033:0x45a919 [ 1383.729987][T16959] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1383.749604][T16959] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1383.758029][T16959] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1383.766023][T16959] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1383.773985][T16959] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1383.781954][T16959] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1383.789928][T16959] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0xb, [@union={0x4, 0x9, 0x0, 0x5, 0x0, 0x1e0, [{0x0, 0x4, 0x1}, {0xc, 0x2, 0x9}, {0xd, 0x4}, {0xb, 0x2, 0x5}, {0x2, 0x0, 0x6}, {0x3, 0x3, 0x3}, {0x7, 0x4, 0x6}, {0x4, 0x4, 0x4}, {0x5, 0x0, 0x6}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}, @const={0x4}, @enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0xb, 0xfa5}]}, @struct={0x1, 0x1, 0x0, 0x4, 0x0, 0xdd8f, [{0x2, 0x5, 0xf5d}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xf}, {0xf, 0x4}, {0xb, 0x2}, {0x7}, {0xc, 0x4}, {0x3, 0x5}, {0x10, 0x4}]}]}, {0x0, [0x47, 0x5f, 0x0, 0x0, 0x30, 0x5c, 0x7ca8aab23996ac82, 0xfc, 0x61]}}, &(0x7f0000000800)=""/241, 0x12f, 0xf1, 0x1}, 0x20) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xc8, 0xeb, &(0x7f0000000900)="04222215bd43c9febb001d5605c35dba884be02bc813ce76f44eff4e76491518228b13e76a0c61220f14341e28afa4eeb53dfee71a69e8cff885bdd29c4cd99f3f4d40b907e01434dae691933c709a3da49b2e527ef6571dca22718dc6398467411b392ce3de8f4a6f748b41141d4cb4f44175c4a8d97bfc7093dc97489f82679aed892bea8b92660a99c5706cfe69afe234742c9d277b9bb2dee615115cc4c5d9aef269d1ed913f7b9783e1168d851288aaeefb7f9dd1a26160d2358d00f9730cc674ab50cc78a7", &(0x7f0000000a00)=""/235, 0xfff, 0x0, 0xdd, 0x12, &(0x7f0000000b00)="0ad9b044deba52b380741a4a65db3c8abf3a541a91c17d0313411efb190d7a1c7db650ef9fd87cffd650d0a491fd9eafd4ad5c0f4a8a151b3fe9b00b67f5d755becad2bb14912e0b974299429acea07ea0aff64559e8f6b5d1ea251902ada3483914bc2fc4c6409f6989848a3485101b0c0daad4975844059cf7363092524a225678121dc1bd4b2f45f375882fe3e49c329d3311b0cba6d0c8e217a5175424846a5231af8670ea592eda9e50d062bc4fee1c91d6fba3ed43bc19ebf2f56b9c3d67811af9a558f9e7d9fa6d54de3dd9868235d7babf6ad2c317fecbba88", &(0x7f0000000200)="cad568c784f17f924ee3816eb234ea041b0b"}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:15:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}) 08:15:43 executing program 4 (fault-call:3 fault-nth:33): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}) 08:15:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) [ 1384.161112][T16981] FAULT_INJECTION: forcing a failure. [ 1384.161112][T16981] name failslab, interval 1, probability 0, space 0, times 0 [ 1384.184799][T16981] CPU: 1 PID: 16981 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1384.193513][T16981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1384.203578][T16981] Call Trace: [ 1384.207147][T16981] dump_stack+0x197/0x210 [ 1384.211487][T16981] should_fail.cold+0xa/0x15 [ 1384.216072][T16981] ? fault_create_debugfs_attr+0x180/0x180 [ 1384.221867][T16981] ? ___might_sleep+0x163/0x2c0 [ 1384.226716][T16981] __should_failslab+0x121/0x190 [ 1384.231659][T16981] should_failslab+0x9/0x14 [ 1384.236148][T16981] kmem_cache_alloc+0x2aa/0x710 [ 1384.240981][T16981] ? lock_downgrade+0x920/0x920 [ 1384.245828][T16981] ? kernfs_activate+0x34/0x1f0 [ 1384.250681][T16981] __kernfs_new_node+0xf0/0x6e0 [ 1384.255532][T16981] ? __kasan_check_write+0x14/0x20 [ 1384.260646][T16981] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1384.266122][T16981] ? wait_for_completion+0x440/0x440 [ 1384.271403][T16981] ? mutex_unlock+0x1b/0x30 [ 1384.275895][T16981] ? kernfs_activate+0x192/0x1f0 [ 1384.280836][T16981] kernfs_new_node+0x96/0x120 [ 1384.285521][T16981] __kernfs_create_file+0x51/0x340 [ 1384.290638][T16981] sysfs_add_file_mode_ns+0x222/0x560 [ 1384.296007][T16981] internal_create_group+0x359/0xc40 [ 1384.301288][T16981] ? remove_files.isra.0+0x190/0x190 [ 1384.306565][T16981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1384.312797][T16981] ? kernfs_create_link+0x1cc/0x250 [ 1384.317992][T16981] internal_create_groups.part.0+0x90/0x140 [ 1384.323871][T16981] sysfs_create_groups+0x2a/0x50 [ 1384.328805][T16981] device_add+0x7f4/0x1d00 [ 1384.333206][T16981] ? dev_set_name+0xbb/0xf0 [ 1384.337696][T16981] ? uevent_show+0x370/0x370 [ 1384.342271][T16981] ? __init_waitqueue_head+0x36/0x90 [ 1384.347543][T16981] ? pm_runtime_init+0x311/0x3b0 [ 1384.352478][T16981] netdev_register_kobject+0x183/0x3b0 [ 1384.357924][T16981] register_netdevice+0x4f4/0x1020 [ 1384.363021][T16981] ? netdev_change_features+0xb0/0xb0 [ 1384.368384][T16981] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1384.373311][T16981] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1384.378409][T16981] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1384.384214][T16981] ? __f_unlock_pos+0x19/0x20 [ 1384.388904][T16981] ? tun_chr_compat_ioctl+0x30/0x30 [ 1384.394086][T16981] tun_chr_ioctl+0x2b/0x40 [ 1384.398491][T16981] do_vfs_ioctl+0x977/0x14e0 [ 1384.403072][T16981] ? compat_ioctl_preallocate+0x220/0x220 [ 1384.408777][T16981] ? __fget+0x37f/0x550 [ 1384.412940][T16981] ? ksys_dup3+0x3e0/0x3e0 [ 1384.417344][T16981] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1384.423578][T16981] ? fput_many+0x12c/0x1a0 [ 1384.427996][T16981] ? tomoyo_file_ioctl+0x23/0x30 [ 1384.432928][T16981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1384.439152][T16981] ? security_file_ioctl+0x8d/0xc0 [ 1384.444250][T16981] ksys_ioctl+0xab/0xd0 [ 1384.448393][T16981] __x64_sys_ioctl+0x73/0xb0 [ 1384.452968][T16981] do_syscall_64+0xfa/0x790 [ 1384.457461][T16981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1384.463339][T16981] RIP: 0033:0x45a919 [ 1384.467218][T16981] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1384.486808][T16981] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1384.495215][T16981] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1384.503181][T16981] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1384.511145][T16981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1384.519102][T16981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1384.527061][T16981] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00=\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0xd9003a7db5f180c7, 0x70, 0x3b, 0xf9, 0x80, 0x6, 0x0, 0x8, 0x800, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x6, @perf_bp={&(0x7f0000000100), 0x1}, 0x22002, 0x7a, 0x5, 0xb5d26d2f2079ff90, 0x100000000, 0x8, 0x81}, 0x0, 0x9, r3, 0x3) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:15:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}) 08:15:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x1c\x00', 0x7302}) 08:15:44 executing program 4 (fault-call:3 fault-nth:34): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00h\x00', 0x7302}) 08:15:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}) [ 1385.136828][T17003] FAULT_INJECTION: forcing a failure. [ 1385.136828][T17003] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.151108][T17003] CPU: 1 PID: 17003 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1385.159808][T17003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.169873][T17003] Call Trace: [ 1385.173180][T17003] dump_stack+0x197/0x210 [ 1385.177528][T17003] should_fail.cold+0xa/0x15 [ 1385.182222][T17003] ? fault_create_debugfs_attr+0x180/0x180 [ 1385.188050][T17003] ? ___might_sleep+0x163/0x2c0 [ 1385.192907][T17003] __should_failslab+0x121/0x190 [ 1385.197837][T17003] should_failslab+0x9/0x14 [ 1385.202328][T17003] kmem_cache_alloc+0x2aa/0x710 [ 1385.207174][T17003] ? lock_downgrade+0x920/0x920 [ 1385.212031][T17003] ? kernfs_activate+0x34/0x1f0 [ 1385.216882][T17003] __kernfs_new_node+0xf0/0x6e0 [ 1385.221725][T17003] ? __kasan_check_write+0x14/0x20 [ 1385.226836][T17003] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1385.232293][T17003] ? wait_for_completion+0x440/0x440 [ 1385.237580][T17003] ? mutex_unlock+0x1b/0x30 [ 1385.242156][T17003] ? kernfs_activate+0x192/0x1f0 [ 1385.247110][T17003] kernfs_new_node+0x96/0x120 [ 1385.251791][T17003] __kernfs_create_file+0x51/0x340 [ 1385.256894][T17003] sysfs_add_file_mode_ns+0x222/0x560 [ 1385.262256][T17003] internal_create_group+0x359/0xc40 [ 1385.267563][T17003] ? remove_files.isra.0+0x190/0x190 [ 1385.272853][T17003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1385.279142][T17003] ? kernfs_create_link+0x1cc/0x250 [ 1385.284333][T17003] internal_create_groups.part.0+0x90/0x140 [ 1385.290247][T17003] sysfs_create_groups+0x2a/0x50 [ 1385.295196][T17003] device_add+0x7f4/0x1d00 [ 1385.299614][T17003] ? dev_set_name+0xbb/0xf0 [ 1385.304103][T17003] ? uevent_show+0x370/0x370 [ 1385.308689][T17003] ? __init_waitqueue_head+0x36/0x90 [ 1385.313975][T17003] ? pm_runtime_init+0x311/0x3b0 [ 1385.319045][T17003] netdev_register_kobject+0x183/0x3b0 [ 1385.324525][T17003] register_netdevice+0x4f4/0x1020 [ 1385.329661][T17003] ? netdev_change_features+0xb0/0xb0 [ 1385.335061][T17003] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1385.340137][T17003] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1385.345247][T17003] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1385.351126][T17003] ? tun_chr_compat_ioctl+0x30/0x30 [ 1385.356335][T17003] tun_chr_ioctl+0x2b/0x40 [ 1385.360769][T17003] do_vfs_ioctl+0x977/0x14e0 [ 1385.365378][T17003] ? compat_ioctl_preallocate+0x220/0x220 [ 1385.371093][T17003] ? __fget+0x37f/0x550 [ 1385.375254][T17003] ? ksys_dup3+0x3e0/0x3e0 [ 1385.379671][T17003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1385.385914][T17003] ? tomoyo_file_ioctl+0x23/0x30 [ 1385.390850][T17003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1385.397087][T17003] ? security_file_ioctl+0x8d/0xc0 [ 1385.402203][T17003] ksys_ioctl+0xab/0xd0 [ 1385.406371][T17003] __x64_sys_ioctl+0x73/0xb0 [ 1385.410972][T17003] do_syscall_64+0xfa/0x790 [ 1385.415492][T17003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.421380][T17003] RIP: 0033:0x45a919 [ 1385.425273][T17003] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1385.444883][T17003] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1385.453307][T17003] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1385.461286][T17003] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1385.469260][T17003] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1385.477227][T17003] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1385.485192][T17003] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x1d\x00', 0x7302}) 08:15:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}) 08:15:44 executing program 4 (fault-call:3 fault-nth:35): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696e1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0x4000000) write$cgroup_subtree(r2, 0x0, 0x4) 08:15:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00l\x00', 0x7302}) [ 1385.968131][T17021] FAULT_INJECTION: forcing a failure. [ 1385.968131][T17021] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.985093][T17021] CPU: 1 PID: 17021 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1385.993800][T17021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.003861][T17021] Call Trace: [ 1386.007172][T17021] dump_stack+0x197/0x210 [ 1386.011527][T17021] should_fail.cold+0xa/0x15 [ 1386.016127][T17021] ? fault_create_debugfs_attr+0x180/0x180 [ 1386.021942][T17021] ? ___might_sleep+0x163/0x2c0 [ 1386.026911][T17021] __should_failslab+0x121/0x190 [ 1386.031971][T17021] should_failslab+0x9/0x14 [ 1386.036491][T17021] kmem_cache_alloc+0x2aa/0x710 [ 1386.041364][T17021] ? lock_downgrade+0x920/0x920 [ 1386.046262][T17021] ? kernfs_activate+0x34/0x1f0 [ 1386.051105][T17021] __kernfs_new_node+0xf0/0x6e0 [ 1386.055961][T17021] ? __kasan_check_write+0x14/0x20 [ 1386.061089][T17021] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1386.066546][T17021] ? wait_for_completion+0x440/0x440 [ 1386.071985][T17021] ? mutex_unlock+0x1b/0x30 [ 1386.076492][T17021] ? kernfs_activate+0x192/0x1f0 [ 1386.081481][T17021] kernfs_new_node+0x96/0x120 [ 1386.086176][T17021] __kernfs_create_file+0x51/0x340 [ 1386.091379][T17021] sysfs_add_file_mode_ns+0x222/0x560 [ 1386.096780][T17021] internal_create_group+0x359/0xc40 [ 1386.102090][T17021] ? remove_files.isra.0+0x190/0x190 [ 1386.107388][T17021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1386.113645][T17021] ? kernfs_create_link+0x1cc/0x250 [ 1386.118860][T17021] internal_create_groups.part.0+0x90/0x140 [ 1386.124754][T17021] sysfs_create_groups+0x2a/0x50 [ 1386.129752][T17021] device_add+0x7f4/0x1d00 [ 1386.134149][T17021] ? dev_set_name+0xbb/0xf0 [ 1386.138654][T17021] ? uevent_show+0x370/0x370 [ 1386.143236][T17021] ? __init_waitqueue_head+0x36/0x90 [ 1386.148507][T17021] ? pm_runtime_init+0x311/0x3b0 [ 1386.153431][T17021] netdev_register_kobject+0x183/0x3b0 [ 1386.158896][T17021] register_netdevice+0x4f4/0x1020 [ 1386.164013][T17021] ? netdev_change_features+0xb0/0xb0 [ 1386.169391][T17021] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1386.174315][T17021] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1386.179429][T17021] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1386.185248][T17021] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1386.190873][T17021] ? tun_chr_compat_ioctl+0x30/0x30 [ 1386.196070][T17021] tun_chr_ioctl+0x2b/0x40 [ 1386.200495][T17021] do_vfs_ioctl+0x977/0x14e0 [ 1386.205107][T17021] ? compat_ioctl_preallocate+0x220/0x220 [ 1386.210841][T17021] ? __fget+0x37f/0x550 [ 1386.215009][T17021] ? ksys_dup3+0x3e0/0x3e0 [ 1386.219443][T17021] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1386.226129][T17021] ? tomoyo_file_ioctl+0x23/0x30 [ 1386.231071][T17021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1386.237322][T17021] ? security_file_ioctl+0x8d/0xc0 [ 1386.242439][T17021] ksys_ioctl+0xab/0xd0 [ 1386.246594][T17021] __x64_sys_ioctl+0x73/0xb0 [ 1386.251171][T17021] do_syscall_64+0xfa/0x790 [ 1386.255692][T17021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1386.261585][T17021] RIP: 0033:0x45a919 [ 1386.265474][T17021] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1386.285078][T17021] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1386.293481][T17021] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1386.301461][T17021] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1386.309431][T17021] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1386.317395][T17021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1386.325364][T17021] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:45 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00>\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) 08:15:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$sock(r0, &(0x7f0000000500)={&(0x7f0000000100)=@ipx={0x4, 0x6, 0x6, "6c82edd8ff0e", 0x16}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000300)="b5ee63209bb76e2f680223a6ecb421630f29d3cdd8d39df2af7f79d43aaa1a1b6294a4be3905accb78d16281bbc4fed62924e9659552ab380fafb678ecc13f9ae607e25a015a9b951fa15c9c715baf258653a34217eb5ad9e5a054b64e8040d8", 0x60}, {&(0x7f0000000400)="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", 0xfd}, {&(0x7f0000000580)="7ff2d4edeb856ff4e6d45d35b313918e81b796e05bd98e6be39498be645c7e2a8f2313d44f06dd0644f44fc66483d3b2f7272802c8ba600911c597aaa2238671fc435de489d8781cad0ec51be23bc40b43ea28827a1f89a3d64c5420261e02ff04510998bd4f46e6435004c5a2898d7cd8c81148b0acedbbe31e67344a5f681e711ba1d774787649902f12ac1b3bbb55fa22d1516b72c435cb629dfb92b74fae7a065cae9c62e5a98357edc03ccc8928fb0fc60868687a23467ea7a3520f8abb9af282be121fea72", 0xc8}, {&(0x7f0000000200)="c745d95650e93b", 0x7}, {&(0x7f0000000680)="927f2f74d9adfb988583f8ad6dfbd48c5e374b406714d1ec4e6b499704b5fd2153529e8249519a369dc656e8fcd35190eb8e8af51ad370a9878920a15390c79d6afe432f90ee789747b84fc7876461592c3b0f26a7926fe88846e4c0e1cf4be4ffbd56f20633eaad6c662eb351c2be216a16fd7b6d75bd30f6c7c889e79e37c9292c2f6a2e4e9db78138951c29242fd74f644c2d8886c2a37fbdb69917b6488371ae20f50bff53453ed8af7180de2032216117eea76cae16662ae6da5ea45ef3521241251c822224f0e65f412731c042c96467b58fb54a111a22dafd5a862011471c0843a830c62ce262bdc0a75155139564cb203a5341", 0xf7}, {&(0x7f0000000a40)="1ec18c4933a8b151626b05e9dbb9b2921f4640ad27f6555996d6af3b43ac5f73dc94cf76bf13c492bdc25c875870224be0e682e2c0836a11c7be2894fccbd3b35c4665e712e04b24a68e05a4ac2a99990575ac50d3304efcc0d5ea0abfcf0d361c8248d9c2d1f21f64b775a708db23fe0700cb250c288f647ef92d87e34de3b9ab93d57aac2905737cb08807d37383bf47bb5dd58abd391e1204c76301b1480fba4cb209800865ba48e0c647ea1e22a94cdaacec064e6178f31444d264d718f1cfd79a83a6", 0xc5}, {&(0x7f0000000280)="72dc86510fd29dd8262a38422d366c6ec04fea38655de8fb2a496aa9abdfcb6c3ab309b0dc68141a272c07", 0x2b}], 0x7, &(0x7f0000000b40)=[@txtime={{0x18, 0x1, 0x3d, 0x519}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x40}}, @txtime={{0x18, 0x1, 0x3d, 0x200}}, @mark={{0x14, 0x1, 0x24, 0xfffffffc}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @timestamping={{0x14}}], 0xc0}, 0x40) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:15:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00t\x00', 0x7302}) 08:15:45 executing program 4 (fault-call:3 fault-nth:36): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x1e\x00', 0x7302}) 08:15:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 1386.944935][T17045] FAULT_INJECTION: forcing a failure. [ 1386.944935][T17045] name failslab, interval 1, probability 0, space 0, times 0 [ 1386.964854][T17045] CPU: 1 PID: 17045 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1386.973659][T17045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.983721][T17045] Call Trace: [ 1386.987020][T17045] dump_stack+0x197/0x210 [ 1386.991367][T17045] should_fail.cold+0xa/0x15 [ 1386.995961][T17045] ? fault_create_debugfs_attr+0x180/0x180 [ 1387.001756][T17045] ? ___might_sleep+0x163/0x2c0 [ 1387.006611][T17045] __should_failslab+0x121/0x190 [ 1387.011609][T17045] should_failslab+0x9/0x14 [ 1387.016110][T17045] kmem_cache_alloc+0x2aa/0x710 [ 1387.020958][T17045] __kernfs_new_node+0xf0/0x6e0 [ 1387.025969][T17045] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1387.031437][T17045] ? wait_for_completion+0x440/0x440 [ 1387.036894][T17045] ? mutex_unlock+0x1b/0x30 [ 1387.041603][T17045] ? kernfs_activate+0x192/0x1f0 [ 1387.046562][T17045] kernfs_new_node+0x96/0x120 [ 1387.051244][T17045] __kernfs_create_file+0x51/0x340 [ 1387.056344][T17045] sysfs_add_file_mode_ns+0x222/0x560 [ 1387.061713][T17045] internal_create_group+0x359/0xc40 [ 1387.072035][T17045] ? remove_files.isra.0+0x190/0x190 [ 1387.077328][T17045] internal_create_groups.part.0+0x90/0x140 [ 1387.083218][T17045] sysfs_create_groups+0x2a/0x50 [ 1387.088158][T17045] device_add+0x7f4/0x1d00 [ 1387.092572][T17045] ? dev_set_name+0xbb/0xf0 [ 1387.097067][T17045] ? uevent_show+0x370/0x370 [ 1387.101645][T17045] ? device_initialize+0x1c4/0x540 [ 1387.106764][T17045] netdev_register_kobject+0x183/0x3b0 [ 1387.112223][T17045] register_netdevice+0x4f4/0x1020 [ 1387.118082][T17045] ? netdev_change_features+0xb0/0xb0 [ 1387.123456][T17045] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1387.128398][T17045] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1387.133504][T17045] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1387.139307][T17045] ? tun_chr_compat_ioctl+0x30/0x30 [ 1387.144503][T17045] tun_chr_ioctl+0x2b/0x40 [ 1387.148937][T17045] do_vfs_ioctl+0x977/0x14e0 [ 1387.153530][T17045] ? compat_ioctl_preallocate+0x220/0x220 [ 1387.159247][T17045] ? __this_cpu_preempt_check+0x35/0x190 [ 1387.164880][T17045] ? retint_kernel+0x2b/0x2b [ 1387.169491][T17045] ? tomoyo_file_ioctl+0x12/0x30 [ 1387.174442][T17045] ? tomoyo_file_ioctl+0x23/0x30 [ 1387.179372][T17045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1387.185606][T17045] ? security_file_ioctl+0x8d/0xc0 [ 1387.190724][T17045] ksys_ioctl+0xab/0xd0 [ 1387.194894][T17045] __x64_sys_ioctl+0x73/0xb0 [ 1387.199483][T17045] do_syscall_64+0xfa/0x790 [ 1387.203978][T17045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1387.209863][T17045] RIP: 0033:0x45a919 [ 1387.213811][T17045] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1387.233408][T17045] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1387.241814][T17045] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1387.249789][T17045] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1387.257760][T17045] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1387.265813][T17045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1387.273781][T17045] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x36, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x200000}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x20000000, 0x6}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0xffffffffffffffc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r1) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x100000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x81, 0x20000000}, 0xc) 08:15:46 executing program 4 (fault-call:3 fault-nth:37): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 08:15:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00z\x00', 0x7302}) 08:15:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) [ 1387.745990][T17065] FAULT_INJECTION: forcing a failure. [ 1387.745990][T17065] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.759174][T17065] CPU: 0 PID: 17065 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1387.767846][T17065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1387.777910][T17065] Call Trace: [ 1387.781191][T17065] dump_stack+0x197/0x210 [ 1387.785550][T17065] should_fail.cold+0xa/0x15 [ 1387.790148][T17065] ? fault_create_debugfs_attr+0x180/0x180 [ 1387.795941][T17065] ? ___might_sleep+0x163/0x2c0 [ 1387.800794][T17065] __should_failslab+0x121/0x190 [ 1387.805727][T17065] should_failslab+0x9/0x14 [ 1387.810211][T17065] kmem_cache_alloc+0x2aa/0x710 [ 1387.815043][T17065] ? __kasan_check_read+0x11/0x20 [ 1387.820058][T17065] ? mark_lock+0xc2/0x1220 [ 1387.824484][T17065] __kernfs_new_node+0xf0/0x6e0 [ 1387.829337][T17065] ? __kasan_check_write+0x14/0x20 [ 1387.834430][T17065] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1387.839895][T17065] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1387.845180][T17065] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1387.850635][T17065] ? __this_cpu_preempt_check+0x35/0x190 [ 1387.856252][T17065] kernfs_new_node+0x96/0x120 [ 1387.860931][T17065] __kernfs_create_file+0x51/0x340 [ 1387.866044][T17065] sysfs_add_file_mode_ns+0x222/0x560 [ 1387.871449][T17065] internal_create_group+0x359/0xc40 [ 1387.876773][T17065] ? remove_files.isra.0+0x190/0x190 [ 1387.882066][T17065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1387.888305][T17065] ? kernfs_create_link+0x1cc/0x250 [ 1387.893491][T17065] internal_create_groups.part.0+0x90/0x140 [ 1387.899371][T17065] sysfs_create_groups+0x2a/0x50 [ 1387.904377][T17065] device_add+0x7f4/0x1d00 [ 1387.908797][T17065] ? uevent_show+0x370/0x370 [ 1387.913386][T17065] netdev_register_kobject+0x183/0x3b0 [ 1387.918950][T17065] register_netdevice+0x4f4/0x1020 [ 1387.924049][T17065] ? netdev_change_features+0xb0/0xb0 [ 1387.929438][T17065] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1387.934385][T17065] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1387.939503][T17065] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1387.945411][T17065] ? __f_unlock_pos+0x19/0x20 [ 1387.950095][T17065] ? tun_chr_compat_ioctl+0x30/0x30 [ 1387.955295][T17065] tun_chr_ioctl+0x2b/0x40 [ 1387.959737][T17065] do_vfs_ioctl+0x977/0x14e0 [ 1387.964469][T17065] ? compat_ioctl_preallocate+0x220/0x220 [ 1387.970203][T17065] ? __fget+0x37f/0x550 [ 1387.974383][T17065] ? ksys_dup3+0x3e0/0x3e0 [ 1387.978802][T17065] ? tomoyo_file_ioctl+0x23/0x30 [ 1387.983750][T17065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1387.990001][T17065] ? security_file_ioctl+0x8d/0xc0 [ 1387.995120][T17065] ksys_ioctl+0xab/0xd0 [ 1387.999294][T17065] __x64_sys_ioctl+0x73/0xb0 [ 1388.003898][T17065] ? do_syscall_64+0x5b/0x790 [ 1388.008584][T17065] do_syscall_64+0xfa/0x790 [ 1388.013093][T17065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.018980][T17065] RIP: 0033:0x45a919 [ 1388.022863][T17065] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1388.042557][T17065] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1388.051157][T17065] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1388.059171][T17065] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1388.067143][T17065] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1388.075133][T17065] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1388.083125][T17065] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:47 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00?\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:47 executing program 4 (fault-call:3 fault-nth:38): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000100)='cgroup\x00'}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xbb) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000200)="c0ed2e2f8636031b2df4f328ddfc06819b921686a7e53d8013f3c09f019b54d80caca5461d5c0dfd32f1c742ab00", &(0x7f0000000400)="29a4983cb34d46864542d7a374c204c9d46eef1cbdb6a023a317e1f7767d13aa32e3b017592b7d66210acf4dd40e2c1de3f3cd88a7ad79672b8400b0d3ebb9b874d1dc7ac96f0531633b75bf77e8f095b9f82a830f19264f6ffda064f6b692037a145ac7c950e5948bb3c517abf7d1d2e855a93b019420a3cf9bdbc67c4399808a87e4054a6ec6cecddd049bc0e18b1ef5152c5acf397a8bd2f30ee9506785b0ac2d03f19d193dbd5811937958d41887d15e5bb387ce82c4f4b9282f61d11c94d79574e169d9a6416d0bb233897d43d5fcac5cc5b6f53f91e6496e595f94928b86d7", 0x4}, 0x20) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:15:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x1f\x00', 0x7302}) 08:15:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 1388.639865][T17085] FAULT_INJECTION: forcing a failure. [ 1388.639865][T17085] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.674987][T17085] CPU: 0 PID: 17085 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 08:15:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) [ 1388.683711][T17085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.693777][T17085] Call Trace: [ 1388.697083][T17085] dump_stack+0x197/0x210 [ 1388.701435][T17085] should_fail.cold+0xa/0x15 [ 1388.706079][T17085] ? fault_create_debugfs_attr+0x180/0x180 [ 1388.711887][T17085] ? ___might_sleep+0x163/0x2c0 [ 1388.716732][T17085] __should_failslab+0x121/0x190 [ 1388.721723][T17085] should_failslab+0x9/0x14 [ 1388.726214][T17085] kmem_cache_alloc+0x2aa/0x710 [ 1388.731064][T17085] ? lock_downgrade+0x920/0x920 [ 1388.735923][T17085] ? kernfs_activate+0x34/0x1f0 [ 1388.740801][T17085] __kernfs_new_node+0xf0/0x6e0 [ 1388.745779][T17085] ? __kasan_check_write+0x14/0x20 [ 1388.750895][T17085] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1388.756354][T17085] ? wait_for_completion+0x440/0x440 [ 1388.761687][T17085] ? mutex_unlock+0x1b/0x30 [ 1388.766206][T17085] ? kernfs_activate+0x192/0x1f0 [ 1388.771144][T17085] kernfs_new_node+0x96/0x120 [ 1388.775878][T17085] __kernfs_create_file+0x51/0x340 [ 1388.781004][T17085] sysfs_add_file_mode_ns+0x222/0x560 [ 1388.786398][T17085] internal_create_group+0x359/0xc40 [ 1388.791693][T17085] ? remove_files.isra.0+0x190/0x190 [ 1388.796967][T17085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1388.803214][T17085] ? kernfs_create_link+0x1cc/0x250 [ 1388.808420][T17085] internal_create_groups.part.0+0x90/0x140 [ 1388.814311][T17085] sysfs_create_groups+0x2a/0x50 [ 1388.819251][T17085] device_add+0x7f4/0x1d00 [ 1388.823670][T17085] ? dev_set_name+0xbb/0xf0 [ 1388.828189][T17085] ? uevent_show+0x370/0x370 [ 1388.832776][T17085] ? __init_waitqueue_head+0x36/0x90 [ 1388.838142][T17085] ? pm_runtime_init+0x311/0x3b0 [ 1388.843122][T17085] netdev_register_kobject+0x183/0x3b0 [ 1388.848574][T17085] register_netdevice+0x4f4/0x1020 [ 1388.853708][T17085] ? netdev_change_features+0xb0/0xb0 [ 1388.859078][T17085] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1388.864006][T17085] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1388.869897][T17085] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1388.875688][T17085] ? __f_unlock_pos+0x19/0x20 [ 1388.880376][T17085] ? tun_chr_compat_ioctl+0x30/0x30 [ 1388.885575][T17085] tun_chr_ioctl+0x2b/0x40 [ 1388.889998][T17085] do_vfs_ioctl+0x977/0x14e0 [ 1388.894613][T17085] ? compat_ioctl_preallocate+0x220/0x220 [ 1388.900313][T17085] ? __fget+0x37f/0x550 [ 1388.905006][T17085] ? ksys_dup3+0x3e0/0x3e0 [ 1388.909429][T17085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1388.915679][T17085] ? tomoyo_file_ioctl+0x23/0x30 [ 1388.920626][T17085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1388.926880][T17085] ? security_file_ioctl+0x8d/0xc0 [ 1388.931981][T17085] ksys_ioctl+0xab/0xd0 [ 1388.936155][T17085] __x64_sys_ioctl+0x73/0xb0 [ 1388.940741][T17085] do_syscall_64+0xfa/0x790 [ 1388.945243][T17085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.951129][T17085] RIP: 0033:0x45a919 [ 1388.955094][T17085] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1388.974685][T17085] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1388.983091][T17085] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1388.991670][T17085] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1388.999627][T17085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1389.007589][T17085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1389.015567][T17085] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000001ec0)='cpu.stat\x00', 0x0, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r4 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r4, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x2, 0x2, 0x3, 0x4, {0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000200)="ad9815ac76914bebfaeae66f83b54430df775a6c", 0x14}, {&(0x7f0000000280)="d4c409c46849e66f47bd9bc7f75e2f8ebb4336d707f7c612ac44394e677c86a877", 0x21}, {&(0x7f0000000400)="bde3f924be19718bfa3b69bb388a900fc22cde7f4ad542c9777d5d3cadf96d1c01035d1e455729e56b7bcea8c86ea592e950e0fad363bcc721c0526bd6332ede1596fcb51cb3ad3bd984f4c74dae51e30c30c90e9077565bd7f3f8782b314f933ae50f942d4af9fd63b595c000605a225eebb2d77d30b5e18f62e06a396a39fcae1effcf9f746a41df81f9abd0458c5e4dda48afe288fe92b22e4c1ae11dd74e2e10756bf330877eeb55c02aafa17c01429f6e4649fcef4f7925156a6ee564dd9a", 0xc1}, {&(0x7f0000000580)="af15d898664caeb2c851736edcf8af5282c6ed60c480c382a86050818ea838ff03232d57991c970b2dd5b1b97074b565990b1b61ff759dae7367cc9c2199512d4a392e04ba157324fddb616c3b24e50224bb5830448d7a3c1c4645976832ab0fbd607be6e9794d585a01ee59c062fb5217198a385dc5a248ff59222bc2fd367e1f2e", 0x82}, {&(0x7f0000000300)="246722d0fe9c95825cbe12810e975853275f50569d5034253f30a3f01a4e5bdc9288b7280eaec17be9e47dfc2b9836e996bb", 0x32}], 0x5, &(0x7f0000000880)=[{0xb8, 0x13b, 0x1, "a2b0bff3fa4aaa6b0e013fc54a70debfd015823cdae08071212a2de9a6547273be85b9b29dba106a71d3185d9c86364e4665c726f3e86d43145ce5ba093dfcce2cd7960bfe97efbddac8de9cf29472113ee64fb71f6fd4e1dc566af59cacbdd019ab2069c664546fe3f5ba530c6b7018700a1dce405c84e963748f3a695c7c7a025fa301c4df68888b37b26a3540324d11a2f54e7a226ff9b0bdd004a7d5d96537062db5"}, {0x78, 0x108, 0x9fffc, "c657a2a7d1430fb2e181978d545e8b353129228910e2c3597d30beb8ccde6a47c05a787b807c2bf2999193bde397dae7ac136103be7a7933e4c5d839ce36b0952bb0c5d80729d5261103b2b73f8496c19a77ef02d6a1eba4918929bbcc51d7d08fd58af7"}, {0x110, 0x0, 0x90, "8f6da4ef10e8778505dd9ecc9da40d18f497ac4f3eb46bd07b13324737afa1882612a5c0ea74ca3e751deaa8363866d4442afd668e31450abe1deb3f4256ca459d92681eb66adbe91c24e9c79fedf0fa4e793ccf489f6a73a6a9cd951fbaec0b606daea2cde653c3095f7fc6eb5f663d3dfb3862179d63cf18b6e4f2fa9f8411d2472a75f2bf9d1d95846b5881c58787bc5d521c7aff1c8b54048bddc9f7ce1d36cc580c6b4e2b13e0f6343bc7c557d252c274b65a1cf25e374632ddcabaccb4fb7f5e7da5388322de1f0dfaffde207f15450c137cdbf419cd3f269228379fefec12c02a1e425f5e6fc954ff3edeb8ec5c742681f6cfb5e7c3"}, {0xc8, 0x10b, 0x6512, "149040a88f8ec9be571fce9e47e02a36d362976555f5ac53cf94dd7c2a4c694da1b911cf59623f3d41ab02e02da8b4dc34a7d6988e4be7f85ace8fd4697590700b542efcab1058d907207d12d940e098c58f70965d8524a6a297098aa6411bb7c8102ce01bdc858112fe48dbf1b72acb0dcd475b4df3c3f5713bd5eaf53de07cffc2ad28f531e1ee3c30421b0b51482a92ba42423b712ce6f04e20b2c20070ba6f98c074a44dd3159c5d92504170dfdd657d3d73ae3d"}, {0xe0, 0x108, 0x2, "5c9478797fee6caf1b2e1dee572d620988cab3f87331050cd59932bce802b196dc0d9fdb49b08cfdf69193e4033ad124e1f5fc1db28b740fe10fe6850944504de6a57c7a6f48e410cede8db3c635746f48a84e23406a7676d1b8238d18c1130ffcab9b659b058bd803956ce5a5ff727b5053715153ef23d9b431add982194d46655d63a3ea651b76cee4c68f9b8831cc89559466281832516874c46d22c1b8669da22d3d3402933d9b3a4459c85baceb33db437317cb7d0ea725a409c6668269412bb7ef91855a973a9c393b792783"}, {0xa8, 0x117, 0x7f, "60d1762d3246b7a409e1286127356a8af0fa616be360186555945e3adf760a0b351e27c3a3e7c4fc035f0ea363a654cf94439aa461e713786b731f737d81625892e017cb809e0c350c7a39b98dc932ec4f36e81e3cebe1997da4407ea933c2e9a0505265e504d82a38e478e34762a4839ce02637ae842dd859442914990b4d3c0b58feb8974d67b649221f8af58b17c53609f4b62cdc3cd2"}, {0x1010, 0x1, 0x0, "e85fd1ea19a7718f32a7103629582ecf51cf340912ee41403ada8188002ecf11703f465dc9fd23f5f2d7897136120c4d4df88bc834088332e15562d178b66ea532a84ea545aa9cd65709bfb9a905d1b17a42b61117c3453a787eb466c970a3b109978e3f691959fdc325034709e172a1b20ef2c1b64e018e06cf04be3ef53132151933f48cf881311adf4dddbee6fdec49f3d1702e204af72203159f7b3fc4d22317a424953c6d9c550dafaec37e64e429415e3ae04f707ea71faadbe9e4ae50a7a28dd5ab563dcb78561b07c6132b102f30cb63414bd8750ae03cdd94cf80de72f59343fda65747b1d830c7293c9438ba0740610160297a272b5f8fbed3ad39ba8a933a7b181bde1bd09b0c59fb59d2d50c40c7e7365afc044289201caf6173209fb6da858c5d89254aa95f15b4f40486df87eeacec3e8e6b68a94294c32bce605cf537649aa489beba59f83e5e5b6e18adf8a11696fe8cfa30bef0678387ebfec0a81374bbadab56ef4c992c580b2be3d621e3d4cf41722f148d770c7604345918ab95eff4830322446a3e0297bd8cdf014c0f3700104daf28867281c7ac646eb234fc281eb2cf52ba3db2d8b7b9eb550e52c1d281a7ba987c997e472450db125b8815deea3199e0ce541566dade10bb8a02a63b00ea9b0557cc2613fb3153d4d217905f45aae6196e8791ad29121b83d3dda6bb681a76bb2f5a9320bc1dac033ba64d970ddb6234b5f5917b0e0a9657f77674d3f9bd5c5dc5045ef5f94bac38ba1118f11f1bd2df4ba42da4b98f88aacf23e3b2ded1879ebe55f69c200cf2bd1d2defa4f50e5e1861f4c008cbcd1f848d39320a9229772e387f6f4dd66244cee9981249872630340b67e7489653d9ba33cabb02b5fbe786d7774dc7fb6a7c6b2933eae1f8c53349b986c38a18c4522de5e0e09d722764598516e3f4713def342da691b9d4d767566ee13077537927a724c34cc06e582b4e062006227b68c283e34ebbda2b7f6adf9bc4a360b9c502e9041d3f63e0793868e48c930a970df42aee7f8f9fbd32047a52358b0c11e87a47a54345b1a93dcdea2f0e02d071fc363227f772e3290570846bdd1e1185a147ee6275879d078c8282de90df76295eb138e5cd21ca10c435b378cdca71210a7bdc031d5364ca9525b31c2939fc2498017d3e12218a0a26825fcf867f333159c7fafd7f2e50cd70368a77f0b394b60487aa17c7b44a25714447ca44d86ba7a837510eb07f49a3842a73bd2b8397aa097378710d5048603f21322f378d01bb00f15cf217e0d62086319cf3fc1a87b6e624af231c447a41fce51eb27d554150e0559d2dcebd28b860d297145f48b3ff3f77e84f3837086d1aaf1a9b9f4c5f2ea74b98a4c7238b1c9daf7f6d13d01a64ed1f1b95990c33e7e49b7cd2228f2bc824ecf677feb68faf0be22d00c4b753b875562d7ba16c6363798f8728e1e7b9895d514584e9caf48ae39eed1ee925436160b3a376775471cea06c51d6f3f7b9553a1a3c3a8c0922b5abc98d809fe0c6a374de4df3947d990fb1ae943aadd6630f3f1bd55be5cd8aa581e1b1ba62a63b51de5d02a14b163c2b30a4eb7f096bc19e4c5c7f208c9aad0782ce0a4b283ad1b653e0f26227a29e6476647617eacf3d2632b4429c55c02f19e7dedf8725d4ae0eaebd0e89e2bbd5e57e9e9291b404e554d66bb1e85526d7a3b92b1e9e21cb2ba395ae3e353f18454ee995ddfefca8de06d9f9abb20a3aed0455a08692e96748caaa1375cc8fa81b5050e76805319ee9deb61b04fc75377e5a4b3d2092b6170168b758199d08b78b671661500e313c0acddf1c7bf0c861dabc8fc896a72e0462224ce1359440c3f573f5c339b1c24ade09644ab8c0b5db35ea070951dd6afe8fc6496409bbca2bc654ba261cc20babf1ae1ebc8391384527d6dc9bdea33c7d485f457243cdcdc8f78f15064c8fd9732cdc98ccbf7828e81ec8adb3827c5e8095205084424d4256aa723d3647d716995cdb312fe410b58b6c338a2980a051e6f4d527b0f254bedfca559b47ad6606590607d5a9bb8eb73289451c0816824448bbeadc8082789da04c49e801f563768d73d4dbe6bcefb589bcc9795c5209829352e879516ab802529b2d2587cfbe20eb2248bb06058cac65c8a181ecda6520b854d003653e2141f0797b406aef9de8f768e1bd5586e85a3170eb39ae76b057e43c4945c76bb328d0cff46baa6336f48e320a6ee586fcb7cbdf932275304d81ddaecc2880e052cce8c2198583dc746d95c6b3b33fdb07725adad136e727e0795f6466054b3725fd9ca9a16664c3c08af607a6b18bf72c97c253db2d022436b41cd58c903c4236cc99b7be35fe8a767318d5cf3a8cbfce56640c563bcab6e6b7dc3dd0ba7f23788d4f9a1de21f632d77b4f633f1fd0bd82248844b374d020f0c42aae464d84a07a4f35dbae9078720ee06e707475ca10e134ba8cf17f34c1d9d4843c6b5cd48e49253ee322ef0743cd9c0ba859cbceebf78326c820b050ff592cef9d006ca8fe848824b4740137e8e6a060d2a3bb54e9348189332a65f081169139afd8ffc8bc600a07f598016ad735935eb1543f07a76ee16d42594f13c4d9d3c59dc1de3b215a5d21c2f7a8b7b62eb6abb65e72d7c55894b430d57a616928c6efd7e0cccdde4befdc1f13387f6581d842c4482813c0087d858386afd0cf2c4ed195487e61f37f08c36489e67b3e78092253ad748fcf8120284bfc887dcf47503df1e33434889f91cb8c67c578cc292a98b5b8c3d115bbeb52677b9c0c2a0abc0143ba634cad9a019d79a5184dcdb83381e43b1245073f0c2bc0b6d6c84e5a08327378b89a9e365bebde5055fca63b7f92475f699ddfe70ff87785bae90c523cd95e1368f11ac9f438708cab96b164e98d5cf7ac258461ad1c7674f5796c3d725f0eaabbe2deb3495617c339cc27f9edce775e34cec404fbc6af8b5d3203006ac1e6567aea97dc98a43faac64b05c38bf8515e2236f5f7b6e749d1c54f19b1a403abfcb254fbd4502c784784744fe89f44fbbd492b537152ee9faa0a9384d3d5ace710cee3564d156cdc3e2ce330081f6f787390de3d703cf1f59becfb435c42f5f4ebab79ac9e1d41b0942a4fb4a893bb6925e0e4bbbe3d3eeefaea3380621f60f90a7c4630ff767578cdb7d814c97b366c5c79d61619bf4f4059c76ba90f758c5ae7ff35a1d0ca881f109f7e3f7fd755262c44b57ff487114f8afbb46823ff5cadef519126b4d0a1d6a98bfdb087a1a0187df416833f4248fbf55ccc87758f97d3aa7c4c9fc39788cb16fd67784cabe2c37464dcd4136dc64796f80ba60c7e2a39c432c307e943def98e82910f9f0c031bb21566e22af350c4effbc59422b32908cdf710cb7e1c6b5b4b19be35ba1286a767419b998d6d9346de38058ad1224f2dfb75f59b6d894886a114d1c9183296f12628665237aa57c62b51f1bd03ddad3156aec2289aa1fff9ae43931a0a08095477c370d231524e272b0593688b886bac35f3bf20ab8a4c52176a4fb568a4e3a9211e3c5eae74f9fc189e76f4539b007eeabe7d451eed23c936c505e3b231d929cf77cec6c1f90674979e6eb59fadd9486a60cd5501c003891503c7ed82bcb50571c0675d0217382d62a5a5f87c88e56a7bba91b084dccbee14331a74cb0773d2e5ef737b9bff683f91ef3bc1808f1f5b8c1ef3132fff3c26ad83ae3715aec589a36212aa07d1bb64a4679ef34c686a2674b33020e65373dd6076ad2a8db00010b4e38b82689a92e050b485eba8192121634a205ed2d3855680aa5fff789fa9ad62ba39fa872428d3d3e317e233da18ed7c00b042eaebe9f28c6657b5390c2f0b539da4b9df81ebd1cefd6d44ce0db3f606ccbf45326dca95ab9f458c07d08418e5614730838a29f65cbaef139b059c0478146489641b413828fbde8f13c313841fb8fbed8210e2bfb632185226b826c4d549146cd413b9aa9ee75307495b16ff294f1c7b8240bf0e63488429fcf3b5bf81c7f166d3878005e54aca7f73a2e531d451d0ab7fc42d25b58fec29fa47625bc22b915446140e88df002ebba8d5a54ba0418ef79a413ec71251fbd236724ca4db4498d78ab9b854e092281694ec80d81a9b366f732f4f693a3d0e22ba2593ba8cf1835f29f155a9edc83cc2979adca586301e33cca92b2c5e8c405c7da2c97dd025c2234e662da76674e2a6ee46f5db02d2f2db464ba0c9fe520a8a785204ecf2745922d64add36eb7d23276754b51b47a2663cb2d5a4a8cdb12a16ae46fe7f9edafca4b9cc10db0b3e8407562206b22cde66ac33bbd16c8a1aa8d25cc0f46a22d1e1868f721a80f3494c226a300c9e88461b45bf223ad4a0325fde9fb4f75ce2e87fb805dea2d668b30dfcdee0ace6ddce16afdbdd83a8a46c3f1e0a7421dff04196ff98939d53fabb639e5bc37131c390e2634d5c98a6174dc5be69721e1fac6d9690c7adda43daea4f7e9eeb77ce754291aaeec2e71b0a969aa4af8a470c92bc4bcb4c4f1d639c54a1c93a2df8799a007d2f4e8220f7992989bd51a6f668b489534e22f8cfc8b00cc365fb332c6cdff2dfca0509dac20ef5682f1f587d6a8e3303e92eba2911409b7c983a7872b9d07e06c1cd693b3deb6168db308876185567f14910483c35432db0a2b657f45129d8d573d8d2afe4be2310c7d16f0f72c2dd2151881dbe6dd2d1dfe1de8bcc5807d79bc1087b43d97e608e1a201e36136b479b5db389b7e673f5ce57af13ddecbe2a28f3423fc4ff8157c698f26af514fb42577abb2d05ac9472eb52d12df83198ec2f19007b434386031d9a568288567ae80dc676f707278d6a551f098071475ec8e918d176ac4d9c6f144c7244ab098666a975227ec8cc55d5060e4784bc1b5e6367bb8f6964c2e3787e9c109c89caa53b54c3435d0b0007b7e5328306f296aa4380fd8f61cfe22aabdef9d847e807b178ca5a83bd5ebb54371c0d1b90209805b4a287087e13534e5ebe26bdde32ffbb63dd20b3131318f62833f0661d3e0c5873abbde23b648ab1838a2e458fc5d486ebfc13e9f67a065990da0f0ec74a1255b5b8679d38e7acbfdd6c4843e368becc50fa621be5a23f56a187e56ed5297db5d1844e23683285a7ae0c6caead836cc7aaded2cf530ad03e156f1ccaf91d11f361fe8b369c999fb74d553813d5982b137a72be9b2b0c469cd22577ca5311109c863dcce8b1dba769dd38e4d3f0dd543fde80fef7744d14f09a5be32d1f2b88c7ad168542a6177d2894e310826964bc6ce552f04f2ccd5f7e4716da6f91ce5d6b979ea21fdbf3224dcd664eb4a116af0430d4489b69b59acc6a2a6de550165d4a4313b91d6ad86951fedbbb87529cb344417ffec615d1bfa7f027f854a657cd0038831bb2e41aac428fd585a76c75f285bbb1deb6a1f4248774e9855171fca5c756b6011db4b8890bc1cfe9578c31c84559aed721b65a38483c65a6c0b6ad493cd312b7cb47139da0cf8cb87de4fd8ee5b71a94965f9d75a35850c2c4a2febd359d2ea7b57f47c9035edd308bda7bdfff14b386a8f4fa6c71873f33b3d02d9002af4b8b29df048aa71afc5585f0768c5827d3e146a0a85fad2834e7f8a1ed8b8e58d1c32ecc73de7cb7334e5e123426db1f27c1a25852bbf003e7c44e8a9afda89c0e637b927053628be16d5cf7e83935695e05992703708c92dc6fdf25f87567ed59b5cf47a751f9e0a69cb29059acc3f3c84637e6373e3e67fd2340437deb16ac0d0f583ad8b538169c4884de70fcf8650"}, {0xa8, 0x31d, 0xc, "13086941ec0567eb1cd3979ae1e91b149be7c701cc017ceeb897814378cf7d0a7554509a89706631374f3b668ad09f3c5dade6019b5d4bff2c5bbe1560281750cc00ada5f093d8696428a7785a931b108ae3f75a169dd5dec07d5ecc195a78c50cf8091aa39ddcf73272c9ee9e0fd015770dc1e5b3c2f006b3abf7e3c5ddc75f74979364ffda994d3858c1ea5365d3ba12639aca"}, {0xf0, 0x9b, 0x7, "874cf632646c774de6d5dc587b060ac8a3843f8ec413a0c5c97fc55d3d3bbee192149da790afc4f635fd321787f8ca4ffead079ac5c3c258a570c4ee10bda532bdc8497071b925be031efba767719a348f7611a5f34aaf6216088eac46401d396b3f1324adea496e5c20b9bd3464e263b68890ce6a6cd26f4b1a8befeb7c9ccc0c6a12025b6a9f57ab2998b6a675f4bae6701b4503bbec42f61d3f2b2e8183f204edc6f32decd66c8716339b6b568499e321b348eae1719c8d9e6af748039c475cbbd03b4dcae9469bf2ac8e78e40283e53e368710c56d6fee9a84e7c5976844"}], 0x1638}, 0x20000) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) 08:15:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}) 08:15:48 executing program 4 (fault-call:3 fault-nth:39): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00 \x88\x00', 0x7302}) 08:15:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)={[{0x2d, 'io'}, {0x6, 'rdma'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2d, 'memory'}, {0x2b, 'io'}, {0x485aa2f82b0917d, 'rdma'}]}, 0x26) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000100)='cgroup.stet\x00') write$cgroup_subtree(r2, 0x0, 0x4) [ 1389.405360][T17101] FAULT_INJECTION: forcing a failure. [ 1389.405360][T17101] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.442386][T17101] CPU: 1 PID: 17101 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1389.451115][T17101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.461184][T17101] Call Trace: [ 1389.464501][T17101] dump_stack+0x197/0x210 [ 1389.468855][T17101] should_fail.cold+0xa/0x15 [ 1389.473478][T17101] ? fault_create_debugfs_attr+0x180/0x180 [ 1389.479307][T17101] ? ___might_sleep+0x163/0x2c0 [ 1389.484186][T17101] __should_failslab+0x121/0x190 [ 1389.489141][T17101] should_failslab+0x9/0x14 [ 1389.493660][T17101] kmem_cache_alloc+0x2aa/0x710 [ 1389.498522][T17101] ? lock_downgrade+0x920/0x920 [ 1389.503362][T17101] ? kernfs_activate+0x34/0x1f0 [ 1389.508209][T17101] __kernfs_new_node+0xf0/0x6e0 [ 1389.513073][T17101] ? __kasan_check_write+0x14/0x20 [ 1389.518192][T17101] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1389.523653][T17101] ? wait_for_completion+0x440/0x440 [ 1389.528930][T17101] ? mutex_unlock+0x1b/0x30 [ 1389.533420][T17101] ? kernfs_activate+0x192/0x1f0 [ 1389.538347][T17101] kernfs_new_node+0x96/0x120 [ 1389.543016][T17101] __kernfs_create_file+0x51/0x340 [ 1389.548120][T17101] sysfs_add_file_mode_ns+0x222/0x560 [ 1389.553486][T17101] internal_create_group+0x359/0xc40 [ 1389.558772][T17101] ? remove_files.isra.0+0x190/0x190 [ 1389.564047][T17101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1389.570282][T17101] ? kernfs_create_link+0x1cc/0x250 [ 1389.575473][T17101] internal_create_groups.part.0+0x90/0x140 [ 1389.581375][T17101] sysfs_create_groups+0x2a/0x50 [ 1389.586331][T17101] device_add+0x7f4/0x1d00 [ 1389.590881][T17101] ? dev_set_name+0xbb/0xf0 [ 1389.595383][T17101] ? uevent_show+0x370/0x370 [ 1389.599963][T17101] ? __init_waitqueue_head+0x36/0x90 [ 1389.605244][T17101] ? pm_runtime_init+0x311/0x3b0 [ 1389.610184][T17101] netdev_register_kobject+0x183/0x3b0 [ 1389.615640][T17101] register_netdevice+0x4f4/0x1020 [ 1389.620745][T17101] ? netdev_change_features+0xb0/0xb0 [ 1389.626116][T17101] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1389.631043][T17101] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1389.636148][T17101] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1389.641938][T17101] ? __fget+0x35d/0x550 [ 1389.646094][T17101] ? tun_chr_compat_ioctl+0x30/0x30 [ 1389.651290][T17101] tun_chr_ioctl+0x2b/0x40 [ 1389.655697][T17101] do_vfs_ioctl+0x977/0x14e0 [ 1389.660386][T17101] ? compat_ioctl_preallocate+0x220/0x220 [ 1389.666174][T17101] ? __fget+0x37f/0x550 [ 1389.670324][T17101] ? ksys_dup3+0x3e0/0x3e0 [ 1389.674740][T17101] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1389.680624][T17101] ? tomoyo_file_ioctl+0x23/0x30 [ 1389.685553][T17101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1389.691794][T17101] ? security_file_ioctl+0x8d/0xc0 [ 1389.696895][T17101] ksys_ioctl+0xab/0xd0 [ 1389.701039][T17101] __x64_sys_ioctl+0x73/0xb0 [ 1389.705619][T17101] do_syscall_64+0xfa/0x790 [ 1389.710114][T17101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1389.715989][T17101] RIP: 0033:0x45a919 [ 1389.719876][T17101] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1389.739464][T17101] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1389.747860][T17101] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 08:15:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00`\x00\xa0\xff\xff\xff\xff\x00'}) [ 1389.755820][T17101] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1389.763778][T17101] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1389.771734][T17101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1389.779692][T17101] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x80\x00\xa0\xff\xff\xff\xff\x00'}) 08:15:49 executing program 4 (fault-call:3 fault-nth:40): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:49 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00@\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) [ 1390.338981][T17123] FAULT_INJECTION: forcing a failure. [ 1390.338981][T17123] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.352912][T17123] CPU: 0 PID: 17123 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1390.361974][T17123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.372163][T17123] Call Trace: [ 1390.375471][T17123] dump_stack+0x197/0x210 [ 1390.379824][T17123] should_fail.cold+0xa/0x15 [ 1390.384524][T17123] ? fault_create_debugfs_attr+0x180/0x180 [ 1390.390351][T17123] ? ___might_sleep+0x163/0x2c0 [ 1390.395224][T17123] __should_failslab+0x121/0x190 [ 1390.400186][T17123] should_failslab+0x9/0x14 [ 1390.404706][T17123] kmem_cache_alloc+0x2aa/0x710 [ 1390.409673][T17123] ? lock_downgrade+0x920/0x920 [ 1390.414639][T17123] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1390.419945][T17123] ? retint_kernel+0x2b/0x2b [ 1390.424551][T17123] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1390.430296][T17123] __kernfs_new_node+0xf0/0x6e0 [ 1390.435151][T17123] ? __kasan_check_write+0x14/0x20 [ 1390.440273][T17123] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1390.445837][T17123] ? wait_for_completion+0x440/0x440 [ 1390.451148][T17123] ? mutex_unlock+0x1b/0x30 [ 1390.455663][T17123] ? kernfs_activate+0x192/0x1f0 [ 1390.460613][T17123] kernfs_new_node+0x96/0x120 [ 1390.465307][T17123] __kernfs_create_file+0x51/0x340 [ 1390.470422][T17123] sysfs_add_file_mode_ns+0x222/0x560 [ 1390.475822][T17123] internal_create_group+0x359/0xc40 [ 1390.481108][T17123] ? remove_files.isra.0+0x190/0x190 [ 1390.486448][T17123] ? kernfs_create_link+0x1cc/0x250 [ 1390.491654][T17123] internal_create_groups.part.0+0x90/0x140 [ 1390.497547][T17123] sysfs_create_groups+0x2a/0x50 [ 1390.502498][T17123] device_add+0x7f4/0x1d00 [ 1390.506910][T17123] ? dev_set_name+0xbb/0xf0 [ 1390.511399][T17123] ? uevent_show+0x370/0x370 [ 1390.515993][T17123] ? device_initialize+0x243/0x540 [ 1390.521102][T17123] netdev_register_kobject+0x183/0x3b0 [ 1390.526543][T17123] register_netdevice+0x4f4/0x1020 [ 1390.531639][T17123] ? netdev_change_features+0xb0/0xb0 [ 1390.537009][T17123] ? __tun_chr_ioctl+0x2c2c/0x3fa0 [ 1390.542130][T17123] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1390.547067][T17123] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1390.552213][T17123] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1390.558044][T17123] ? tun_chr_compat_ioctl+0x30/0x30 [ 1390.563245][T17123] tun_chr_ioctl+0x2b/0x40 [ 1390.567667][T17123] do_vfs_ioctl+0x977/0x14e0 [ 1390.572272][T17123] ? compat_ioctl_preallocate+0x220/0x220 [ 1390.577985][T17123] ? __fget+0x37f/0x550 [ 1390.582140][T17123] ? ksys_dup3+0x3e0/0x3e0 [ 1390.586563][T17123] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1390.592792][T17123] ? fput_many+0x12c/0x1a0 [ 1390.597239][T17123] ? tomoyo_file_ioctl+0x23/0x30 [ 1390.602174][T17123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1390.608418][T17123] ? security_file_ioctl+0x8d/0xc0 [ 1390.613523][T17123] ksys_ioctl+0xab/0xd0 [ 1390.617689][T17123] __x64_sys_ioctl+0x73/0xb0 [ 1390.622293][T17123] do_syscall_64+0xfa/0x790 [ 1390.626785][T17123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.632666][T17123] RIP: 0033:0x45a919 [ 1390.636574][T17123] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1390.656197][T17123] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1390.664613][T17123] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1390.672573][T17123] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1390.680543][T17123] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1390.688560][T17123] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1390.696523][T17123] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00 \x00', 0x7302}) 08:15:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x353, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:15:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x02\x00'}) 08:15:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00`\x00\xa0\x00', 0x7302}) 08:15:49 executing program 4 (fault-call:3 fault-nth:41): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x03\x00'}) [ 1391.132718][T17145] FAULT_INJECTION: forcing a failure. [ 1391.132718][T17145] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.161913][T17145] CPU: 1 PID: 17145 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1391.170617][T17145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.180673][T17145] Call Trace: [ 1391.180696][T17145] dump_stack+0x197/0x210 [ 1391.180717][T17145] should_fail.cold+0xa/0x15 [ 1391.180735][T17145] ? fault_create_debugfs_attr+0x180/0x180 [ 1391.180755][T17145] ? ___might_sleep+0x163/0x2c0 [ 1391.180784][T17145] __should_failslab+0x121/0x190 [ 1391.188406][T17145] should_failslab+0x9/0x14 [ 1391.188424][T17145] kmem_cache_alloc+0x2aa/0x710 [ 1391.188439][T17145] ? lock_downgrade+0x920/0x920 [ 1391.188457][T17145] ? kernfs_activate+0x34/0x1f0 [ 1391.188481][T17145] __kernfs_new_node+0xf0/0x6e0 08:15:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r2) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) socket$kcm(0x29, 0x2, 0x0) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r4, 0x0, 0xaa, 0x39, &(0x7f0000000400)="e20ae731560c22a2e541e84bb45e29fe883d44fe9f56120107e51415117c0ff981b0b950a83d4105f3e5f60b7da74e6781fca21ba64b59a9f31989bb15dd5bd6a2ed2fe11072413f82ec91f0d6352d072a0ce5f7fd9ff48d0e5b65dbc2a697deb1c604759b152c71fa6d9c78689fb891da7407da3a51cc6922de4e81dbc5cf77353ff0c08bdcd67797fd88438d7390e2dc5f8368dd07fb486e709791fb6af75d1ece4c9b9ff79cd50b24", &(0x7f0000000280)=""/57, 0x5, 0x0, 0x3e, 0xab, &(0x7f0000000300)="550ae66cb11ee84c1b0cee46969d90d06e0b9347fa261bc736c63313f8a2949f2af81c7e5e0febf159588e14199fb6c8b90cf725d3d752ca13f4d70da30e", &(0x7f0000000580)="afbec17c73fa76b608b9b33d44316cd15d9b88a7f48452c755445e7f2c6ba8c01f062df5523c1fc7dc1821778dd2f83dc15ae96f9aff1fa582d0820b390837eefe06402f551d5597a18deb4f1f84d2e5e9019dd7b16e40c531b99305195046cce7cd61760c269a2ecd79bfa8bb4d9cf1f1e5bf47a92f085a03732beea70b2313841baca54d01fb6453a6ee938948118712a70f680bf0f1aed22bacebae9f53c4e0e3b29943880cfd323b3b"}, 0x40) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, 0x0, 0x4) [ 1391.188501][T17145] ? __kasan_check_write+0x14/0x20 [ 1391.237594][T17145] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1391.243076][T17145] ? wait_for_completion+0x440/0x440 [ 1391.248394][T17145] ? mutex_unlock+0x1b/0x30 [ 1391.252920][T17145] ? kernfs_activate+0x192/0x1f0 [ 1391.257877][T17145] kernfs_new_node+0x96/0x120 [ 1391.262581][T17145] __kernfs_create_file+0x51/0x340 [ 1391.267711][T17145] sysfs_add_file_mode_ns+0x222/0x560 [ 1391.273086][T17145] internal_create_group+0x359/0xc40 [ 1391.278374][T17145] ? remove_files.isra.0+0x190/0x190 [ 1391.283655][T17145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1391.289884][T17145] ? kernfs_create_link+0x1cc/0x250 [ 1391.295083][T17145] internal_create_groups.part.0+0x90/0x140 [ 1391.300965][T17145] sysfs_create_groups+0x2a/0x50 [ 1391.305898][T17145] device_add+0x7f4/0x1d00 [ 1391.310316][T17145] ? dev_set_name+0xbb/0xf0 [ 1391.314820][T17145] ? uevent_show+0x370/0x370 [ 1391.319437][T17145] ? __init_waitqueue_head+0x36/0x90 [ 1391.324740][T17145] ? pm_runtime_init+0x311/0x3b0 [ 1391.329802][T17145] netdev_register_kobject+0x183/0x3b0 [ 1391.335260][T17145] register_netdevice+0x4f4/0x1020 [ 1391.340387][T17145] ? netdev_change_features+0xb0/0xb0 [ 1391.345755][T17145] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1391.350685][T17145] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1391.355783][T17145] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1391.361602][T17145] ? finish_task_switch+0x119/0x750 [ 1391.366798][T17145] ? tun_chr_compat_ioctl+0x30/0x30 [ 1391.371979][T17145] tun_chr_ioctl+0x2b/0x40 [ 1391.376391][T17145] do_vfs_ioctl+0x977/0x14e0 [ 1391.380968][T17145] ? compat_ioctl_preallocate+0x220/0x220 [ 1391.386687][T17145] ? __fget+0x37f/0x550 [ 1391.390836][T17145] ? ksys_dup3+0x3e0/0x3e0 [ 1391.395253][T17145] ? tomoyo_file_ioctl+0x23/0x30 [ 1391.400183][T17145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1391.406409][T17145] ? security_file_ioctl+0x8d/0xc0 [ 1391.411525][T17145] ksys_ioctl+0xab/0xd0 [ 1391.415682][T17145] __x64_sys_ioctl+0x73/0xb0 [ 1391.420261][T17145] ? do_syscall_64+0x5b/0x790 [ 1391.424931][T17145] do_syscall_64+0xfa/0x790 [ 1391.429424][T17145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.435302][T17145] RIP: 0033:0x45a919 [ 1391.439187][T17145] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1391.458773][T17145] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1391.467170][T17145] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1391.475133][T17145] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1391.483088][T17145] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1391.491050][T17145] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1391.499013][T17145] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x36, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x11f, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x10}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x4, 0x70, 0x1f, 0x0, 0x0, 0x2, 0x0, 0x1, 0x100, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000140), 0x1}, 0x1, 0x7, 0xc0, 0x4, 0x5, 0x200, 0xfff}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000100)='posix_acl_accessmime_type}lo!eth1&#\x00') write$cgroup_subtree(r2, 0x0, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x7f, 0x3f, 0x3, 0x2, 0x0, 0x9517, 0x108a0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xcb18, 0x1, @perf_bp={&(0x7f0000000200), 0x8}, 0x9, 0x6, 0x34, 0x9, 0x9, 0xf87, 0x6}, 0xffffffffffffffff, 0xa, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000280)='}]\x00') 08:15:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x04\x00'}) 08:15:50 executing program 4 (fault-call:3 fault-nth:42): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x05\x00'}) [ 1391.899966][T17166] FAULT_INJECTION: forcing a failure. [ 1391.899966][T17166] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.913211][T17166] CPU: 1 PID: 17166 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1391.921898][T17166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.931952][T17166] Call Trace: [ 1391.935262][T17166] dump_stack+0x197/0x210 [ 1391.939602][T17166] should_fail.cold+0xa/0x15 [ 1391.944248][T17166] ? fault_create_debugfs_attr+0x180/0x180 [ 1391.950077][T17166] ? ___might_sleep+0x163/0x2c0 [ 1391.959620][T17166] __should_failslab+0x121/0x190 [ 1391.964687][T17166] should_failslab+0x9/0x14 [ 1391.969208][T17166] kmem_cache_alloc+0x2aa/0x710 [ 1391.974062][T17166] ? lock_downgrade+0x920/0x920 [ 1391.978914][T17166] ? kernfs_activate+0x34/0x1f0 [ 1391.983765][T17166] __kernfs_new_node+0xf0/0x6e0 [ 1391.988623][T17166] ? __kasan_check_write+0x14/0x20 [ 1391.993733][T17166] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1391.999178][T17166] ? wait_for_completion+0x440/0x440 [ 1392.004471][T17166] ? mutex_unlock+0x1b/0x30 [ 1392.008986][T17166] ? kernfs_activate+0x192/0x1f0 [ 1392.013935][T17166] kernfs_new_node+0x96/0x120 [ 1392.018615][T17166] __kernfs_create_file+0x51/0x340 [ 1392.023713][T17166] sysfs_add_file_mode_ns+0x222/0x560 [ 1392.029104][T17166] internal_create_group+0x359/0xc40 [ 1392.034422][T17166] ? remove_files.isra.0+0x190/0x190 [ 1392.039774][T17166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1392.046018][T17166] ? kernfs_create_link+0x1cc/0x250 [ 1392.051221][T17166] internal_create_groups.part.0+0x90/0x140 [ 1392.057119][T17166] sysfs_create_groups+0x2a/0x50 [ 1392.062044][T17166] device_add+0x7f4/0x1d00 [ 1392.066461][T17166] ? dev_set_name+0xbb/0xf0 [ 1392.071312][T17166] ? uevent_show+0x370/0x370 [ 1392.075884][T17166] ? __init_waitqueue_head+0x36/0x90 [ 1392.081155][T17166] ? pm_runtime_init+0x311/0x3b0 [ 1392.086093][T17166] netdev_register_kobject+0x183/0x3b0 [ 1392.091563][T17166] register_netdevice+0x4f4/0x1020 [ 1392.096682][T17166] ? netdev_change_features+0xb0/0xb0 [ 1392.102062][T17166] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1392.107002][T17166] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1392.112099][T17166] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1392.117897][T17166] ? __f_unlock_pos+0x19/0x20 [ 1392.122583][T17166] ? tun_chr_compat_ioctl+0x30/0x30 [ 1392.127772][T17166] tun_chr_ioctl+0x2b/0x40 [ 1392.132175][T17166] do_vfs_ioctl+0x977/0x14e0 [ 1392.136774][T17166] ? compat_ioctl_preallocate+0x220/0x220 [ 1392.142492][T17166] ? __fget+0x37f/0x550 [ 1392.146634][T17166] ? ksys_dup3+0x3e0/0x3e0 [ 1392.151123][T17166] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1392.157361][T17166] ? fput_many+0x12c/0x1a0 [ 1392.161815][T17166] ? tomoyo_file_ioctl+0x23/0x30 [ 1392.166737][T17166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1392.172971][T17166] ? security_file_ioctl+0x8d/0xc0 [ 1392.178087][T17166] ksys_ioctl+0xab/0xd0 [ 1392.182261][T17166] __x64_sys_ioctl+0x73/0xb0 [ 1392.186848][T17166] do_syscall_64+0xfa/0x790 [ 1392.191339][T17166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.197240][T17166] RIP: 0033:0x45a919 [ 1392.201131][T17166] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1392.220729][T17166] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1392.229155][T17166] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1392.237125][T17166] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1392.245196][T17166] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1392.253186][T17166] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1392.261153][T17166] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00A\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:51 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00!\x00', 0x7302}) 08:15:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa489e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r2) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000100)=0x4) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) 08:15:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x80\x00\xa0\x00', 0x7302}) 08:15:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x06\x00'}) 08:15:51 executing program 4 (fault-call:3 fault-nth:43): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1392.662725][T17183] FAULT_INJECTION: forcing a failure. [ 1392.662725][T17183] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.680603][T17183] CPU: 0 PID: 17183 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1392.689320][T17183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.699368][T17183] Call Trace: [ 1392.707351][T17183] dump_stack+0x197/0x210 [ 1392.711673][T17183] should_fail.cold+0xa/0x15 [ 1392.716251][T17183] ? fault_create_debugfs_attr+0x180/0x180 [ 1392.722049][T17183] ? ___might_sleep+0x163/0x2c0 [ 1392.726891][T17183] __should_failslab+0x121/0x190 [ 1392.731815][T17183] should_failslab+0x9/0x14 [ 1392.736312][T17183] kmem_cache_alloc+0x2aa/0x710 [ 1392.741157][T17183] ? lock_downgrade+0x920/0x920 [ 1392.745992][T17183] ? kernfs_activate+0x34/0x1f0 [ 1392.750835][T17183] __kernfs_new_node+0xf0/0x6e0 [ 1392.755673][T17183] ? __kasan_check_write+0x14/0x20 [ 1392.760773][T17183] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1392.766219][T17183] ? wait_for_completion+0x440/0x440 [ 1392.771503][T17183] ? mutex_unlock+0x1b/0x30 [ 1392.775990][T17183] ? kernfs_activate+0x192/0x1f0 [ 1392.780922][T17183] kernfs_new_node+0x96/0x120 [ 1392.785587][T17183] __kernfs_create_file+0x51/0x340 [ 1392.790712][T17183] sysfs_add_file_mode_ns+0x222/0x560 [ 1392.796074][T17183] internal_create_group+0x359/0xc40 [ 1392.801370][T17183] ? remove_files.isra.0+0x190/0x190 [ 1392.806797][T17183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1392.813065][T17183] ? kernfs_create_link+0x1cc/0x250 [ 1392.818275][T17183] internal_create_groups.part.0+0x90/0x140 [ 1392.824163][T17183] sysfs_create_groups+0x2a/0x50 [ 1392.829097][T17183] device_add+0x7f4/0x1d00 [ 1392.833516][T17183] ? dev_set_name+0xbb/0xf0 [ 1392.838011][T17183] ? uevent_show+0x370/0x370 [ 1392.842586][T17183] ? __init_waitqueue_head+0x36/0x90 [ 1392.847867][T17183] ? pm_runtime_init+0x311/0x3b0 [ 1392.852795][T17183] netdev_register_kobject+0x183/0x3b0 [ 1392.858259][T17183] register_netdevice+0x4f4/0x1020 [ 1392.863359][T17183] ? netdev_change_features+0xb0/0xb0 [ 1392.868726][T17183] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1392.873651][T17183] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1392.878764][T17183] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1392.884552][T17183] ? __f_unlock_pos+0x19/0x20 [ 1392.889223][T17183] ? tun_chr_compat_ioctl+0x30/0x30 [ 1392.894418][T17183] tun_chr_ioctl+0x2b/0x40 [ 1392.898818][T17183] do_vfs_ioctl+0x977/0x14e0 [ 1392.903406][T17183] ? compat_ioctl_preallocate+0x220/0x220 [ 1392.909110][T17183] ? __fget+0x37f/0x550 [ 1392.913280][T17183] ? ksys_dup3+0x3e0/0x3e0 [ 1392.917696][T17183] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1392.923922][T17183] ? fput_many+0x12c/0x1a0 [ 1392.928338][T17183] ? tomoyo_file_ioctl+0x23/0x30 [ 1392.933265][T17183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1392.939492][T17183] ? security_file_ioctl+0x8d/0xc0 [ 1392.944587][T17183] ksys_ioctl+0xab/0xd0 [ 1392.948732][T17183] __x64_sys_ioctl+0x73/0xb0 [ 1392.953313][T17183] do_syscall_64+0xfa/0x790 [ 1392.957807][T17183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.963692][T17183] RIP: 0033:0x45a919 [ 1392.967571][T17183] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1392.987183][T17183] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1392.995582][T17183] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1393.003551][T17183] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 08:15:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\a\x00'}) [ 1393.011517][T17183] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1393.019489][T17183] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1393.027468][T17183] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:52 executing program 4 (fault-call:3 fault-nth:44): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\xff\xff\xff\xc3\x00', 0x7302}) 08:15:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\b\x00'}) 08:15:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) [ 1393.440403][T17201] FAULT_INJECTION: forcing a failure. [ 1393.440403][T17201] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.470441][T17201] CPU: 1 PID: 17201 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1393.479352][T17201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.489402][T17201] Call Trace: [ 1393.492702][T17201] dump_stack+0x197/0x210 [ 1393.497026][T17201] should_fail.cold+0xa/0x15 [ 1393.501609][T17201] ? fault_create_debugfs_attr+0x180/0x180 [ 1393.507411][T17201] ? ___might_sleep+0x163/0x2c0 [ 1393.512257][T17201] __should_failslab+0x121/0x190 [ 1393.517186][T17201] should_failslab+0x9/0x14 [ 1393.521674][T17201] kmem_cache_alloc+0x2aa/0x710 [ 1393.526507][T17201] ? lock_downgrade+0x920/0x920 [ 1393.531342][T17201] ? kernfs_activate+0x34/0x1f0 [ 1393.536195][T17201] __kernfs_new_node+0xf0/0x6e0 [ 1393.541039][T17201] ? __kasan_check_write+0x14/0x20 [ 1393.546137][T17201] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1393.551584][T17201] ? wait_for_completion+0x440/0x440 [ 1393.556871][T17201] ? mutex_unlock+0x1b/0x30 [ 1393.561356][T17201] ? kernfs_activate+0x192/0x1f0 [ 1393.566288][T17201] kernfs_new_node+0x96/0x120 [ 1393.570954][T17201] __kernfs_create_file+0x51/0x340 [ 1393.576054][T17201] sysfs_add_file_mode_ns+0x222/0x560 [ 1393.581425][T17201] internal_create_group+0x359/0xc40 [ 1393.586763][T17201] ? remove_files.isra.0+0x190/0x190 [ 1393.592037][T17201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1393.598262][T17201] ? kernfs_create_link+0x1cc/0x250 [ 1393.603453][T17201] internal_create_groups.part.0+0x90/0x140 [ 1393.609336][T17201] sysfs_create_groups+0x2a/0x50 [ 1393.614257][T17201] device_add+0x7f4/0x1d00 [ 1393.618657][T17201] ? dev_set_name+0xbb/0xf0 [ 1393.623150][T17201] ? uevent_show+0x370/0x370 [ 1393.627723][T17201] ? __init_waitqueue_head+0x36/0x90 [ 1393.632999][T17201] ? pm_runtime_init+0x311/0x3b0 [ 1393.637929][T17201] netdev_register_kobject+0x183/0x3b0 [ 1393.643386][T17201] register_netdevice+0x4f4/0x1020 [ 1393.648582][T17201] ? netdev_change_features+0xb0/0xb0 [ 1393.653949][T17201] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1393.658887][T17201] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1393.663984][T17201] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1393.669785][T17201] ? __f_unlock_pos+0x19/0x20 [ 1393.675682][T17201] ? tun_chr_compat_ioctl+0x30/0x30 [ 1393.680881][T17201] tun_chr_ioctl+0x2b/0x40 [ 1393.685285][T17201] do_vfs_ioctl+0x977/0x14e0 [ 1393.689873][T17201] ? compat_ioctl_preallocate+0x220/0x220 [ 1393.695577][T17201] ? __fget+0x37f/0x550 [ 1393.699720][T17201] ? ksys_dup3+0x3e0/0x3e0 [ 1393.704135][T17201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1393.710377][T17201] ? fput_many+0x12c/0x1a0 [ 1393.714785][T17201] ? tomoyo_file_ioctl+0x23/0x30 [ 1393.719715][T17201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1393.725950][T17201] ? security_file_ioctl+0x8d/0xc0 [ 1393.731047][T17201] ksys_ioctl+0xab/0xd0 [ 1393.735204][T17201] __x64_sys_ioctl+0x73/0xb0 [ 1393.739780][T17201] do_syscall_64+0xfa/0x790 [ 1393.744271][T17201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.750150][T17201] RIP: 0033:0x45a919 [ 1393.754041][T17201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1393.773629][T17201] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1393.782021][T17201] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1393.789976][T17201] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1393.797930][T17201] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1393.805885][T17201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1393.813840][T17201] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x10\x00'}) 08:15:53 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00B\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:53 executing program 4 (fault-call:3 fault-nth:45): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x03\x00'}) 08:15:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r4 = getpid() perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x7e, 0x49, 0x98, 0x2, 0x0, 0x3f, 0xa0908, 0xe, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000100)}, 0x202, 0x3, 0x401, 0xafe628eb732e92ac, 0x9d, 0x7ff}, r4, 0xb, r0, 0x8) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x9) r5 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) 08:15:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xcd\x00', 0x7302}) 08:15:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\"\x00', 0x7302}) [ 1394.453698][T17221] FAULT_INJECTION: forcing a failure. [ 1394.453698][T17221] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.481090][T17221] CPU: 1 PID: 17221 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1394.489879][T17221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.499939][T17221] Call Trace: [ 1394.503235][T17221] dump_stack+0x197/0x210 [ 1394.507568][T17221] should_fail.cold+0xa/0x15 [ 1394.512171][T17221] ? fault_create_debugfs_attr+0x180/0x180 [ 1394.518002][T17221] ? ___might_sleep+0x163/0x2c0 [ 1394.522898][T17221] __should_failslab+0x121/0x190 [ 1394.527865][T17221] should_failslab+0x9/0x14 [ 1394.532508][T17221] kmem_cache_alloc+0x2aa/0x710 [ 1394.537395][T17221] ? lock_downgrade+0x920/0x920 [ 1394.542269][T17221] ? kernfs_activate+0x34/0x1f0 [ 1394.547131][T17221] __kernfs_new_node+0xf0/0x6e0 [ 1394.552004][T17221] ? __kasan_check_write+0x14/0x20 [ 1394.557118][T17221] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1394.562577][T17221] ? wait_for_completion+0x440/0x440 [ 1394.567944][T17221] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1394.573685][T17221] ? map_id_range_down+0x1ee/0x370 [ 1394.578802][T17221] ? __put_user_ns+0x70/0x70 [ 1394.583501][T17221] ? kernfs_activate+0x192/0x1f0 [ 1394.588441][T17221] kernfs_new_node+0x96/0x120 [ 1394.593135][T17221] __kernfs_create_file+0x51/0x340 [ 1394.598267][T17221] sysfs_add_file_mode_ns+0x222/0x560 [ 1394.603647][T17221] internal_create_group+0x359/0xc40 [ 1394.608930][T17221] ? remove_files.isra.0+0x190/0x190 [ 1394.614204][T17221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1394.620450][T17221] ? kernfs_create_link+0x1cc/0x250 [ 1394.625662][T17221] internal_create_groups.part.0+0x90/0x140 [ 1394.631543][T17221] sysfs_create_groups+0x2a/0x50 [ 1394.636477][T17221] device_add+0x13b5/0x1d00 [ 1394.640972][T17221] ? dev_set_name+0xbb/0xf0 [ 1394.645461][T17221] ? uevent_show+0x370/0x370 [ 1394.650034][T17221] ? __init_waitqueue_head+0x36/0x90 [ 1394.655321][T17221] ? pm_runtime_init+0x311/0x3b0 [ 1394.661322][T17221] netdev_register_kobject+0x183/0x3b0 [ 1394.666770][T17221] register_netdevice+0x4f4/0x1020 [ 1394.671879][T17221] ? netdev_change_features+0xb0/0xb0 [ 1394.677277][T17221] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1394.682225][T17221] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1394.687333][T17221] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1394.693134][T17221] ? __f_unlock_pos+0x19/0x20 [ 1394.697845][T17221] ? tun_chr_compat_ioctl+0x30/0x30 [ 1394.703047][T17221] tun_chr_ioctl+0x2b/0x40 [ 1394.707449][T17221] do_vfs_ioctl+0x977/0x14e0 [ 1394.712026][T17221] ? compat_ioctl_preallocate+0x220/0x220 [ 1394.717743][T17221] ? __fget+0x37f/0x550 [ 1394.721902][T17221] ? ksys_dup3+0x3e0/0x3e0 [ 1394.726305][T17221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1394.732544][T17221] ? tomoyo_file_ioctl+0x23/0x30 [ 1394.737496][T17221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1394.743824][T17221] ? security_file_ioctl+0x8d/0xc0 [ 1394.748934][T17221] ksys_ioctl+0xab/0xd0 [ 1394.753088][T17221] __x64_sys_ioctl+0x73/0xb0 [ 1394.757682][T17221] do_syscall_64+0xfa/0x790 [ 1394.762186][T17221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1394.768146][T17221] RIP: 0033:0x45a919 [ 1394.772059][T17221] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1394.791653][T17221] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:15:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x05\x00'}) [ 1394.800077][T17221] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1394.808045][T17221] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1394.816011][T17221] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1394.823980][T17221] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1394.831942][T17221] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x06\x00'}) 08:15:54 executing program 4 (fault-call:3 fault-nth:46): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\a\x00'}) 08:15:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) [ 1395.189064][T17241] FAULT_INJECTION: forcing a failure. [ 1395.189064][T17241] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.201979][T17241] CPU: 1 PID: 17241 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1395.210661][T17241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.220714][T17241] Call Trace: [ 1395.220738][T17241] dump_stack+0x197/0x210 [ 1395.220758][T17241] should_fail.cold+0xa/0x15 [ 1395.220782][T17241] ? fault_create_debugfs_attr+0x180/0x180 [ 1395.220805][T17241] ? ___might_sleep+0x163/0x2c0 [ 1395.243788][T17241] __should_failslab+0x121/0x190 [ 1395.248760][T17241] should_failslab+0x9/0x14 [ 1395.253284][T17241] kmem_cache_alloc+0x2aa/0x710 [ 1395.258144][T17241] ? lock_downgrade+0x920/0x920 [ 1395.263004][T17241] ? kernfs_activate+0x34/0x1f0 [ 1395.267866][T17241] __kernfs_new_node+0xf0/0x6e0 [ 1395.272722][T17241] ? __kasan_check_write+0x14/0x20 [ 1395.277829][T17241] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1395.283279][T17241] ? wait_for_completion+0x440/0x440 [ 1395.288569][T17241] ? mutex_unlock+0x1b/0x30 [ 1395.293056][T17241] ? kernfs_activate+0x192/0x1f0 [ 1395.297983][T17241] kernfs_new_node+0x96/0x120 [ 1395.302651][T17241] __kernfs_create_file+0x51/0x340 [ 1395.307763][T17241] sysfs_add_file_mode_ns+0x222/0x560 [ 1395.313129][T17241] internal_create_group+0x359/0xc40 [ 1395.318407][T17241] ? remove_files.isra.0+0x190/0x190 [ 1395.323698][T17241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1395.329938][T17241] ? kernfs_create_link+0x1cc/0x250 [ 1395.335161][T17241] internal_create_groups.part.0+0x90/0x140 [ 1395.341055][T17241] sysfs_create_groups+0x2a/0x50 [ 1395.345983][T17241] device_add+0x7f4/0x1d00 [ 1395.350383][T17241] ? dev_set_name+0xbb/0xf0 [ 1395.354873][T17241] ? uevent_show+0x370/0x370 [ 1395.359447][T17241] ? __init_waitqueue_head+0x36/0x90 [ 1395.364718][T17241] ? pm_runtime_init+0x311/0x3b0 [ 1395.369643][T17241] netdev_register_kobject+0x183/0x3b0 [ 1395.375102][T17241] register_netdevice+0x4f4/0x1020 [ 1395.380218][T17241] ? netdev_change_features+0xb0/0xb0 [ 1395.385584][T17241] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1395.390509][T17241] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1395.395622][T17241] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1395.401409][T17241] ? __f_unlock_pos+0x19/0x20 [ 1395.406079][T17241] ? tun_chr_compat_ioctl+0x30/0x30 [ 1395.411261][T17241] tun_chr_ioctl+0x2b/0x40 [ 1395.415666][T17241] do_vfs_ioctl+0x977/0x14e0 [ 1395.420245][T17241] ? compat_ioctl_preallocate+0x220/0x220 [ 1395.425953][T17241] ? __fget+0x37f/0x550 [ 1395.430095][T17241] ? ksys_dup3+0x3e0/0x3e0 [ 1395.434495][T17241] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1395.440716][T17241] ? fput_many+0x12c/0x1a0 [ 1395.445124][T17241] ? tomoyo_file_ioctl+0x23/0x30 [ 1395.450070][T17241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1395.456298][T17241] ? security_file_ioctl+0x8d/0xc0 [ 1395.461403][T17241] ksys_ioctl+0xab/0xd0 [ 1395.465559][T17241] __x64_sys_ioctl+0x73/0xb0 [ 1395.470140][T17241] do_syscall_64+0xfa/0x790 [ 1395.474633][T17241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1395.480516][T17241] RIP: 0033:0x45a919 [ 1395.484400][T17241] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1395.503987][T17241] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1395.512388][T17241] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1395.520354][T17241] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1395.528307][T17241] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1395.536261][T17241] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1395.544309][T17241] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:54 executing program 4 (fault-call:3 fault-nth:47): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1395.882526][T17253] FAULT_INJECTION: forcing a failure. [ 1395.882526][T17253] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.896630][T17253] CPU: 0 PID: 17253 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1395.905584][T17253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.915648][T17253] Call Trace: [ 1395.918939][T17253] dump_stack+0x197/0x210 [ 1395.923285][T17253] should_fail.cold+0xa/0x15 [ 1395.927898][T17253] ? fault_create_debugfs_attr+0x180/0x180 [ 1395.933718][T17253] ? ___might_sleep+0x163/0x2c0 [ 1395.938582][T17253] __should_failslab+0x121/0x190 [ 1395.938602][T17253] should_failslab+0x9/0x14 [ 1395.938615][T17253] kmem_cache_alloc+0x2aa/0x710 [ 1395.938629][T17253] ? lock_downgrade+0x920/0x920 [ 1395.938643][T17253] ? kernfs_activate+0x34/0x1f0 [ 1395.938667][T17253] __kernfs_new_node+0xf0/0x6e0 [ 1395.938684][T17253] ? __kasan_check_write+0x14/0x20 [ 1395.938706][T17253] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1395.978568][T17253] ? wait_for_completion+0x440/0x440 [ 1395.983881][T17253] ? mutex_unlock+0x1b/0x30 [ 1395.988393][T17253] ? kernfs_activate+0x192/0x1f0 [ 1395.993349][T17253] kernfs_new_node+0x96/0x120 [ 1395.998306][T17253] __kernfs_create_file+0x51/0x340 [ 1396.003434][T17253] sysfs_add_file_mode_ns+0x222/0x560 [ 1396.008831][T17253] internal_create_group+0x359/0xc40 [ 1396.014240][T17253] ? remove_files.isra.0+0x190/0x190 [ 1396.019531][T17253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1396.025782][T17253] ? kernfs_create_link+0x1cc/0x250 [ 1396.031127][T17253] internal_create_groups.part.0+0x90/0x140 [ 1396.037393][T17253] sysfs_create_groups+0x2a/0x50 [ 1396.042334][T17253] device_add+0x7f4/0x1d00 [ 1396.046762][T17253] ? dev_set_name+0xbb/0xf0 [ 1396.051273][T17253] ? uevent_show+0x370/0x370 [ 1396.055863][T17253] ? __init_waitqueue_head+0x36/0x90 [ 1396.061173][T17253] ? pm_runtime_init+0x311/0x3b0 [ 1396.066114][T17253] netdev_register_kobject+0x183/0x3b0 [ 1396.071571][T17253] register_netdevice+0x4f4/0x1020 [ 1396.076703][T17253] ? netdev_change_features+0xb0/0xb0 [ 1396.082087][T17253] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1396.087027][T17253] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1396.092135][T17253] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1396.097940][T17253] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1396.103237][T17253] ? tun_chr_compat_ioctl+0x30/0x30 [ 1396.108435][T17253] tun_chr_ioctl+0x2b/0x40 [ 1396.112865][T17253] do_vfs_ioctl+0x977/0x14e0 [ 1396.117472][T17253] ? compat_ioctl_preallocate+0x220/0x220 [ 1396.123186][T17253] ? __fget+0x37f/0x550 [ 1396.127344][T17253] ? ksys_dup3+0x3e0/0x3e0 [ 1396.131767][T17253] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1396.138027][T17253] ? fput_many+0x12c/0x1a0 [ 1396.142443][T17253] ? tomoyo_file_ioctl+0x23/0x30 [ 1396.147376][T17253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1396.153637][T17253] ? security_file_ioctl+0x8d/0xc0 [ 1396.158757][T17253] ksys_ioctl+0xab/0xd0 [ 1396.162925][T17253] __x64_sys_ioctl+0x73/0xb0 [ 1396.167527][T17253] do_syscall_64+0xfa/0x790 [ 1396.172067][T17253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1396.177964][T17253] RIP: 0033:0x45a919 [ 1396.181961][T17253] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1396.202233][T17253] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1396.210655][T17253] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1396.218624][T17253] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1396.227044][T17253] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1396.235011][T17253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1396.243089][T17253] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:55 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00C\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00?\x00'}) 08:15:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="850000000e00000024000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e3809acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96ae9e8e3d4fe6078c5f6675b0b16b4589743cf26d310c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f9901000000af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb1ffaa75e6d2b6f35d22e42432bb3d74d74298cc542230000be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef3800"/464], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r4 = openat$cgroup(r3, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r5 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r5) recvmsg(r5, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r5) socket$kcm(0x29, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x80, 0x3, 0x20, 0x6, 0x0, 0x9, 0x10, 0xc, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x8000, 0x1ff}, 0x80, 0x80, 0x7fe000, 0x5, 0x0, 0x9, 0xff}, r4, 0x7, r5, 0x4) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x6, 0x40, 0xe7, 0x7c, 0x0, 0x200, 0x80000, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffff989, 0x3, @perf_bp={&(0x7f0000000100), 0x4}, 0x4a62, 0xffffffff000000, 0x1bc, 0x6, 0x7, 0x3, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x1) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) r6 = gettid() r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r8, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r8, 0x15, 0x1, 0x4, 0x0, 0xfffffffffffffeb2}, 0x35e4ed281d171825) r9 = perf_event_open$cgroup(&(0x7f0000000780)={0x0, 0x70, 0x1, 0x3, 0x0, 0x20, 0x0, 0xfffffffffffffff7, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000740), 0x5}, 0x80, 0x6, 0x0, 0x6, 0x0, 0xff, 0x8}, r8, 0x2, 0xffffffffffffffff, 0x4) perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x1f, 0x7, 0x5, 0x0, 0x2, 0x100000, 0x452f0df672bb9efe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x1, 0x400, 0x3ff, 0x9, 0x0, 0x0, 0x5}, r7, 0x1, r9, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r6, r7, 0x0, 0x1, &(0x7f0000000400)='\x00'}, 0x30) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r10, 0x0, 0x0, 0x0) r11 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8}, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) close(r11) recvmsg(r11, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r11) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x4, 0x1, 0x4, 0x4, 0x0, 0x40, 0x20400, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x3ff, 0x76d7}, 0x10024, 0x10001, 0x8f9a, 0x5, 0xe31d, 0x9, 0x3}, r6, 0xa, r11, 0x13) 08:15:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xce\x00', 0x7302}) 08:15:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00#\x00', 0x7302}) 08:15:55 executing program 4 (fault-call:3 fault-nth:48): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00@\x00'}) [ 1396.761249][T17268] FAULT_INJECTION: forcing a failure. [ 1396.761249][T17268] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.778992][T17268] CPU: 0 PID: 17268 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1396.787767][T17268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.797830][T17268] Call Trace: [ 1396.801139][T17268] dump_stack+0x197/0x210 [ 1396.805484][T17268] should_fail.cold+0xa/0x15 [ 1396.810084][T17268] ? fault_create_debugfs_attr+0x180/0x180 [ 1396.815914][T17268] ? ___might_sleep+0x163/0x2c0 [ 1396.820862][T17268] __should_failslab+0x121/0x190 [ 1396.825822][T17268] should_failslab+0x9/0x14 [ 1396.830333][T17268] kmem_cache_alloc+0x2aa/0x710 [ 1396.835202][T17268] ? lock_downgrade+0x920/0x920 [ 1396.840100][T17268] ? kernfs_activate+0x34/0x1f0 [ 1396.844976][T17268] __kernfs_new_node+0xf0/0x6e0 [ 1396.849840][T17268] ? __kasan_check_write+0x14/0x20 [ 1396.854970][T17268] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1396.860503][T17268] ? wait_for_completion+0x440/0x440 [ 1396.865806][T17268] ? mutex_unlock+0x1b/0x30 [ 1396.870323][T17268] ? kernfs_activate+0x192/0x1f0 [ 1396.875281][T17268] kernfs_new_node+0x96/0x120 [ 1396.879957][T17268] __kernfs_create_file+0x51/0x340 [ 1396.885083][T17268] sysfs_add_file_mode_ns+0x222/0x560 [ 1396.890509][T17268] internal_create_group+0x359/0xc40 [ 1396.896503][T17268] ? remove_files.isra.0+0x190/0x190 [ 1396.901803][T17268] ? __this_cpu_preempt_check+0x35/0x190 [ 1396.907445][T17268] ? retint_kernel+0x2b/0x2b [ 1396.912045][T17268] internal_create_groups.part.0+0x90/0x140 [ 1396.918141][T17268] sysfs_create_groups+0x2a/0x50 [ 1396.923086][T17268] device_add+0x13b5/0x1d00 [ 1396.927599][T17268] ? dev_set_name+0xbb/0xf0 [ 1396.932129][T17268] ? uevent_show+0x370/0x370 [ 1396.936724][T17268] ? __init_waitqueue_head+0x36/0x90 [ 1396.942024][T17268] ? pm_runtime_init+0x311/0x3b0 [ 1396.946987][T17268] netdev_register_kobject+0x183/0x3b0 [ 1396.953259][T17268] register_netdevice+0x4f4/0x1020 [ 1396.958377][T17268] ? netdev_change_features+0xb0/0xb0 [ 1396.963734][T17268] ? __tun_chr_ioctl+0x2c1f/0x3fa0 [ 1396.968870][T17268] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1396.973848][T17268] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1396.978954][T17268] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1396.984410][T17268] ? preempt_schedule_irq+0xf3/0x160 [ 1396.989806][T17268] ? tun_chr_compat_ioctl+0x30/0x30 [ 1396.995019][T17268] tun_chr_ioctl+0x2b/0x40 [ 1396.999434][T17268] do_vfs_ioctl+0x977/0x14e0 [ 1397.004027][T17268] ? compat_ioctl_preallocate+0x220/0x220 [ 1397.009763][T17268] ? __fget+0x37f/0x550 [ 1397.013919][T17268] ? ksys_dup3+0x3e0/0x3e0 [ 1397.018362][T17268] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1397.024647][T17268] ? fput_many+0x12c/0x1a0 [ 1397.029086][T17268] ? tomoyo_file_ioctl+0x23/0x30 [ 1397.034223][T17268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1397.040476][T17268] ? security_file_ioctl+0x8d/0xc0 [ 1397.045603][T17268] ksys_ioctl+0xab/0xd0 [ 1397.049866][T17268] __x64_sys_ioctl+0x73/0xb0 [ 1397.054476][T17268] do_syscall_64+0xfa/0x790 [ 1397.059003][T17268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.064898][T17268] RIP: 0033:0x45a919 [ 1397.068804][T17268] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1397.088424][T17268] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1397.096853][T17268] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1397.104928][T17268] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1397.112913][T17268] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1397.120896][T17268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1397.128876][T17268] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\xff\x00'}) 08:15:56 executing program 4 (fault-call:3 fault-nth:49): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xcf\x00', 0x7302}) [ 1397.534167][T17287] FAULT_INJECTION: forcing a failure. [ 1397.534167][T17287] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.582450][T17287] CPU: 0 PID: 17287 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1397.591174][T17287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.601237][T17287] Call Trace: [ 1397.604546][T17287] dump_stack+0x197/0x210 [ 1397.608913][T17287] should_fail.cold+0xa/0x15 [ 1397.613528][T17287] ? fault_create_debugfs_attr+0x180/0x180 [ 1397.619360][T17287] ? ___might_sleep+0x163/0x2c0 [ 1397.624239][T17287] __should_failslab+0x121/0x190 08:15:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\xa0\x00`\x00'}) [ 1397.629199][T17287] should_failslab+0x9/0x14 [ 1397.633892][T17287] kmem_cache_alloc+0x2aa/0x710 [ 1397.638752][T17287] ? lock_downgrade+0x920/0x920 [ 1397.643649][T17287] ? kernfs_activate+0x34/0x1f0 [ 1397.648610][T17287] __kernfs_new_node+0xf0/0x6e0 [ 1397.653478][T17287] ? __kasan_check_write+0x14/0x20 [ 1397.658613][T17287] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1397.664070][T17287] ? wait_for_completion+0x440/0x440 [ 1397.669393][T17287] ? mutex_unlock+0x1b/0x30 [ 1397.673910][T17287] ? kernfs_activate+0x192/0x1f0 08:15:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x2, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0x14f0ffff}, {0x6}]}) recvmsg(r2, &(0x7f0000005ec0)={&(0x7f0000004940)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004e40)=[{&(0x7f00000049c0)=""/105, 0x69}, {&(0x7f0000004a40)=""/149, 0x95}, {&(0x7f0000004b00)=""/89, 0x59}, {&(0x7f0000004b80)=""/206, 0xce}, {&(0x7f0000004c80)=""/32, 0x20}, {&(0x7f0000004cc0)}, {&(0x7f0000004d00)=""/172, 0xac}, {&(0x7f0000004dc0)=""/77, 0x4d}], 0x8, &(0x7f0000004ec0)=""/4096, 0x1000}, 0x1) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000005f00)=r4) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xa, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xa8, &(0x7f00000000c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x2, &(0x7f00000001c0), 0xfffffffffffffdef}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5ec, 0x0, 0x0, 0x0, 0x81}}, &(0x7f0000000200)='GPL\x00', 0x3, 0x1000, &(0x7f00000009c0)=""/4096, 0x41100, 0x8, [], r4, 0x2c, r5, 0x8, &(0x7f0000000280)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x8, 0x7, 0xfffffff8}, 0x10, 0x0, r0}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) r9 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r9, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002c40)={0xffffffffffffffff}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r11) write$cgroup_type(r11, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_type(r11, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000002c80)={r10}) openat$cgroup_ro(r6, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$cgroup_subtree(r8, 0x0, 0x4) [ 1397.678862][T17287] kernfs_new_node+0x96/0x120 [ 1397.683552][T17287] __kernfs_create_file+0x51/0x340 [ 1397.688698][T17287] sysfs_add_file_mode_ns+0x222/0x560 [ 1397.694095][T17287] internal_create_group+0x359/0xc40 [ 1397.699413][T17287] ? remove_files.isra.0+0x190/0x190 [ 1397.704737][T17287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1397.710979][T17287] ? kernfs_create_link+0x1cc/0x250 [ 1397.716262][T17287] internal_create_groups.part.0+0x90/0x140 [ 1397.722147][T17287] sysfs_create_groups+0x2a/0x50 [ 1397.727079][T17287] device_add+0x7f4/0x1d00 [ 1397.731499][T17287] ? dev_set_name+0xbb/0xf0 [ 1397.736014][T17287] ? uevent_show+0x370/0x370 [ 1397.740614][T17287] ? __init_waitqueue_head+0x36/0x90 [ 1397.745902][T17287] ? pm_runtime_init+0x311/0x3b0 [ 1397.750835][T17287] netdev_register_kobject+0x183/0x3b0 [ 1397.756297][T17287] register_netdevice+0x4f4/0x1020 [ 1397.761411][T17287] ? netdev_change_features+0xb0/0xb0 [ 1397.766780][T17287] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1397.771708][T17287] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1397.776802][T17287] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1397.782594][T17287] ? __f_unlock_pos+0x19/0x20 [ 1397.787268][T17287] ? tun_chr_compat_ioctl+0x30/0x30 [ 1397.792453][T17287] tun_chr_ioctl+0x2b/0x40 [ 1397.796866][T17287] do_vfs_ioctl+0x977/0x14e0 [ 1397.801451][T17287] ? compat_ioctl_preallocate+0x220/0x220 [ 1397.807152][T17287] ? __fget+0x37f/0x550 [ 1397.811295][T17287] ? ksys_dup3+0x3e0/0x3e0 [ 1397.815697][T17287] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1397.821920][T17287] ? fput_many+0x12c/0x1a0 [ 1397.826334][T17287] ? tomoyo_file_ioctl+0x23/0x30 [ 1397.831264][T17287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1397.837484][T17287] ? security_file_ioctl+0x8d/0xc0 [ 1397.842585][T17287] ksys_ioctl+0xab/0xd0 [ 1397.846728][T17287] __x64_sys_ioctl+0x73/0xb0 [ 1397.851303][T17287] do_syscall_64+0xfa/0x790 [ 1397.855795][T17287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.861673][T17287] RIP: 0033:0x45a919 [ 1397.865641][T17287] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1397.885313][T17287] RSP: 002b:00007f351a609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1397.893708][T17287] RAX: ffffffffffffffda RBX: 00007f351a609c90 RCX: 000000000045a919 [ 1397.901662][T17287] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1397.909616][T17287] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1397.917573][T17287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a60a6d4 [ 1397.925526][T17287] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:57 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00D\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00$\x00', 0x7302}) 08:15:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\xa0\x00\x80\x00'}) 08:15:57 executing program 4 (fault-call:3 fault-nth:50): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0xa9, 0xce, &(0x7f0000000400)=""/206, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cz\x93\bAY.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) [ 1398.584148][T17310] FAULT_INJECTION: forcing a failure. [ 1398.584148][T17310] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.597050][T17310] CPU: 1 PID: 17310 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1398.605743][T17310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1398.615807][T17310] Call Trace: [ 1398.619120][T17310] dump_stack+0x197/0x210 [ 1398.623475][T17310] should_fail.cold+0xa/0x15 [ 1398.628089][T17310] ? fault_create_debugfs_attr+0x180/0x180 08:15:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x01\x00'}) [ 1398.633917][T17310] ? ___might_sleep+0x163/0x2c0 [ 1398.638800][T17310] __should_failslab+0x121/0x190 [ 1398.644027][T17310] should_failslab+0x9/0x14 [ 1398.648544][T17310] kmem_cache_alloc+0x2aa/0x710 [ 1398.653404][T17310] ? __kasan_check_write+0x14/0x20 [ 1398.658507][T17310] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1398.664120][T17310] __kernfs_new_node+0xf0/0x6e0 [ 1398.668977][T17310] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1398.674451][T17310] ? map_id_range_down+0x1ee/0x370 [ 1398.679560][T17310] ? __put_user_ns+0x70/0x70 [ 1398.684191][T17310] ? kernfs_activate+0x192/0x1f0 [ 1398.689140][T17310] ? make_kgid+0x23/0x30 [ 1398.693385][T17310] kernfs_new_node+0x96/0x120 [ 1398.698071][T17310] kernfs_create_dir_ns+0x52/0x160 [ 1398.703256][T17310] internal_create_group+0x7f4/0xc40 [ 1398.708568][T17310] ? remove_files.isra.0+0x190/0x190 [ 1398.713859][T17310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1398.720094][T17310] ? kernfs_create_link+0x1cc/0x250 [ 1398.725301][T17310] internal_create_groups.part.0+0x90/0x140 [ 1398.731214][T17310] sysfs_create_groups+0x2a/0x50 [ 1398.736168][T17310] device_add+0x13b5/0x1d00 [ 1398.740669][T17310] ? dev_set_name+0xbb/0xf0 [ 1398.745186][T17310] ? uevent_show+0x370/0x370 [ 1398.749777][T17310] ? __init_waitqueue_head+0x36/0x90 [ 1398.755280][T17310] ? pm_runtime_init+0x311/0x3b0 [ 1398.760227][T17310] netdev_register_kobject+0x183/0x3b0 [ 1398.765693][T17310] register_netdevice+0x4f4/0x1020 [ 1398.770831][T17310] ? netdev_change_features+0xb0/0xb0 [ 1398.776226][T17310] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1398.781189][T17310] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1398.786305][T17310] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1398.792320][T17310] ? __fget+0x35d/0x550 [ 1398.797551][T17310] ? tun_chr_compat_ioctl+0x30/0x30 [ 1398.802756][T17310] tun_chr_ioctl+0x2b/0x40 [ 1398.807181][T17310] do_vfs_ioctl+0x977/0x14e0 [ 1398.811774][T17310] ? compat_ioctl_preallocate+0x220/0x220 [ 1398.817661][T17310] ? __fget+0x37f/0x550 [ 1398.821824][T17310] ? ksys_dup3+0x3e0/0x3e0 [ 1398.826270][T17310] ? tomoyo_file_ioctl+0x23/0x30 [ 1398.831250][T17310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1398.837510][T17310] ? security_file_ioctl+0x8d/0xc0 [ 1398.842651][T17310] ksys_ioctl+0xab/0xd0 [ 1398.846825][T17310] __x64_sys_ioctl+0x73/0xb0 [ 1398.851418][T17310] ? do_syscall_64+0x5b/0x790 [ 1398.856107][T17310] do_syscall_64+0xfa/0x790 [ 1398.860616][T17310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1398.866512][T17310] RIP: 0033:0x45a919 [ 1398.870406][T17310] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1398.890783][T17310] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1398.899194][T17310] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1398.907179][T17310] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1398.915157][T17310] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1398.923144][T17310] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 08:15:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) [ 1398.931116][T17310] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd0\x00', 0x7302}) 08:15:58 executing program 4 (fault-call:3 fault-nth:51): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x02\x00'}) 08:15:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/447], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) [ 1399.249066][T17330] FAULT_INJECTION: forcing a failure. [ 1399.249066][T17330] name failslab, interval 1, probability 0, space 0, times 0 [ 1399.284833][T17330] CPU: 0 PID: 17330 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1399.293557][T17330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.303613][T17330] Call Trace: [ 1399.306905][T17330] dump_stack+0x197/0x210 [ 1399.311239][T17330] should_fail.cold+0xa/0x15 [ 1399.315823][T17330] ? fault_create_debugfs_attr+0x180/0x180 [ 1399.321634][T17330] ? ___might_sleep+0x163/0x2c0 [ 1399.326494][T17330] __should_failslab+0x121/0x190 [ 1399.331422][T17330] should_failslab+0x9/0x14 [ 1399.335909][T17330] kmem_cache_alloc+0x2aa/0x710 [ 1399.340740][T17330] ? lock_downgrade+0x920/0x920 [ 1399.345580][T17330] ? kernfs_activate+0x34/0x1f0 [ 1399.350422][T17330] __kernfs_new_node+0xf0/0x6e0 [ 1399.355257][T17330] ? __kasan_check_write+0x14/0x20 [ 1399.360352][T17330] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1399.365810][T17330] ? wait_for_completion+0x440/0x440 [ 1399.371088][T17330] ? mutex_unlock+0x1b/0x30 [ 1399.375584][T17330] ? kernfs_activate+0x192/0x1f0 [ 1399.380594][T17330] kernfs_new_node+0x96/0x120 [ 1399.385270][T17330] __kernfs_create_file+0x51/0x340 [ 1399.390368][T17330] sysfs_add_file_mode_ns+0x222/0x560 [ 1399.395741][T17330] internal_create_group+0x359/0xc40 [ 1399.401019][T17330] ? remove_files.isra.0+0x190/0x190 [ 1399.406295][T17330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1399.412519][T17330] ? kernfs_create_link+0x1cc/0x250 [ 1399.417706][T17330] internal_create_groups.part.0+0x90/0x140 [ 1399.423612][T17330] sysfs_create_groups+0x2a/0x50 [ 1399.428537][T17330] device_add+0x7f4/0x1d00 [ 1399.432952][T17330] ? dev_set_name+0xbb/0xf0 [ 1399.437455][T17330] ? uevent_show+0x370/0x370 [ 1399.442033][T17330] ? __init_waitqueue_head+0x36/0x90 [ 1399.447305][T17330] ? pm_runtime_init+0x311/0x3b0 [ 1399.452233][T17330] netdev_register_kobject+0x183/0x3b0 [ 1399.457680][T17330] register_netdevice+0x4f4/0x1020 [ 1399.462788][T17330] ? netdev_change_features+0xb0/0xb0 [ 1399.468154][T17330] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1399.473082][T17330] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1399.478177][T17330] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1399.483980][T17330] ? __f_unlock_pos+0x19/0x20 [ 1399.488652][T17330] ? tun_chr_compat_ioctl+0x30/0x30 [ 1399.493842][T17330] tun_chr_ioctl+0x2b/0x40 [ 1399.498243][T17330] do_vfs_ioctl+0x977/0x14e0 [ 1399.502828][T17330] ? compat_ioctl_preallocate+0x220/0x220 [ 1399.508531][T17330] ? __fget+0x37f/0x550 [ 1399.512675][T17330] ? ksys_dup3+0x3e0/0x3e0 [ 1399.517110][T17330] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1399.523495][T17330] ? fput_many+0x12c/0x1a0 [ 1399.527931][T17330] ? tomoyo_file_ioctl+0x23/0x30 [ 1399.532865][T17330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1399.539094][T17330] ? security_file_ioctl+0x8d/0xc0 [ 1399.544211][T17330] ksys_ioctl+0xab/0xd0 [ 1399.548358][T17330] __x64_sys_ioctl+0x73/0xb0 [ 1399.552939][T17330] do_syscall_64+0xfa/0x790 [ 1399.557435][T17330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.563311][T17330] RIP: 0033:0x45a919 [ 1399.567193][T17330] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1399.586849][T17330] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1399.595359][T17330] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1399.603314][T17330] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1399.611276][T17330] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1399.619240][T17330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1399.627287][T17330] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x03\x00'}) 08:15:59 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00E\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:15:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00%\x00', 0x7302}) 08:15:59 executing program 4 (fault-call:3 fault-nth:52): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) write$cgroup_int(r0, &(0x7f0000000000)=0x7, 0x12) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) 08:15:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x04\x00'}) 08:15:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd1\x00', 0x7302}) [ 1400.157831][T17349] FAULT_INJECTION: forcing a failure. [ 1400.157831][T17349] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.197081][T17349] CPU: 1 PID: 17349 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1400.205808][T17349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.215873][T17349] Call Trace: [ 1400.219179][T17349] dump_stack+0x197/0x210 [ 1400.223533][T17349] should_fail.cold+0xa/0x15 [ 1400.228780][T17349] ? fault_create_debugfs_attr+0x180/0x180 [ 1400.234604][T17349] ? ___might_sleep+0x163/0x2c0 [ 1400.239465][T17349] __should_failslab+0x121/0x190 [ 1400.244412][T17349] should_failslab+0x9/0x14 [ 1400.248917][T17349] kmem_cache_alloc+0x2aa/0x710 [ 1400.253759][T17349] ? lock_downgrade+0x920/0x920 [ 1400.258653][T17349] ? kernfs_activate+0x34/0x1f0 [ 1400.263510][T17349] __kernfs_new_node+0xf0/0x6e0 [ 1400.268358][T17349] ? __kasan_check_write+0x14/0x20 [ 1400.273471][T17349] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1400.278956][T17349] ? wait_for_completion+0x440/0x440 [ 1400.284269][T17349] ? mutex_unlock+0x1b/0x30 [ 1400.288792][T17349] ? kernfs_activate+0x192/0x1f0 [ 1400.293752][T17349] kernfs_new_node+0x96/0x120 [ 1400.298457][T17349] __kernfs_create_file+0x51/0x340 [ 1400.303720][T17349] sysfs_add_file_mode_ns+0x222/0x560 [ 1400.309116][T17349] internal_create_group+0x359/0xc40 [ 1400.314419][T17349] ? remove_files.isra.0+0x190/0x190 [ 1400.319716][T17349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1400.325972][T17349] ? kernfs_create_link+0x1cc/0x250 [ 1400.331164][T17349] internal_create_groups.part.0+0x90/0x140 [ 1400.337917][T17349] sysfs_create_groups+0x2a/0x50 [ 1400.342933][T17349] device_add+0x13b5/0x1d00 [ 1400.347422][T17349] ? dev_set_name+0xbb/0xf0 [ 1400.351914][T17349] ? uevent_show+0x370/0x370 [ 1400.356487][T17349] ? __init_waitqueue_head+0x36/0x90 [ 1400.361757][T17349] ? pm_runtime_init+0x311/0x3b0 [ 1400.366693][T17349] netdev_register_kobject+0x183/0x3b0 [ 1400.372145][T17349] register_netdevice+0x4f4/0x1020 [ 1400.377252][T17349] ? netdev_change_features+0xb0/0xb0 [ 1400.382617][T17349] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1400.387553][T17349] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1400.392651][T17349] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1400.398440][T17349] ? __f_unlock_pos+0x19/0x20 [ 1400.403139][T17349] ? tun_chr_compat_ioctl+0x30/0x30 [ 1400.408323][T17349] tun_chr_ioctl+0x2b/0x40 [ 1400.412724][T17349] do_vfs_ioctl+0x977/0x14e0 [ 1400.417319][T17349] ? compat_ioctl_preallocate+0x220/0x220 [ 1400.423027][T17349] ? __fget+0x37f/0x550 [ 1400.427179][T17349] ? ksys_dup3+0x3e0/0x3e0 [ 1400.431591][T17349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1400.437837][T17349] ? tomoyo_file_ioctl+0x23/0x30 [ 1400.443225][T17349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1400.449449][T17349] ? security_file_ioctl+0x8d/0xc0 [ 1400.454558][T17349] ksys_ioctl+0xab/0xd0 [ 1400.458725][T17349] __x64_sys_ioctl+0x73/0xb0 [ 1400.463301][T17349] do_syscall_64+0xfa/0x790 [ 1400.467792][T17349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1400.473674][T17349] RIP: 0033:0x45a919 [ 1400.477563][T17349] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1400.497157][T17349] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1400.505568][T17349] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1400.513523][T17349] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1400.521511][T17349] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1400.529991][T17349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1400.537965][T17349] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:15:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x05\x00'}) 08:15:59 executing program 4 (fault-call:3 fault-nth:53): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:15:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x06\x00'}) 08:15:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\a\x00'}) [ 1400.943714][T17367] FAULT_INJECTION: forcing a failure. [ 1400.943714][T17367] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.963335][T17367] CPU: 0 PID: 17367 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1400.972068][T17367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.982131][T17367] Call Trace: [ 1400.985434][T17367] dump_stack+0x197/0x210 [ 1400.985457][T17367] should_fail.cold+0xa/0x15 [ 1400.985475][T17367] ? fault_create_debugfs_attr+0x180/0x180 [ 1400.985496][T17367] ? ___might_sleep+0x163/0x2c0 [ 1400.985518][T17367] __should_failslab+0x121/0x190 [ 1400.985540][T17367] should_failslab+0x9/0x14 [ 1400.995002][T17367] kmem_cache_alloc+0x2aa/0x710 [ 1400.995022][T17367] ? mark_held_locks+0xa4/0xf0 [ 1400.995043][T17367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1400.995065][T17367] __kernfs_new_node+0xf0/0x6e0 [ 1400.995082][T17367] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1400.995103][T17367] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1400.995124][T17367] ? __this_cpu_preempt_check+0x35/0x190 [ 1400.995140][T17367] ? retint_kernel+0x2b/0x2b [ 1400.995169][T17367] kernfs_new_node+0x96/0x120 [ 1401.061076][T17367] __kernfs_create_file+0x51/0x340 [ 1401.066197][T17367] sysfs_add_file_mode_ns+0x222/0x560 [ 1401.071565][T17367] internal_create_group+0x359/0xc40 [ 1401.076850][T17367] ? remove_files.isra.0+0x190/0x190 [ 1401.082134][T17367] ? __this_cpu_preempt_check+0x35/0x190 [ 1401.087755][T17367] ? retint_kernel+0x2b/0x2b [ 1401.092340][T17367] internal_create_groups.part.0+0x90/0x140 [ 1401.098237][T17367] sysfs_create_groups+0x2a/0x50 [ 1401.103258][T17367] device_add+0x13b5/0x1d00 [ 1401.107746][T17367] ? dev_set_name+0xbb/0xf0 [ 1401.112255][T17367] ? uevent_show+0x370/0x370 [ 1401.116835][T17367] ? __init_waitqueue_head+0x36/0x90 [ 1401.122107][T17367] ? pm_runtime_init+0x311/0x3b0 [ 1401.127033][T17367] netdev_register_kobject+0x183/0x3b0 [ 1401.132482][T17367] register_netdevice+0x4f4/0x1020 [ 1401.137597][T17367] ? netdev_change_features+0xb0/0xb0 [ 1401.142958][T17367] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1401.147888][T17367] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1401.153148][T17367] ? __this_cpu_preempt_check+0x35/0x190 [ 1401.158766][T17367] ? retint_kernel+0x2b/0x2b [ 1401.163436][T17367] ? tun_chr_compat_ioctl+0x30/0x30 [ 1401.168618][T17367] tun_chr_ioctl+0x2b/0x40 [ 1401.173019][T17367] do_vfs_ioctl+0x977/0x14e0 [ 1401.177627][T17367] ? compat_ioctl_preallocate+0x220/0x220 [ 1401.183343][T17367] ? btrfs_ioctl_defrag+0x93/0x3f0 [ 1401.188448][T17367] ? retint_kernel+0x2b/0x2b [ 1401.193038][T17367] ? tomoyo_file_ioctl+0x23/0x30 [ 1401.197993][T17367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.204225][T17367] ? security_file_ioctl+0x8d/0xc0 [ 1401.209326][T17367] ksys_ioctl+0xab/0xd0 [ 1401.213472][T17367] __x64_sys_ioctl+0x73/0xb0 [ 1401.218069][T17367] do_syscall_64+0xfa/0x790 [ 1401.222574][T17367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1401.228458][T17367] RIP: 0033:0x45a919 [ 1401.232350][T17367] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1401.252136][T17367] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1401.261494][T17367] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1401.269451][T17367] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1401.277415][T17367] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1401.285381][T17367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 08:15:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001900)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29632d76faa0238c49fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa68f30ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfef0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000222497818441c7526f2d6d71be603b067827775a23d2a345f01955366f10829736313814d57f1352181fa157b1c2748b88d2df3f82318c6b16944b6b4fe23447b73f0c4b33a0d542a5b4687144e132a42b18f20a8d1fff3985d749686c7c35d0d274304a5a92384bf154697f0984d17a752b89a579fe81d1146a9c20c7ac49884aaf41ac37c85f2f9138686ab49fe45b37b584a4dbe046ce3e3e5f2c55cf2d23e58a7652633fc7e006a22239479fc744ce202cfea16c3cf6be3833882c892349af197ceb1589fb8bd967c5d956258b24c8433324410f1813de65172799388301d5c26a5fc1f4424c134225f9524aafbe0e9e5fd0041e256e5eadf4190fd65e2e31e26890f14200000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000400)=""/249, 0xf9}, {&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000001800)=""/232, 0xe8}], 0x4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={0x0, 0xfffffffd, 0x400, 0x10000}, &(0x7f0000000200)=0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = gettid() r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r5, r6, 0x0, 0x23, &(0x7f0000000540)='GPLvboxnet1md5sumposix_acl_access,\x00', r4}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={r4}, 0xc) write$cgroup_subtree(r2, 0x0, 0x4) [ 1401.293336][T17367] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\b\x00'}) 08:16:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00F\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:00 executing program 4 (fault-call:3 fault-nth:54): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) r3 = socket$kcm(0x2, 0x3, 0x84) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x3, 0x0, [0x0, 0x0, 0x0]}) sendmsg$inet(r3, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) close(r3) 08:16:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x10\x00'}) 08:16:00 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00&\x00', 0x7302}) 08:16:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd2\x00', 0x7302}) 08:16:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00?\x00'}) [ 1402.009296][T17392] FAULT_INJECTION: forcing a failure. [ 1402.009296][T17392] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.029677][T17392] CPU: 0 PID: 17392 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1402.038400][T17392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.049423][T17392] Call Trace: [ 1402.052818][T17392] dump_stack+0x197/0x210 [ 1402.057405][T17392] should_fail.cold+0xa/0x15 [ 1402.062033][T17392] ? fault_create_debugfs_attr+0x180/0x180 [ 1402.067862][T17392] ? ___might_sleep+0x163/0x2c0 [ 1402.072939][T17392] __should_failslab+0x121/0x190 [ 1402.077875][T17392] should_failslab+0x9/0x14 [ 1402.082375][T17392] kmem_cache_alloc+0x2aa/0x710 [ 1402.087215][T17392] ? lock_downgrade+0x920/0x920 [ 1402.092054][T17392] ? kernfs_activate+0x34/0x1f0 [ 1402.096918][T17392] __kernfs_new_node+0xf0/0x6e0 [ 1402.101776][T17392] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1402.107230][T17392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1402.112684][T17392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1402.118141][T17392] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1402.123410][T17392] ? retint_kernel+0x2b/0x2b [ 1402.127987][T17392] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1402.133695][T17392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1402.139143][T17392] kernfs_new_node+0x96/0x120 [ 1402.143806][T17392] __kernfs_create_file+0x51/0x340 [ 1402.149027][T17392] sysfs_add_file_mode_ns+0x222/0x560 [ 1402.154407][T17392] internal_create_group+0x359/0xc40 [ 1402.159711][T17392] ? remove_files.isra.0+0x190/0x190 [ 1402.165009][T17392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1402.171262][T17392] ? kernfs_create_link+0x1cc/0x250 [ 1402.176456][T17392] internal_create_groups.part.0+0x90/0x140 [ 1402.182339][T17392] sysfs_create_groups+0x2a/0x50 [ 1402.187279][T17392] device_add+0x13b5/0x1d00 [ 1402.191794][T17392] ? dev_set_name+0xbb/0xf0 [ 1402.196318][T17392] ? uevent_show+0x370/0x370 [ 1402.200907][T17392] ? __init_waitqueue_head+0x36/0x90 [ 1402.206191][T17392] ? pm_runtime_init+0x311/0x3b0 [ 1402.211127][T17392] netdev_register_kobject+0x183/0x3b0 [ 1402.216579][T17392] ? netdev_register_kobject+0x6/0x3b0 [ 1402.222045][T17392] register_netdevice+0x4f4/0x1020 [ 1402.227175][T17392] ? netdev_change_features+0xb0/0xb0 [ 1402.232565][T17392] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1402.237509][T17392] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1402.242622][T17392] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1402.248436][T17392] ? __f_unlock_pos+0x19/0x20 [ 1402.253127][T17392] ? tun_chr_compat_ioctl+0x30/0x30 [ 1402.258324][T17392] tun_chr_ioctl+0x2b/0x40 [ 1402.262738][T17392] do_vfs_ioctl+0x977/0x14e0 [ 1402.267340][T17392] ? compat_ioctl_preallocate+0x220/0x220 [ 1402.273044][T17392] ? __fget+0x37f/0x550 [ 1402.277283][T17392] ? ksys_dup3+0x3e0/0x3e0 [ 1402.281698][T17392] ? tomoyo_file_ioctl+0x23/0x30 [ 1402.286625][T17392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1402.292863][T17392] ? security_file_ioctl+0x8d/0xc0 [ 1402.298342][T17392] ksys_ioctl+0xab/0xd0 [ 1402.302502][T17392] __x64_sys_ioctl+0x73/0xb0 [ 1402.307097][T17392] do_syscall_64+0xfa/0x790 [ 1402.311621][T17392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1402.317511][T17392] RIP: 0033:0x45a919 [ 1402.321477][T17392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1402.341078][T17392] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1402.349476][T17392] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1402.357450][T17392] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1402.365434][T17392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1402.373409][T17392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1402.381379][T17392] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00@\x00'}) 08:16:01 executing program 4 (fault-call:3 fault-nth:55): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00`\x00\xa0\x00'}) [ 1402.735328][T17413] FAULT_INJECTION: forcing a failure. [ 1402.735328][T17413] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.778789][T17413] CPU: 1 PID: 17413 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1402.787523][T17413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.797589][T17413] Call Trace: [ 1402.800901][T17413] dump_stack+0x197/0x210 [ 1402.805268][T17413] should_fail.cold+0xa/0x15 [ 1402.809880][T17413] ? fault_create_debugfs_attr+0x180/0x180 [ 1402.815689][T17413] ? ___might_sleep+0x163/0x2c0 [ 1402.820529][T17413] __should_failslab+0x121/0x190 [ 1402.825498][T17413] should_failslab+0x9/0x14 [ 1402.830010][T17413] kmem_cache_alloc+0x2aa/0x710 [ 1402.834870][T17413] ? __kasan_check_write+0x14/0x20 [ 1402.840057][T17413] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1402.845606][T17413] __kernfs_new_node+0xf0/0x6e0 [ 1402.850474][T17413] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1402.855945][T17413] ? map_id_range_down+0x1ee/0x370 [ 1402.861116][T17413] ? __put_user_ns+0x70/0x70 [ 1402.866400][T17413] ? kernfs_activate+0x192/0x1f0 [ 1402.871364][T17413] ? make_kgid+0x23/0x30 [ 1402.875663][T17413] kernfs_new_node+0x96/0x120 [ 1402.880373][T17413] kernfs_create_dir_ns+0x52/0x160 [ 1402.885490][T17413] internal_create_group+0x7f4/0xc40 [ 1402.890809][T17413] ? remove_files.isra.0+0x190/0x190 [ 1402.896110][T17413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1402.902367][T17413] ? kernfs_create_link+0x1cc/0x250 [ 1402.907585][T17413] internal_create_groups.part.0+0x90/0x140 [ 1402.913486][T17413] sysfs_create_groups+0x2a/0x50 [ 1402.918424][T17413] device_add+0x13b5/0x1d00 [ 1402.922930][T17413] ? dev_set_name+0xbb/0xf0 [ 1402.927444][T17413] ? uevent_show+0x370/0x370 [ 1402.932209][T17413] ? __init_waitqueue_head+0x36/0x90 [ 1402.937505][T17413] ? pm_runtime_init+0x311/0x3b0 [ 1402.942446][T17413] netdev_register_kobject+0x183/0x3b0 [ 1402.948263][T17413] register_netdevice+0x4f4/0x1020 [ 1402.953394][T17413] ? netdev_change_features+0xb0/0xb0 [ 1402.958779][T17413] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1402.963708][T17413] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1402.968826][T17413] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1402.974643][T17413] ? __f_unlock_pos+0x19/0x20 [ 1402.979330][T17413] ? tun_chr_compat_ioctl+0x30/0x30 [ 1402.984531][T17413] tun_chr_ioctl+0x2b/0x40 [ 1402.988946][T17413] do_vfs_ioctl+0x977/0x14e0 [ 1402.993526][T17413] ? compat_ioctl_preallocate+0x220/0x220 [ 1402.999232][T17413] ? __fget+0x37f/0x550 [ 1403.003412][T17413] ? ksys_dup3+0x3e0/0x3e0 [ 1403.007836][T17413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1403.014083][T17413] ? tomoyo_file_ioctl+0x23/0x30 [ 1403.019013][T17413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1403.025268][T17413] ? security_file_ioctl+0x8d/0xc0 [ 1403.030415][T17413] ksys_ioctl+0xab/0xd0 [ 1403.034578][T17413] __x64_sys_ioctl+0x73/0xb0 [ 1403.039186][T17413] do_syscall_64+0xfa/0x790 [ 1403.043680][T17413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1403.049557][T17413] RIP: 0033:0x45a919 [ 1403.053449][T17413] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1403.074098][T17413] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1403.082535][T17413] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1403.090505][T17413] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1403.098478][T17413] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1403.106547][T17413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1403.114530][T17413] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)="e1ba0bc5", 0x4}, {&(0x7f0000000400)="9d4662e71d46f74e84d546b87fba2166b316ea1d3333a9209f1c496930e8c7776647a91be2137806e7ce43a50fa1ceb21100e3387dae6d8f5b4c9405c123eccb9bd99bd8b238ee5cb36c9763e593879289257cff43cc900059de0b623041ea0de03ee29efb67ff80ff4332a05a668d658c0a19001f90028f8158f6ec383ebebbff7d75a3d30e53e9bc1ea0f66cdd6c74e22eda4bff6ae68b24613114d1d53064f0f1fc7ab78a1964501d36d808326cf22a65299087a4072c4f380f311b8fbaa9a828cab50c17", 0xc6}, {&(0x7f0000000300)="b0eac49ce2b5d4f610b7a61dea820930f2cda06f394e22c36ee64c4297ed804c71526b670ef8668593fcc2db7f2b9251701b3805629b484085567f6d98a09d2755b19945e04e7424241d535988dcca", 0x4f}, {&(0x7f0000000580)="4f2981da17b64a152c6ae55774413cc2cdcc6ced0e1568a4e6728b8394a92d64687ed845f7c0c6ea7b93dabe1aaef80dd6fb9ed723e6428a376efdb8657608b5346b5d5fdbf6232e0f0b75b16fb52b84dc14ddbc690cb496eab5d0960bb0240cf1730cac567a1d7183ba5498cf8537dc6b667879d7ce5c45a173", 0x7a}, {&(0x7f0000000200)="ba30e73a37016d101f37a4728476", 0xe}, {&(0x7f0000000600)="ebf021ed7582af84d553e89c0fc87b8eb84eea651070650cc931b1978ff74fb21e2a367447770f5130c0a420ed2b3747c4587e0b8926f2ab6f82894f5bf68c79cee7086eb8de319b891762bd13892da586dc6344e3a149cd730d7a91fd63037c487ef84856e8591749caea39f1d50f6aa0e8856e83a67f5c5571425409ebf4cfe7bad097", 0x84}, {&(0x7f0000000280)="2ab203f85be9e49c518624601fd9739c7bf7344c3345e97b8cffa332ca9371aa61a162729f8422c3fb6803d2c719647469492aa87e", 0x35}], 0x7, &(0x7f0000000740)=[@mark={{0x14, 0x1, 0x24, 0xffffffff}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xa00000}}], 0x48}, 0x1) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:02 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00G\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\'\x00', 0x7302}) 08:16:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x80\x00\xa0\x00'}) 08:16:02 executing program 4 (fault-call:3 fault-nth:56): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd3\x00', 0x7302}) 08:16:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = gettid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r3, r4, 0x0, 0x23, &(0x7f0000000540)='GPLvboxnet1md5sumposix_acl_access,\x00', r2}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r2}, 0xc) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000400)="71540fe79cedf299fa7ae8f5f376fef1bd5d34f24e41df6306b64f38544a6b655e7977abcdc305f529cc69f9043aa2a15858440f5b6b77a7295cafba53bbce34baa788a3f695791829274cb14b13f56c294f"}, 0x20) write$cgroup_subtree(r1, 0x0, 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000580)='ip_vti0\x00') sendmsg$tipc(r5, &(0x7f0000000600)={&(0x7f0000000480)=@name={0x1e, 0x2, 0x1, {{0x43, 0x2}, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000004c0)="35401793f84053703d88c98f42ae1d65c314284b3002f2a03524332ba529638f4538f48de1362244fcf462", 0x2b}, {&(0x7f0000000800)="bf10dc19830fbc5b9b488b40744630745e3abe4b1890667437d6bdef7be182f2b283d0df5a3f528c25ca60d23f5cc6ad680015555177aa89d4d7a756ab758d9fd2c818e5cd64353ca35ed6fe58520f4035588af294714d5e8441e2bc11c91fab84a5e5bca875d546b021582acdd8cdd1d9eb93258a6637bba20fe36eafd47bbde0d2a1e0df156078ab854b96f0939fc5c3043cd547fb0ae5bfc39a821e055ff7e9d870867e20075de3c34d5f650a", 0xae}], 0x2}, 0x10) [ 1403.741932][T17435] FAULT_INJECTION: forcing a failure. [ 1403.741932][T17435] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.758551][T17435] CPU: 0 PID: 17435 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1403.767264][T17435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.777330][T17435] Call Trace: [ 1403.780634][T17435] dump_stack+0x197/0x210 [ 1403.785003][T17435] should_fail.cold+0xa/0x15 [ 1403.789621][T17435] ? fault_create_debugfs_attr+0x180/0x180 [ 1403.795452][T17435] ? ___might_sleep+0x163/0x2c0 [ 1403.800485][T17435] __should_failslab+0x121/0x190 [ 1403.805443][T17435] should_failslab+0x9/0x14 [ 1403.809952][T17435] kmem_cache_alloc+0x2aa/0x710 [ 1403.814904][T17435] ? lock_downgrade+0x920/0x920 [ 1403.819744][T17435] ? kernfs_activate+0x34/0x1f0 [ 1403.824602][T17435] __kernfs_new_node+0xf0/0x6e0 [ 1403.830836][T17435] ? __kasan_check_write+0x14/0x20 [ 1403.835947][T17435] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1403.841398][T17435] ? wait_for_completion+0x440/0x440 [ 1403.846677][T17435] ? mutex_unlock+0x1b/0x30 [ 1403.851166][T17435] ? kernfs_activate+0x192/0x1f0 [ 1403.856090][T17435] kernfs_new_node+0x96/0x120 [ 1403.860765][T17435] __kernfs_create_file+0x51/0x340 [ 1403.865871][T17435] sysfs_add_file_mode_ns+0x222/0x560 [ 1403.871232][T17435] internal_create_group+0x359/0xc40 [ 1403.876519][T17435] ? remove_files.isra.0+0x190/0x190 [ 1403.881882][T17435] ? internal_create_groups.part.0+0x1b/0x140 [ 1403.887937][T17435] internal_create_groups.part.0+0x90/0x140 [ 1403.893819][T17435] sysfs_create_groups+0x2a/0x50 [ 1403.898743][T17435] device_add+0x13b5/0x1d00 [ 1403.903226][T17435] ? dev_set_name+0xbb/0xf0 [ 1403.907720][T17435] ? uevent_show+0x370/0x370 [ 1403.912292][T17435] ? __init_waitqueue_head+0x36/0x90 [ 1403.917565][T17435] ? pm_runtime_init+0x311/0x3b0 [ 1403.922500][T17435] netdev_register_kobject+0x183/0x3b0 [ 1403.927950][T17435] register_netdevice+0x4f4/0x1020 [ 1403.933053][T17435] ? netdev_change_features+0xb0/0xb0 [ 1403.938764][T17435] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1403.943694][T17435] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1403.948789][T17435] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1403.954589][T17435] ? __f_unlock_pos+0x19/0x20 [ 1403.959261][T17435] ? tun_chr_compat_ioctl+0x30/0x30 [ 1403.964445][T17435] tun_chr_ioctl+0x2b/0x40 [ 1403.968849][T17435] do_vfs_ioctl+0x977/0x14e0 [ 1403.973432][T17435] ? compat_ioctl_preallocate+0x220/0x220 [ 1403.979134][T17435] ? __fget+0x37f/0x550 [ 1403.983287][T17435] ? ksys_dup3+0x3e0/0x3e0 [ 1403.987773][T17435] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1403.995400][T17435] ? fput_many+0x12c/0x1a0 [ 1403.999815][T17435] ? tomoyo_file_ioctl+0x23/0x30 [ 1404.004745][T17435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1404.010981][T17435] ? security_file_ioctl+0x8d/0xc0 [ 1404.016076][T17435] ksys_ioctl+0xab/0xd0 [ 1404.020221][T17435] __x64_sys_ioctl+0x73/0xb0 [ 1404.024799][T17435] do_syscall_64+0xfa/0x790 [ 1404.029292][T17435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1404.035166][T17435] RIP: 0033:0x45a919 [ 1404.039045][T17435] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1404.058638][T17435] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1404.067035][T17435] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1404.074999][T17435] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1404.082962][T17435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:16:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\xff\x00'}) [ 1404.090920][T17435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1404.098884][T17435] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:03 executing program 4 (fault-call:3 fault-nth:57): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\xff\xff\xff\xff\xa0\x00`\x00'}) 08:16:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}) 08:16:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000800)="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", 0x1000}], 0x1}, 0x4004000) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}) [ 1404.553989][T17455] FAULT_INJECTION: forcing a failure. [ 1404.553989][T17455] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.594630][T17455] CPU: 0 PID: 17455 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1404.603479][T17455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.613549][T17455] Call Trace: [ 1404.616855][T17455] dump_stack+0x197/0x210 [ 1404.621205][T17455] should_fail.cold+0xa/0x15 [ 1404.625827][T17455] ? fault_create_debugfs_attr+0x180/0x180 [ 1404.631639][T17455] ? ___might_sleep+0x163/0x2c0 [ 1404.636496][T17455] __should_failslab+0x121/0x190 [ 1404.641430][T17455] should_failslab+0x9/0x14 [ 1404.645922][T17455] kmem_cache_alloc+0x2aa/0x710 [ 1404.650757][T17455] ? lock_downgrade+0x920/0x920 [ 1404.656136][T17455] ? kernfs_activate+0x34/0x1f0 [ 1404.661287][T17455] __kernfs_new_node+0xf0/0x6e0 [ 1404.666225][T17455] ? __kasan_check_write+0x14/0x20 [ 1404.671502][T17455] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1404.676971][T17455] ? wait_for_completion+0x440/0x440 [ 1404.682427][T17455] ? mutex_unlock+0x1b/0x30 [ 1404.686933][T17455] ? kernfs_activate+0x192/0x1f0 [ 1404.691867][T17455] kernfs_new_node+0x96/0x120 [ 1404.696535][T17455] __kernfs_create_file+0x51/0x340 [ 1404.701636][T17455] sysfs_add_file_mode_ns+0x222/0x560 [ 1404.707016][T17455] internal_create_group+0x359/0xc40 [ 1404.712299][T17455] ? remove_files.isra.0+0x190/0x190 [ 1404.717579][T17455] ? internal_create_groups.part.0+0x1b/0x140 [ 1404.723638][T17455] internal_create_groups.part.0+0x90/0x140 [ 1404.729528][T17455] sysfs_create_groups+0x2a/0x50 [ 1404.734453][T17455] device_add+0x13b5/0x1d00 [ 1404.738966][T17455] ? dev_set_name+0xbb/0xf0 [ 1404.743472][T17455] ? uevent_show+0x370/0x370 [ 1404.748063][T17455] netdev_register_kobject+0x183/0x3b0 [ 1404.753508][T17455] ? call_netdevice_notifiers_info+0xc2/0x130 [ 1404.759568][T17455] register_netdevice+0x4f4/0x1020 [ 1404.764929][T17455] ? netdev_change_features+0xb0/0xb0 [ 1404.770291][T17455] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1404.775237][T17455] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1404.780331][T17455] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1404.786134][T17455] ? __f_unlock_pos+0x19/0x20 [ 1404.790835][T17455] ? tun_chr_compat_ioctl+0x30/0x30 [ 1404.796018][T17455] tun_chr_ioctl+0x2b/0x40 [ 1404.800426][T17455] do_vfs_ioctl+0x977/0x14e0 [ 1404.805009][T17455] ? compat_ioctl_preallocate+0x220/0x220 [ 1404.810714][T17455] ? __fget+0x37f/0x550 [ 1404.815376][T17455] ? ksys_dup3+0x3e0/0x3e0 [ 1404.819778][T17455] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1404.825315][T17455] ? tomoyo_file_ioctl+0x23/0x30 [ 1404.830240][T17455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1404.836464][T17455] ? security_file_ioctl+0x8d/0xc0 [ 1404.841567][T17455] ksys_ioctl+0xab/0xd0 [ 1404.845987][T17455] __x64_sys_ioctl+0x73/0xb0 [ 1404.850669][T17455] do_syscall_64+0xfa/0x790 [ 1404.855182][T17455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1404.862197][T17455] RIP: 0033:0x45a919 [ 1404.870422][T17455] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1404.890391][T17455] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1404.898916][T17455] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1404.907153][T17455] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1404.916003][T17455] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1404.924229][T17455] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1404.932829][T17455] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:04 executing program 4 (fault-call:3 fault-nth:58): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00(\x00', 0x7302}) 08:16:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd4\x00', 0x7302}) 08:16:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) 08:16:04 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00H\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e22, @broadcast}, 0xfffffffffffffe71, 0x0, 0x0, 0x0, 0x188}, 0xfd00) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3f, 0x5}, 0x0, 0x0, &(0x7f00000006c0)={0x3, 0x1, 0x8d2f}, &(0x7f0000000700)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x25bf583d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r3, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x10, &(0x7f0000000100)={&(0x7f0000000400)=""/193, 0xc1, r3}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=r4, 0x4) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}) [ 1405.553518][T17475] FAULT_INJECTION: forcing a failure. [ 1405.553518][T17475] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.573253][T17475] CPU: 1 PID: 17475 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1405.581969][T17475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.592034][T17475] Call Trace: [ 1405.595334][T17475] dump_stack+0x197/0x210 [ 1405.599681][T17475] should_fail.cold+0xa/0x15 [ 1405.604284][T17475] ? fault_create_debugfs_attr+0x180/0x180 [ 1405.610084][T17475] ? ___might_sleep+0x163/0x2c0 [ 1405.615020][T17475] __should_failslab+0x121/0x190 [ 1405.619977][T17475] should_failslab+0x9/0x14 [ 1405.624475][T17475] kmem_cache_alloc+0x2aa/0x710 [ 1405.629311][T17475] ? lock_downgrade+0x920/0x920 [ 1405.634150][T17475] ? kernfs_activate+0x34/0x1f0 [ 1405.638994][T17475] __kernfs_new_node+0xf0/0x6e0 [ 1405.643855][T17475] ? __kasan_check_write+0x14/0x20 [ 1405.648979][T17475] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1405.654438][T17475] ? wait_for_completion+0x440/0x440 [ 1405.659789][T17475] ? mutex_unlock+0x1b/0x30 [ 1405.664287][T17475] ? kernfs_activate+0x192/0x1f0 [ 1405.669234][T17475] kernfs_new_node+0x96/0x120 [ 1405.673929][T17475] __kernfs_create_file+0x51/0x340 [ 1405.679037][T17475] sysfs_add_file_mode_ns+0x222/0x560 [ 1405.684424][T17475] internal_create_group+0x359/0xc40 [ 1405.689720][T17475] ? remove_files.isra.0+0x190/0x190 [ 1405.695018][T17475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1405.701350][T17475] ? kernfs_create_link+0x1cc/0x250 [ 1405.706566][T17475] internal_create_groups.part.0+0x90/0x140 [ 1405.712572][T17475] sysfs_create_groups+0x2a/0x50 [ 1405.717519][T17475] device_add+0x13b5/0x1d00 [ 1405.722103][T17475] ? dev_set_name+0xbb/0xf0 [ 1405.726619][T17475] ? uevent_show+0x370/0x370 [ 1405.731209][T17475] ? __init_waitqueue_head+0x36/0x90 [ 1405.736496][T17475] ? pm_runtime_init+0x311/0x3b0 [ 1405.742262][T17475] netdev_register_kobject+0x183/0x3b0 [ 1405.747748][T17475] register_netdevice+0x4f4/0x1020 [ 1405.754165][T17475] ? netdev_change_features+0xb0/0xb0 [ 1405.760315][T17475] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1405.765272][T17475] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1405.770389][T17475] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1405.776541][T17475] ? __f_unlock_pos+0x19/0x20 [ 1405.781418][T17475] ? tun_chr_compat_ioctl+0x30/0x30 [ 1405.786617][T17475] tun_chr_ioctl+0x2b/0x40 [ 1405.791125][T17475] do_vfs_ioctl+0x977/0x14e0 [ 1405.797007][T17475] ? compat_ioctl_preallocate+0x220/0x220 [ 1405.803505][T17475] ? __fget+0x37f/0x550 [ 1405.808114][T17475] ? ksys_dup3+0x3e0/0x3e0 [ 1405.812535][T17475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1405.819060][T17475] ? tomoyo_file_ioctl+0x23/0x30 [ 1405.824351][T17475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1405.831264][T17475] ? security_file_ioctl+0x8d/0xc0 [ 1405.837169][T17475] ksys_ioctl+0xab/0xd0 [ 1405.841341][T17475] __x64_sys_ioctl+0x73/0xb0 [ 1405.846290][T17475] do_syscall_64+0xfa/0x790 [ 1405.850799][T17475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1405.857087][T17475] RIP: 0033:0x45a919 [ 1405.860993][T17475] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1405.883303][T17475] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1405.892051][T17475] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1405.900100][T17475] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1405.908084][T17475] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1405.916282][T17475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1405.924909][T17475] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}) 08:16:05 executing program 4 (fault-call:3 fault-nth:59): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x800, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x3, &(0x7f0000000140)=[{0x7, 0x2, 0x8, 0xfe00}, {0x101, 0x20, 0x4, 0x824a249f}, {0x3, 0x0, 0x7}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) [ 1406.304775][T17493] FAULT_INJECTION: forcing a failure. [ 1406.304775][T17493] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.318109][T17493] CPU: 0 PID: 17493 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1406.327512][T17493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.337584][T17493] Call Trace: [ 1406.340901][T17493] dump_stack+0x197/0x210 [ 1406.345262][T17493] should_fail.cold+0xa/0x15 [ 1406.349960][T17493] ? fault_create_debugfs_attr+0x180/0x180 [ 1406.355773][T17493] ? ___might_sleep+0x163/0x2c0 [ 1406.360727][T17493] __should_failslab+0x121/0x190 [ 1406.365697][T17493] should_failslab+0x9/0x14 [ 1406.370204][T17493] kmem_cache_alloc+0x2aa/0x710 [ 1406.375046][T17493] ? kmem_cache_alloc+0x6/0x710 [ 1406.379892][T17493] __kernfs_new_node+0xf0/0x6e0 [ 1406.384731][T17493] ? __kasan_check_write+0x14/0x20 [ 1406.389831][T17493] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1406.395851][T17493] ? wait_for_completion+0x440/0x440 [ 1406.401129][T17493] ? mutex_unlock+0x1b/0x30 [ 1406.405619][T17493] ? kernfs_activate+0x192/0x1f0 [ 1406.410574][T17493] kernfs_new_node+0x96/0x120 [ 1406.415244][T17493] __kernfs_create_file+0x51/0x340 [ 1406.420350][T17493] sysfs_add_file_mode_ns+0x222/0x560 [ 1406.425719][T17493] internal_create_group+0x359/0xc40 [ 1406.431013][T17493] ? remove_files.isra.0+0x190/0x190 [ 1406.436307][T17493] ? internal_create_groups.part.0+0x9c/0x140 [ 1406.442370][T17493] internal_create_groups.part.0+0x90/0x140 [ 1406.448776][T17493] sysfs_create_groups+0x2a/0x50 [ 1406.454066][T17493] device_add+0x13b5/0x1d00 [ 1406.458557][T17493] ? dev_set_name+0xbb/0xf0 [ 1406.463065][T17493] ? uevent_show+0x370/0x370 [ 1406.467648][T17493] ? device_initialize+0x347/0x540 [ 1406.473548][T17493] netdev_register_kobject+0x183/0x3b0 [ 1406.479034][T17493] register_netdevice+0x4f4/0x1020 [ 1406.484135][T17493] ? netdev_change_features+0xb0/0xb0 [ 1406.489587][T17493] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1406.494533][T17493] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1406.499633][T17493] ? __this_cpu_preempt_check+0x35/0x190 [ 1406.505342][T17493] ? retint_kernel+0x2b/0x2b [ 1406.509929][T17493] ? tun_chr_compat_ioctl+0x30/0x30 [ 1406.515117][T17493] tun_chr_ioctl+0x2b/0x40 [ 1406.519523][T17493] do_vfs_ioctl+0x977/0x14e0 [ 1406.524729][T17493] ? compat_ioctl_preallocate+0x220/0x220 [ 1406.530437][T17493] ? __fget+0x37f/0x550 [ 1406.534592][T17493] ? ksys_dup3+0x3e0/0x3e0 [ 1406.539008][T17493] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1406.544461][T17493] ? tomoyo_file_ioctl+0x23/0x30 [ 1406.549401][T17493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1406.555625][T17493] ? security_file_ioctl+0x8d/0xc0 [ 1406.560726][T17493] ksys_ioctl+0xab/0xd0 [ 1406.564877][T17493] __x64_sys_ioctl+0x73/0xb0 [ 1406.569470][T17493] do_syscall_64+0xfa/0x790 [ 1406.573982][T17493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.579859][T17493] RIP: 0033:0x45a919 [ 1406.583762][T17493] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:16:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}) [ 1406.603362][T17493] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1406.611774][T17493] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1406.619733][T17493] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1406.627704][T17493] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1406.635661][T17493] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1406.643629][T17493] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) 08:16:05 executing program 4 (fault-call:3 fault-nth:60): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1406.968705][T17509] FAULT_INJECTION: forcing a failure. [ 1406.968705][T17509] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.997373][T17509] CPU: 1 PID: 17509 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1407.006233][T17509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1407.017883][T17509] Call Trace: [ 1407.021205][T17509] dump_stack+0x197/0x210 [ 1407.025551][T17509] should_fail.cold+0xa/0x15 [ 1407.030231][T17509] ? fault_create_debugfs_attr+0x180/0x180 [ 1407.036052][T17509] ? ___might_sleep+0x163/0x2c0 [ 1407.041722][T17509] __should_failslab+0x121/0x190 [ 1407.046662][T17509] should_failslab+0x9/0x14 [ 1407.051175][T17509] kmem_cache_alloc+0x2aa/0x710 [ 1407.056136][T17509] ? lock_downgrade+0x920/0x920 [ 1407.060984][T17509] ? kernfs_activate+0x34/0x1f0 [ 1407.065853][T17509] __kernfs_new_node+0xf0/0x6e0 [ 1407.070697][T17509] ? __kasan_check_write+0x14/0x20 [ 1407.075832][T17509] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1407.081319][T17509] ? wait_for_completion+0x440/0x440 [ 1407.086618][T17509] ? mutex_unlock+0x1b/0x30 [ 1407.091132][T17509] ? kernfs_activate+0x192/0x1f0 [ 1407.096195][T17509] kernfs_new_node+0x96/0x120 [ 1407.100886][T17509] __kernfs_create_file+0x51/0x340 [ 1407.105994][T17509] sysfs_add_file_mode_ns+0x222/0x560 [ 1407.111380][T17509] internal_create_group+0x359/0xc40 [ 1407.116665][T17509] ? remove_files.isra.0+0x190/0x190 [ 1407.121954][T17509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1407.128179][T17509] ? kernfs_create_link+0x1cc/0x250 [ 1407.133380][T17509] internal_create_groups.part.0+0x90/0x140 [ 1407.139383][T17509] sysfs_create_groups+0x2a/0x50 [ 1407.144323][T17509] device_add+0x13b5/0x1d00 [ 1407.148826][T17509] ? dev_set_name+0xbb/0xf0 [ 1407.153320][T17509] ? uevent_show+0x370/0x370 [ 1407.157894][T17509] ? __init_waitqueue_head+0x36/0x90 [ 1407.163168][T17509] ? pm_runtime_init+0x311/0x3b0 [ 1407.168111][T17509] netdev_register_kobject+0x183/0x3b0 [ 1407.173563][T17509] register_netdevice+0x4f4/0x1020 [ 1407.178661][T17509] ? netdev_change_features+0xb0/0xb0 [ 1407.184042][T17509] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1407.188986][T17509] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1407.194083][T17509] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1407.199888][T17509] ? __f_unlock_pos+0x19/0x20 [ 1407.204563][T17509] ? tun_chr_compat_ioctl+0x30/0x30 [ 1407.209790][T17509] tun_chr_ioctl+0x2b/0x40 [ 1407.214301][T17509] do_vfs_ioctl+0x977/0x14e0 [ 1407.219076][T17509] ? compat_ioctl_preallocate+0x220/0x220 [ 1407.224875][T17509] ? __fget+0x37f/0x550 [ 1407.229028][T17509] ? ksys_dup3+0x3e0/0x3e0 [ 1407.233454][T17509] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1407.239703][T17509] ? fput_many+0x12c/0x1a0 [ 1407.244121][T17509] ? tomoyo_file_ioctl+0x23/0x30 [ 1407.249263][T17509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1407.255966][T17509] ? security_file_ioctl+0x8d/0xc0 [ 1407.261164][T17509] ksys_ioctl+0xab/0xd0 [ 1407.265511][T17509] __x64_sys_ioctl+0x73/0xb0 [ 1407.271047][T17509] do_syscall_64+0xfa/0x790 [ 1407.275545][T17509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1407.281421][T17509] RIP: 0033:0x45a919 [ 1407.285307][T17509] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1407.307332][T17509] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1407.316156][T17509] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1407.324125][T17509] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1407.332083][T17509] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1407.340474][T17509] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1407.348432][T17509] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00)\x00', 0x7302}) 08:16:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 08:16:06 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xa, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xa8, &(0x7f00000000c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x2, &(0x7f00000001c0), 0xfffffffffffffdef}, 0x70) r2 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r2, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3f, 0x5}, 0x0, 0x0, &(0x7f00000006c0)={0x3, 0x1, 0x8d2f}, &(0x7f0000000700)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x25bf583d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x4, &(0x7f0000000400)=ANY=[@ANYRESOCT=r2, @ANYRES32=0x0, @ANYRES64=0x0, @ANYRES16=r3], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x1}, 0x10, r4}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x7, 0x70, 0x7f, 0x3, 0x1, 0x8, 0x0, 0x3, 0x480, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x6, @perf_config_ext={0x0, 0xf022}, 0x1, 0x1d0, 0xfff, 0x2, 0x1ff, 0x100000, 0x89}, r5, 0x2, r0, 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r9, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r10 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r10, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000600)={r10}) sendmsg$kcm(r11, &(0x7f0000001940)={&(0x7f0000000640)=@nfc={0x27, 0x0, 0x1, 0x3}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000780)="8068ef50fcfe514700e8750df1d22734e73480441f8af367fe7018949ce8ec86919e3c1208b5d8aef63e3db3", 0x2c}], 0x1}, 0x40000) r12 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) sendmsg$kcm(r12, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) r13 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r13, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) recvmsg$kcm(r13, &(0x7f0000000500)={&(0x7f0000000580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1}, 0x0) write$cgroup_subtree(r12, 0x0, 0x4) r14 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup(r14, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) 08:16:06 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00I\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd5\x00', 0x7302}) 08:16:06 executing program 4 (fault-call:3 fault-nth:61): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 1407.887243][T17527] FAULT_INJECTION: forcing a failure. [ 1407.887243][T17527] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.900767][T17527] CPU: 0 PID: 17527 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1407.909469][T17527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1407.919531][T17527] Call Trace: [ 1407.922845][T17527] dump_stack+0x197/0x210 [ 1407.927198][T17527] should_fail.cold+0xa/0x15 [ 1407.931897][T17527] ? fault_create_debugfs_attr+0x180/0x180 [ 1407.937715][T17527] ? ___might_sleep+0x163/0x2c0 [ 1407.942615][T17527] __should_failslab+0x121/0x190 [ 1407.947581][T17527] should_failslab+0x9/0x14 [ 1407.952079][T17527] kmem_cache_alloc+0x2aa/0x710 [ 1407.957268][T17527] ? lock_downgrade+0x920/0x920 [ 1407.962204][T17527] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1407.967479][T17527] ? retint_kernel+0x2b/0x2b [ 1407.972078][T17527] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1407.977723][T17527] __kernfs_new_node+0xf0/0x6e0 [ 1407.982574][T17527] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1407.988037][T17527] ? mark_held_locks+0xa4/0xf0 [ 1407.992791][T17527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1407.998327][T17527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1408.003769][T17527] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1408.009042][T17527] ? retint_kernel+0x2b/0x2b [ 1408.013618][T17527] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1408.019257][T17527] kernfs_new_node+0x96/0x120 [ 1408.023937][T17527] __kernfs_create_file+0x51/0x340 [ 1408.029041][T17527] sysfs_add_file_mode_ns+0x222/0x560 [ 1408.034413][T17527] internal_create_group+0x359/0xc40 [ 1408.039693][T17527] ? remove_files.isra.0+0x190/0x190 [ 1408.045005][T17527] ? internal_create_groups.part.0+0x9c/0x140 [ 1408.051075][T17527] internal_create_groups.part.0+0x90/0x140 [ 1408.056973][T17527] sysfs_create_groups+0x2a/0x50 [ 1408.061902][T17527] device_add+0x13b5/0x1d00 [ 1408.066396][T17527] ? dev_set_name+0xbb/0xf0 [ 1408.071022][T17527] ? uevent_show+0x370/0x370 [ 1408.075613][T17527] ? __init_waitqueue_head+0x36/0x90 [ 1408.080917][T17527] ? pm_runtime_init+0x311/0x3b0 [ 1408.085854][T17527] netdev_register_kobject+0x183/0x3b0 [ 1408.091402][T17527] register_netdevice+0x4f4/0x1020 [ 1408.096534][T17527] ? netdev_change_features+0xb0/0xb0 [ 1408.101911][T17527] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1408.106848][T17527] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1408.111948][T17527] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1408.117770][T17527] ? __f_unlock_pos+0x19/0x20 [ 1408.122510][T17527] ? tun_chr_compat_ioctl+0x30/0x30 [ 1408.127725][T17527] tun_chr_ioctl+0x2b/0x40 [ 1408.132154][T17527] do_vfs_ioctl+0x977/0x14e0 [ 1408.137492][T17527] ? compat_ioctl_preallocate+0x220/0x220 [ 1408.145983][T17527] ? __fget+0x37f/0x550 [ 1408.150132][T17527] ? ksys_dup3+0x3e0/0x3e0 [ 1408.154540][T17527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1408.160785][T17527] ? tomoyo_file_ioctl+0x23/0x30 [ 1408.165809][T17527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1408.172032][T17527] ? security_file_ioctl+0x8d/0xc0 [ 1408.178894][T17527] ksys_ioctl+0xab/0xd0 [ 1408.183041][T17527] __x64_sys_ioctl+0x73/0xb0 [ 1408.187925][T17527] do_syscall_64+0xfa/0x790 [ 1408.193728][T17527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.199632][T17527] RIP: 0033:0x45a919 [ 1408.203602][T17527] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1408.223375][T17527] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:16:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x36, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x60, 0x9, 0x1, 0x0, 0x0, 0x7, 0x200, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffff, 0x7, @perf_bp={&(0x7f0000000100), 0xb44fcc2c19de706e}, 0x0, 0x2, 0xd10f, 0xe, 0x2, 0x0, 0x3f}, r0, 0x5, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4) [ 1408.232909][T17527] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1408.241500][T17527] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1408.249466][T17527] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1408.257439][T17527] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1408.266302][T17527] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB="850009000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b680402ffa95acb5142878584c1fdae241f51f7ff22745696f1080000000000000075a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae911be86a99ae1e60d45b8e86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef6754e0ac040f383ad9e99dc26f634fef38000000000082cad2de0b834d2f6250e6b9f118edad5e52ce30f74b01a5687a97189bcb5d43a42568c52982dcb9f21880d24cb0072b2664eaac369dfd4d1c5061752ea629684f36da98d5fc61fa0f227425d12f30431d4e21fdce9d72bdd317064600feffff8673201d2dd0eb9702c6a9069bc555d31dcf4a73c3a8b8d0fc708fc560c51953cbcafd418f73d8a17f82e9575f4f0274d0605e9c3512c9e65cd66e4d2a02248a36ce89c717d2220cf240fd70a3eb6866c29f62034f0585f97d3c2bd22dc7c47819321abee7099ef368216830ba295123eff70ae8f2e426ef4509bb9b4f1faa3a75d18d76c4bc3d6d10e73ef58e465135b03adfd16b1a8772c0166177e5bbe4a6e5b8298da084ea82ae358653628907824ffbac0827a3cda4f498ea17821ddc4d19c882711297ba9e9b3c6fb21c279cb60657c6dd8f770c0670eddc24489026c73f88a686c87352168ad326e30f30bf0cb48e4f3a6278b90000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) 08:16:07 executing program 4 (fault-call:3 fault-nth:62): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 1408.631780][T17550] FAULT_INJECTION: forcing a failure. [ 1408.631780][T17550] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.656593][T17550] CPU: 1 PID: 17550 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1408.665323][T17550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.675376][T17550] Call Trace: [ 1408.678681][T17550] dump_stack+0x197/0x210 [ 1408.683112][T17550] should_fail.cold+0xa/0x15 [ 1408.687888][T17550] ? fault_create_debugfs_attr+0x180/0x180 [ 1408.687911][T17550] ? ___might_sleep+0x163/0x2c0 [ 1408.687933][T17550] __should_failslab+0x121/0x190 [ 1408.687950][T17550] should_failslab+0x9/0x14 [ 1408.687968][T17550] kmem_cache_alloc+0x2aa/0x710 [ 1408.698644][T17550] ? lock_downgrade+0x920/0x920 [ 1408.698660][T17550] ? kernfs_activate+0x34/0x1f0 [ 1408.698684][T17550] __kernfs_new_node+0xf0/0x6e0 [ 1408.698701][T17550] ? __kasan_check_write+0x14/0x20 [ 1408.698720][T17550] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1408.698741][T17550] ? wait_for_completion+0x440/0x440 [ 1408.698764][T17550] ? mutex_unlock+0x1b/0x30 [ 1408.698780][T17550] ? kernfs_activate+0x192/0x1f0 [ 1408.698801][T17550] kernfs_new_node+0x96/0x120 [ 1408.698823][T17550] __kernfs_create_file+0x51/0x340 [ 1408.698844][T17550] sysfs_add_file_mode_ns+0x222/0x560 [ 1408.698870][T17550] internal_create_group+0x359/0xc40 [ 1408.777993][T17550] ? remove_files.isra.0+0x190/0x190 [ 1408.783419][T17550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1408.789665][T17550] ? kernfs_create_link+0x1cc/0x250 [ 1408.794962][T17550] internal_create_groups.part.0+0x90/0x140 [ 1408.800859][T17550] sysfs_create_groups+0x2a/0x50 [ 1408.805923][T17550] device_add+0x13b5/0x1d00 [ 1408.810423][T17550] ? dev_set_name+0xbb/0xf0 [ 1408.814938][T17550] ? uevent_show+0x370/0x370 [ 1408.819542][T17550] ? __init_waitqueue_head+0x36/0x90 [ 1408.824834][T17550] ? pm_runtime_init+0x311/0x3b0 [ 1408.830329][T17550] netdev_register_kobject+0x183/0x3b0 [ 1408.838509][T17550] register_netdevice+0x4f4/0x1020 [ 1408.843724][T17550] ? netdev_change_features+0xb0/0xb0 [ 1408.849145][T17550] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1408.854180][T17550] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1408.859303][T17550] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1408.865306][T17550] ? __f_unlock_pos+0x19/0x20 [ 1408.870909][T17550] ? tun_chr_compat_ioctl+0x30/0x30 [ 1408.876240][T17550] tun_chr_ioctl+0x2b/0x40 [ 1408.880674][T17550] do_vfs_ioctl+0x977/0x14e0 [ 1408.885286][T17550] ? compat_ioctl_preallocate+0x220/0x220 [ 1408.891136][T17550] ? __fget+0x37f/0x550 [ 1408.895304][T17550] ? ksys_dup3+0x3e0/0x3e0 [ 1408.899720][T17550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1408.906566][T17550] ? fput_many+0x12c/0x1a0 [ 1408.911537][T17550] ? tomoyo_file_ioctl+0x23/0x30 [ 1408.916913][T17550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1408.923350][T17550] ? security_file_ioctl+0x8d/0xc0 [ 1408.928852][T17550] ksys_ioctl+0xab/0xd0 [ 1408.932998][T17550] __x64_sys_ioctl+0x73/0xb0 [ 1408.937604][T17550] do_syscall_64+0xfa/0x790 [ 1408.942121][T17550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.948021][T17550] RIP: 0033:0x45a919 [ 1408.951920][T17550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1408.971528][T17550] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1408.979949][T17550] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1408.987923][T17550] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1408.995992][T17550] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1409.004137][T17550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1409.012202][T17550] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00*\x00', 0x7302}) 08:16:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3f, 0x5}, 0x0, 0x0, &(0x7f00000006c0)={0x3, 0x1, 0x8d2f}, &(0x7f0000000700)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x25bf583d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x14, 0x0, &(0x7f0000000280), &(0x7f0000000300)='syzkaller\x00', 0x85, 0xc, &(0x7f0000000340)=""/12, 0x40f00, 0x8, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x1, 0x1000, 0x20}, 0x10, r0, r1}, 0x78) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x36, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x11a, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r2}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000140)={r7, r3}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000200)) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r6, 0x0, 0x4) 08:16:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 08:16:08 executing program 4 (fault-call:3 fault-nth:63): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd6\x00', 0x7302}) 08:16:08 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00J\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}) [ 1409.510870][T17569] FAULT_INJECTION: forcing a failure. [ 1409.510870][T17569] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.544596][T17569] CPU: 0 PID: 17569 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1409.553328][T17569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1409.563478][T17569] Call Trace: [ 1409.566793][T17569] dump_stack+0x197/0x210 [ 1409.571141][T17569] should_fail.cold+0xa/0x15 [ 1409.575753][T17569] ? fault_create_debugfs_attr+0x180/0x180 [ 1409.581586][T17569] ? ___might_sleep+0x163/0x2c0 [ 1409.586458][T17569] __should_failslab+0x121/0x190 [ 1409.591413][T17569] should_failslab+0x9/0x14 [ 1409.595929][T17569] kmem_cache_alloc+0x2aa/0x710 [ 1409.600800][T17569] ? lock_downgrade+0x920/0x920 [ 1409.605665][T17569] ? kernfs_activate+0x34/0x1f0 [ 1409.610527][T17569] __kernfs_new_node+0xf0/0x6e0 [ 1409.615374][T17569] ? __kasan_check_write+0x14/0x20 [ 1409.620492][T17569] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1409.625954][T17569] ? wait_for_completion+0x440/0x440 [ 1409.631440][T17569] ? mutex_unlock+0x1b/0x30 [ 1409.635969][T17569] ? kernfs_activate+0x192/0x1f0 [ 1409.640933][T17569] kernfs_new_node+0x96/0x120 [ 1409.645636][T17569] __kernfs_create_file+0x51/0x340 [ 1409.650785][T17569] sysfs_add_file_mode_ns+0x222/0x560 [ 1409.656188][T17569] internal_create_group+0x359/0xc40 [ 1409.661496][T17569] ? remove_files.isra.0+0x190/0x190 [ 1409.666808][T17569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1409.673038][T17569] ? kernfs_create_link+0x1cc/0x250 [ 1409.678257][T17569] internal_create_groups.part.0+0x90/0x140 [ 1409.684163][T17569] sysfs_create_groups+0x2a/0x50 [ 1409.689106][T17569] device_add+0x13b5/0x1d00 [ 1409.693593][T17569] ? dev_set_name+0xbb/0xf0 [ 1409.698109][T17569] ? uevent_show+0x370/0x370 [ 1409.702784][T17569] ? __init_waitqueue_head+0x36/0x90 [ 1409.708074][T17569] ? pm_runtime_init+0x311/0x3b0 [ 1409.713015][T17569] netdev_register_kobject+0x183/0x3b0 [ 1409.718490][T17569] register_netdevice+0x4f4/0x1020 [ 1409.723786][T17569] ? netdev_change_features+0xb0/0xb0 [ 1409.729150][T17569] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1409.734100][T17569] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1409.739219][T17569] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1409.745054][T17569] ? __f_unlock_pos+0x19/0x20 [ 1409.749760][T17569] ? tun_chr_compat_ioctl+0x30/0x30 [ 1409.755319][T17569] tun_chr_ioctl+0x2b/0x40 [ 1409.760316][T17569] do_vfs_ioctl+0x977/0x14e0 [ 1409.765868][T17569] ? compat_ioctl_preallocate+0x220/0x220 [ 1409.771605][T17569] ? __fget+0x37f/0x550 [ 1409.775763][T17569] ? ksys_dup3+0x3e0/0x3e0 [ 1409.780793][T17569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1409.787040][T17569] ? tomoyo_file_ioctl+0x23/0x30 [ 1409.792065][T17569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1409.798327][T17569] ? security_file_ioctl+0x8d/0xc0 [ 1409.803440][T17569] ksys_ioctl+0xab/0xd0 [ 1409.807854][T17569] __x64_sys_ioctl+0x73/0xb0 [ 1409.812434][T17569] do_syscall_64+0xfa/0x790 [ 1409.816943][T17569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1409.822842][T17569] RIP: 0033:0x45a919 [ 1409.826751][T17569] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1409.847784][T17569] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:16:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00`\x00\xa0\xff\xff\xff\xff\x00'}) [ 1409.856633][T17569] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1409.865550][T17569] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1409.873529][T17569] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1409.884891][T17569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1409.892875][T17569] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:08 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r1, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r2 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r2, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r4 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r4, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r5, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r6 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r6, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r7 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r7, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r8 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r8, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r9 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r9, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x8a, &(0x7f0000002d40)=ANY=[@ANYRESHEX, @ANYRES16=r1, @ANYPTR=&(0x7f0000000bc0)=ANY=[@ANYRES16=r1, @ANYRES64=r2, @ANYRES32=r0, @ANYPTR64, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRES64]], @ANYRESHEX, @ANYRES32=0x0, @ANYBLOB="cd89d014d246a60f8a075a49a20a0781471c2f2358d28a3e90314762cad8ce6e1b0950d7cb29306354702c84e6764d073277ee9518be019c4057a0a31a7778501f8c026386078d3126da15f7622f7aa61504dc06e47750f62232d73031b750dea7811b542d8a537991cb8159fe46f84f9a27419913db35965ef392435ac0f9243974165f1f927f7b0dc654d79d9aa7f911bc9c8d18f679d9ef144248c20f32775ac28b3dcd682557c356244c1e2bd05e7d021576cd90912c", @ANYRESOCT], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x17af}, 0xca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r11 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x70, 0xa7, 0x81, 0x1, 0x1c, 0x0, 0x9, 0x4, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0xbede1f494fd8e5e4, 0x1, 0x0, 0x0, 0x100000001, 0x9, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r11, 0x4008240b, &(0x7f0000000400)={0x4, 0x70, 0x8b, 0x5, 0x9, 0x3, 0x0, 0x3, 0x10, 0x12, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000140), 0xf}, 0x1, 0x8000, 0xffffffff, 0x1, 0x2db, 0x8, 0x8}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0x3e, &(0x7f00000002c0)=r10, 0x161) sendmsg$kcm(r13, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r13, 0x0, 0x4) 08:16:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x80\x00\xa0\xff\xff\xff\xff\x00'}) 08:16:09 executing program 4 (fault-call:3 fault-nth:64): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x02\x00'}) [ 1410.239928][T17589] FAULT_INJECTION: forcing a failure. [ 1410.239928][T17589] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.254224][T17589] CPU: 1 PID: 17589 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1410.263137][T17589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.273212][T17589] Call Trace: [ 1410.276625][T17589] dump_stack+0x197/0x210 [ 1410.280999][T17589] should_fail.cold+0xa/0x15 [ 1410.285659][T17589] ? fault_create_debugfs_attr+0x180/0x180 [ 1410.291461][T17589] ? ___might_sleep+0x163/0x2c0 [ 1410.296323][T17589] __should_failslab+0x121/0x190 [ 1410.301265][T17589] should_failslab+0x9/0x14 [ 1410.305757][T17589] kmem_cache_alloc+0x2aa/0x710 [ 1410.310613][T17589] ? lock_downgrade+0x920/0x920 [ 1410.315457][T17589] ? kernfs_activate+0x34/0x1f0 [ 1410.320316][T17589] __kernfs_new_node+0xf0/0x6e0 [ 1410.331800][T17589] ? __kasan_check_write+0x14/0x20 [ 1410.336912][T17589] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1410.342365][T17589] ? wait_for_completion+0x440/0x440 [ 1410.347646][T17589] ? mutex_unlock+0x1b/0x30 [ 1410.352334][T17589] ? kernfs_activate+0x192/0x1f0 [ 1410.357704][T17589] kernfs_new_node+0x96/0x120 [ 1410.362385][T17589] __kernfs_create_file+0x51/0x340 [ 1410.367503][T17589] sysfs_add_file_mode_ns+0x222/0x560 [ 1410.373169][T17589] internal_create_group+0x359/0xc40 [ 1410.378462][T17589] ? remove_files.isra.0+0x190/0x190 [ 1410.383764][T17589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1410.390089][T17589] ? kernfs_create_link+0x1cc/0x250 [ 1410.395291][T17589] internal_create_groups.part.0+0x90/0x140 [ 1410.401234][T17589] sysfs_create_groups+0x2a/0x50 [ 1410.406175][T17589] device_add+0x13b5/0x1d00 [ 1410.410837][T17589] ? dev_set_name+0xbb/0xf0 [ 1410.415867][T17589] ? uevent_show+0x370/0x370 [ 1410.421215][T17589] ? __init_waitqueue_head+0x36/0x90 [ 1410.426995][T17589] ? pm_runtime_init+0x311/0x3b0 [ 1410.432111][T17589] netdev_register_kobject+0x183/0x3b0 [ 1410.437806][T17589] register_netdevice+0x4f4/0x1020 [ 1410.442907][T17589] ? netdev_change_features+0xb0/0xb0 [ 1410.448291][T17589] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1410.453241][T17589] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1410.458347][T17589] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1410.464169][T17589] ? __f_unlock_pos+0x19/0x20 [ 1410.468845][T17589] ? tun_chr_compat_ioctl+0x30/0x30 [ 1410.474039][T17589] tun_chr_ioctl+0x2b/0x40 [ 1410.478459][T17589] do_vfs_ioctl+0x977/0x14e0 [ 1410.483050][T17589] ? compat_ioctl_preallocate+0x220/0x220 [ 1410.488750][T17589] ? __fget+0x37f/0x550 [ 1410.492906][T17589] ? ksys_dup3+0x3e0/0x3e0 [ 1410.497352][T17589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1410.503580][T17589] ? fput_many+0x12c/0x1a0 [ 1410.508063][T17589] ? tomoyo_file_ioctl+0x23/0x30 [ 1410.512998][T17589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1410.519226][T17589] ? security_file_ioctl+0x8d/0xc0 [ 1410.524324][T17589] ksys_ioctl+0xab/0xd0 [ 1410.528492][T17589] __x64_sys_ioctl+0x73/0xb0 [ 1410.533094][T17589] do_syscall_64+0xfa/0x790 [ 1410.538185][T17589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1410.544059][T17589] RIP: 0033:0x45a919 [ 1410.547938][T17589] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1410.567544][T17589] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1410.576032][T17589] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1410.584706][T17589] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1410.593254][T17589] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1410.601234][T17589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1410.609203][T17589] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00+\x00', 0x7302}) 08:16:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r1) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x6, 0x1}, 0x0, 0x0, &(0x7f0000000400)={0x5, 0x8, 0x3b08, 0x9}, &(0x7f0000000440)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x3}}, 0x10) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r2, 0x0, 0x1c8, &(0x7f0000000800)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x40000000000006) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000280)={'ip_vti0\x00', @local}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r7) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000100)=0x8) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, 0x0, 0x4) 08:16:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x03\x00'}) 08:16:09 executing program 4 (fault-call:3 fault-nth:65): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1410.969028][T17603] FAULT_INJECTION: forcing a failure. [ 1410.969028][T17603] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.991979][T17603] CPU: 1 PID: 17603 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1411.000697][T17603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1411.013086][T17603] Call Trace: [ 1411.016368][T17603] dump_stack+0x197/0x210 [ 1411.020714][T17603] should_fail.cold+0xa/0x15 [ 1411.025299][T17603] ? fault_create_debugfs_attr+0x180/0x180 [ 1411.031099][T17603] ? ___might_sleep+0x163/0x2c0 [ 1411.036686][T17603] __should_failslab+0x121/0x190 [ 1411.041634][T17603] should_failslab+0x9/0x14 [ 1411.046573][T17603] kmem_cache_alloc+0x2aa/0x710 [ 1411.051525][T17603] ? lock_downgrade+0x920/0x920 [ 1411.056616][T17603] ? kernfs_activate+0x34/0x1f0 [ 1411.061573][T17603] __kernfs_new_node+0xf0/0x6e0 [ 1411.066424][T17603] ? __kasan_check_write+0x14/0x20 [ 1411.071909][T17603] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1411.077825][T17603] ? wait_for_completion+0x440/0x440 [ 1411.083732][T17603] ? mutex_unlock+0x1b/0x30 [ 1411.088230][T17603] ? kernfs_activate+0x192/0x1f0 [ 1411.093166][T17603] kernfs_new_node+0x96/0x120 [ 1411.097859][T17603] __kernfs_create_file+0x51/0x340 [ 1411.102970][T17603] sysfs_add_file_mode_ns+0x222/0x560 [ 1411.108367][T17603] internal_create_group+0x359/0xc40 [ 1411.113667][T17603] ? remove_files.isra.0+0x190/0x190 [ 1411.118948][T17603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1411.125285][T17603] ? kernfs_create_link+0x1cc/0x250 [ 1411.130521][T17603] internal_create_groups.part.0+0x90/0x140 [ 1411.136488][T17603] sysfs_create_groups+0x2a/0x50 [ 1411.141430][T17603] device_add+0x13b5/0x1d00 [ 1411.145934][T17603] ? dev_set_name+0xbb/0xf0 [ 1411.150524][T17603] ? uevent_show+0x370/0x370 [ 1411.155104][T17603] ? __init_waitqueue_head+0x36/0x90 [ 1411.160379][T17603] ? pm_runtime_init+0x311/0x3b0 [ 1411.165317][T17603] netdev_register_kobject+0x183/0x3b0 [ 1411.170768][T17603] register_netdevice+0x4f4/0x1020 [ 1411.175896][T17603] ? netdev_change_features+0xb0/0xb0 [ 1411.181290][T17603] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1411.186225][T17603] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1411.191469][T17603] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1411.197402][T17603] ? __f_unlock_pos+0x19/0x20 [ 1411.202081][T17603] ? tun_chr_compat_ioctl+0x30/0x30 [ 1411.207267][T17603] tun_chr_ioctl+0x2b/0x40 [ 1411.211675][T17603] do_vfs_ioctl+0x977/0x14e0 [ 1411.216260][T17603] ? compat_ioctl_preallocate+0x220/0x220 [ 1411.221964][T17603] ? __fget+0x37f/0x550 [ 1411.226107][T17603] ? ksys_dup3+0x3e0/0x3e0 [ 1411.230512][T17603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1411.236739][T17603] ? tomoyo_file_ioctl+0x23/0x30 [ 1411.241671][T17603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1411.247899][T17603] ? security_file_ioctl+0x8d/0xc0 [ 1411.253012][T17603] ksys_ioctl+0xab/0xd0 [ 1411.257220][T17603] __x64_sys_ioctl+0x73/0xb0 [ 1411.261855][T17603] do_syscall_64+0xfa/0x790 [ 1411.266363][T17603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1411.272333][T17603] RIP: 0033:0x45a919 [ 1411.276208][T17603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1411.295807][T17603] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1411.304203][T17603] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1411.312168][T17603] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1411.320126][T17603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1411.328188][T17603] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1411.336272][T17603] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd7\x00', 0x7302}) 08:16:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x18, 0x35, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/427], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc4, &(0x7f0000000400)=""/196, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x04\x00'}) 08:16:10 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00K\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:10 executing program 4 (fault-call:3 fault-nth:66): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x05\x00'}) 08:16:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002c80)={&(0x7f0000002ac0)=@can={0x1d, 0x0}, 0xfffffffffffffdba, &(0x7f0000002b80)=[{&(0x7f0000002b40)=""/59, 0x3b}], 0x1, &(0x7f0000002bc0)=""/157, 0x9d}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x36, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x7fff, 0x3}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0xec0) r2 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r2) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x7f, 0xdc, 0x1, 0x81, 0x0, 0x7fff, 0x60440, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, @perf_config_ext={0x2, 0x6}, 0x10, 0xc0cd, 0x248, 0x9, 0x12000000000000, 0xfffffffd, 0xf001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, 0x0, 0x4) [ 1411.822288][T17621] FAULT_INJECTION: forcing a failure. [ 1411.822288][T17621] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.835901][T17621] CPU: 0 PID: 17621 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1411.844693][T17621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1411.854766][T17621] Call Trace: [ 1411.858077][T17621] dump_stack+0x197/0x210 [ 1411.862871][T17621] should_fail.cold+0xa/0x15 [ 1411.867482][T17621] ? fault_create_debugfs_attr+0x180/0x180 [ 1411.873310][T17621] ? ___might_sleep+0x163/0x2c0 [ 1411.878177][T17621] __should_failslab+0x121/0x190 [ 1411.883112][T17621] should_failslab+0x9/0x14 [ 1411.887629][T17621] kmem_cache_alloc+0x2aa/0x710 [ 1411.892493][T17621] ? lock_downgrade+0x920/0x920 [ 1411.897353][T17621] ? kernfs_activate+0x34/0x1f0 [ 1411.902484][T17621] __kernfs_new_node+0xf0/0x6e0 [ 1411.907352][T17621] ? __kasan_check_write+0x14/0x20 [ 1411.912481][T17621] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1411.917957][T17621] ? wait_for_completion+0x440/0x440 [ 1411.923273][T17621] ? mutex_unlock+0x1b/0x30 [ 1411.927788][T17621] ? kernfs_activate+0x192/0x1f0 [ 1411.932743][T17621] kernfs_new_node+0x96/0x120 [ 1411.937443][T17621] __kernfs_create_file+0x51/0x340 [ 1411.942586][T17621] sysfs_add_file_mode_ns+0x222/0x560 [ 1411.947985][T17621] internal_create_group+0x359/0xc40 [ 1411.953297][T17621] ? remove_files.isra.0+0x190/0x190 [ 1411.958612][T17621] ? internal_create_groups.part.0+0x4b/0x140 [ 1411.964690][T17621] internal_create_groups.part.0+0x90/0x140 [ 1411.970582][T17621] sysfs_create_groups+0x2a/0x50 [ 1411.975513][T17621] device_add+0x13b5/0x1d00 [ 1411.980006][T17621] ? __this_cpu_preempt_check+0x35/0x190 [ 1411.985629][T17621] ? uevent_show+0x370/0x370 [ 1411.990208][T17621] ? netdev_register_kobject+0x17b/0x3b0 [ 1411.995829][T17621] netdev_register_kobject+0x183/0x3b0 [ 1412.001300][T17621] register_netdevice+0x4f4/0x1020 [ 1412.006410][T17621] ? netdev_change_features+0xb0/0xb0 [ 1412.011780][T17621] ? __tun_chr_ioctl+0x2c2c/0x3fa0 [ 1412.016878][T17621] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1412.021802][T17621] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1412.026900][T17621] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1412.032692][T17621] ? retint_kernel+0x2b/0x2b [ 1412.037279][T17621] ? tun_chr_compat_ioctl+0x30/0x30 [ 1412.042459][T17621] tun_chr_ioctl+0x2b/0x40 [ 1412.046862][T17621] do_vfs_ioctl+0x977/0x14e0 [ 1412.051438][T17621] ? compat_ioctl_preallocate+0x220/0x220 [ 1412.057149][T17621] ? __fget+0x37f/0x550 [ 1412.061292][T17621] ? ksys_dup3+0x3e0/0x3e0 [ 1412.065699][T17621] ? tomoyo_file_ioctl+0x23/0x30 [ 1412.070676][T17621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1412.076914][T17621] ? security_file_ioctl+0x8d/0xc0 [ 1412.082021][T17621] ksys_ioctl+0xab/0xd0 [ 1412.086171][T17621] __x64_sys_ioctl+0x73/0xb0 [ 1412.090752][T17621] ? do_syscall_64+0x5b/0x790 [ 1412.095439][T17621] do_syscall_64+0xfa/0x790 [ 1412.099934][T17621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1412.105814][T17621] RIP: 0033:0x45a919 [ 1412.109709][T17621] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1412.129309][T17621] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1412.137722][T17621] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1412.145681][T17621] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1412.153644][T17621] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1412.161778][T17621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1412.169848][T17621] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x06\x00'}) 08:16:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00,\x00', 0x7302}) 08:16:11 executing program 4 (fault-call:3 fault-nth:67): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\a\x00'}) 08:16:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x1000000000000002, 0x0) gettid() gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000500)='mcurrent\x00\x00\x00\x00 \x0f\x00', 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100d00, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) [ 1412.694175][T17643] FAULT_INJECTION: forcing a failure. [ 1412.694175][T17643] name failslab, interval 1, probability 0, space 0, times 0 [ 1412.708398][T17643] CPU: 0 PID: 17643 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1412.717190][T17643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1412.727378][T17643] Call Trace: [ 1412.730682][T17643] dump_stack+0x197/0x210 [ 1412.735044][T17643] should_fail.cold+0xa/0x15 [ 1412.739640][T17643] ? fault_create_debugfs_attr+0x180/0x180 [ 1412.745465][T17643] ? ___might_sleep+0x163/0x2c0 [ 1412.750353][T17643] __should_failslab+0x121/0x190 [ 1412.755299][T17643] should_failslab+0x9/0x14 [ 1412.759843][T17643] kmem_cache_alloc+0x2aa/0x710 [ 1412.764718][T17643] ? lock_downgrade+0x920/0x920 [ 1412.769585][T17643] ? kernfs_activate+0x34/0x1f0 [ 1412.774445][T17643] __kernfs_new_node+0xf0/0x6e0 [ 1412.779365][T17643] ? __kasan_check_write+0x14/0x20 [ 1412.784493][T17643] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1412.789965][T17643] ? wait_for_completion+0x440/0x440 [ 1412.795256][T17643] ? mutex_unlock+0x1b/0x30 [ 1412.799750][T17643] ? kernfs_activate+0x192/0x1f0 [ 1412.804703][T17643] kernfs_new_node+0x96/0x120 [ 1412.809497][T17643] __kernfs_create_file+0x51/0x340 [ 1412.814625][T17643] sysfs_add_file_mode_ns+0x222/0x560 [ 1412.820000][T17643] internal_create_group+0x359/0xc40 [ 1412.825299][T17643] ? remove_files.isra.0+0x190/0x190 [ 1412.830583][T17643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1412.836822][T17643] ? kernfs_create_link+0x1cc/0x250 [ 1412.842170][T17643] internal_create_groups.part.0+0x90/0x140 [ 1412.848069][T17643] sysfs_create_groups+0x2a/0x50 [ 1412.853008][T17643] device_add+0x13b5/0x1d00 [ 1412.857511][T17643] ? dev_set_name+0xbb/0xf0 [ 1412.862022][T17643] ? uevent_show+0x370/0x370 [ 1412.866599][T17643] ? __init_waitqueue_head+0x36/0x90 [ 1412.871872][T17643] ? pm_runtime_init+0x311/0x3b0 [ 1412.876812][T17643] netdev_register_kobject+0x183/0x3b0 [ 1412.882268][T17643] register_netdevice+0x4f4/0x1020 [ 1412.887365][T17643] ? netdev_change_features+0xb0/0xb0 [ 1412.892731][T17643] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1412.897680][T17643] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1412.902785][T17643] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1412.908571][T17643] ? __f_unlock_pos+0x19/0x20 [ 1412.913239][T17643] ? tun_chr_compat_ioctl+0x30/0x30 [ 1412.918437][T17643] tun_chr_ioctl+0x2b/0x40 [ 1412.922852][T17643] do_vfs_ioctl+0x977/0x14e0 [ 1412.927432][T17643] ? compat_ioctl_preallocate+0x220/0x220 [ 1412.933138][T17643] ? __fget+0x37f/0x550 [ 1412.937304][T17643] ? ksys_dup3+0x3e0/0x3e0 [ 1412.941767][T17643] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1412.948039][T17643] ? fput_many+0x12c/0x1a0 [ 1412.952457][T17643] ? tomoyo_file_ioctl+0x23/0x30 [ 1412.957394][T17643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1412.963630][T17643] ? security_file_ioctl+0x8d/0xc0 [ 1412.969246][T17643] ksys_ioctl+0xab/0xd0 [ 1412.973388][T17643] __x64_sys_ioctl+0x73/0xb0 [ 1412.977989][T17643] do_syscall_64+0xfa/0x790 [ 1412.982498][T17643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1412.988470][T17643] RIP: 0033:0x45a919 [ 1412.992350][T17643] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1413.011954][T17643] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1413.020354][T17643] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1413.028314][T17643] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1413.036284][T17643] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1413.044372][T17643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1413.052346][T17643] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 [ 1413.160671][ T27] audit: type=1804 audit(1577520972.142:79): pid=17651 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir565356715/syzkaller.Jpm23l/3024/memory.events" dev="sda1" ino=16724 res=1 08:16:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd8\x00', 0x7302}) 08:16:12 executing program 4 (fault-call:3 fault-nth:68): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00L\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) [ 1413.283191][ T27] audit: type=1804 audit(1577520972.262:80): pid=17649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir565356715/syzkaller.Jpm23l/3024/memory.events" dev="sda1" ino=16724 res=1 08:16:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\b\x00'}) [ 1413.441140][T17659] FAULT_INJECTION: forcing a failure. [ 1413.441140][T17659] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.501111][T17659] CPU: 1 PID: 17659 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1413.509938][T17659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1413.520002][T17659] Call Trace: [ 1413.523308][T17659] dump_stack+0x197/0x210 [ 1413.527664][T17659] should_fail.cold+0xa/0x15 [ 1413.532276][T17659] ? fault_create_debugfs_attr+0x180/0x180 [ 1413.538106][T17659] ? ___might_sleep+0x163/0x2c0 [ 1413.543093][T17659] __should_failslab+0x121/0x190 [ 1413.548028][T17659] should_failslab+0x9/0x14 [ 1413.552526][T17659] kmem_cache_alloc+0x2aa/0x710 [ 1413.557363][T17659] ? lock_downgrade+0x920/0x920 [ 1413.562221][T17659] ? kernfs_activate+0x34/0x1f0 [ 1413.567064][T17659] __kernfs_new_node+0xf0/0x6e0 [ 1413.572001][T17659] ? __kasan_check_write+0x14/0x20 [ 1413.577541][T17659] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1413.583000][T17659] ? wait_for_completion+0x440/0x440 [ 1413.588279][T17659] ? mutex_unlock+0x1b/0x30 [ 1413.592767][T17659] ? kernfs_activate+0x192/0x1f0 [ 1413.597695][T17659] kernfs_new_node+0x96/0x120 [ 1413.602378][T17659] __kernfs_create_file+0x51/0x340 [ 1413.607477][T17659] sysfs_add_file_mode_ns+0x222/0x560 [ 1413.612842][T17659] internal_create_group+0x359/0xc40 [ 1413.618120][T17659] ? remove_files.isra.0+0x190/0x190 [ 1413.623409][T17659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1413.629736][T17659] ? kernfs_create_link+0x1cc/0x250 [ 1413.634926][T17659] internal_create_groups.part.0+0x90/0x140 [ 1413.640821][T17659] sysfs_create_groups+0x2a/0x50 [ 1413.645754][T17659] device_add+0x13b5/0x1d00 [ 1413.650238][T17659] ? dev_set_name+0xbb/0xf0 [ 1413.654728][T17659] ? uevent_show+0x370/0x370 [ 1413.659302][T17659] ? __init_waitqueue_head+0x36/0x90 [ 1413.664571][T17659] ? pm_runtime_init+0x311/0x3b0 [ 1413.669496][T17659] netdev_register_kobject+0x183/0x3b0 [ 1413.674955][T17659] register_netdevice+0x4f4/0x1020 [ 1413.680061][T17659] ? netdev_change_features+0xb0/0xb0 [ 1413.685430][T17659] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1413.690367][T17659] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1413.695461][T17659] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1413.701249][T17659] ? __f_unlock_pos+0x19/0x20 [ 1413.705924][T17659] ? tun_chr_compat_ioctl+0x30/0x30 [ 1413.711105][T17659] tun_chr_ioctl+0x2b/0x40 [ 1413.715506][T17659] do_vfs_ioctl+0x977/0x14e0 [ 1413.720082][T17659] ? compat_ioctl_preallocate+0x220/0x220 [ 1413.725786][T17659] ? __fget+0x37f/0x550 [ 1413.730278][T17659] ? ksys_dup3+0x3e0/0x3e0 [ 1413.734680][T17659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1413.740912][T17659] ? tomoyo_file_ioctl+0x23/0x30 [ 1413.745832][T17659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1413.752056][T17659] ? security_file_ioctl+0x8d/0xc0 [ 1413.757195][T17659] ksys_ioctl+0xab/0xd0 [ 1413.761349][T17659] __x64_sys_ioctl+0x73/0xb0 [ 1413.765931][T17659] do_syscall_64+0xfa/0x790 [ 1413.770437][T17659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1413.776332][T17659] RIP: 0033:0x45a919 [ 1413.780216][T17659] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1413.799803][T17659] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1413.808196][T17659] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1413.816186][T17659] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1413.824157][T17659] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1413.832131][T17659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1413.840096][T17659] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 [ 1413.888278][ T27] audit: type=1804 audit(1577520972.872:81): pid=17652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir565356715/syzkaller.Jpm23l/3024/memory.events" dev="sda1" ino=16724 res=1 08:16:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) [ 1413.922225][ T27] audit: type=1804 audit(1577520972.902:82): pid=17671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir565356715/syzkaller.Jpm23l/3024/memory.events" dev="sda1" ino=16724 res=1 08:16:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x10\x00'}) 08:16:13 executing program 4 (fault-call:3 fault-nth:69): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x03\x00'}) [ 1414.239385][T17685] FAULT_INJECTION: forcing a failure. [ 1414.239385][T17685] name failslab, interval 1, probability 0, space 0, times 0 [ 1414.260720][T17685] CPU: 1 PID: 17685 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1414.269559][T17685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.279717][T17685] Call Trace: [ 1414.283030][T17685] dump_stack+0x197/0x210 [ 1414.287386][T17685] should_fail.cold+0xa/0x15 [ 1414.292029][T17685] ? fault_create_debugfs_attr+0x180/0x180 [ 1414.297864][T17685] ? ___might_sleep+0x163/0x2c0 [ 1414.302741][T17685] __should_failslab+0x121/0x190 [ 1414.307700][T17685] should_failslab+0x9/0x14 [ 1414.312552][T17685] kmem_cache_alloc+0x2aa/0x710 [ 1414.317391][T17685] ? lock_downgrade+0x920/0x920 [ 1414.323193][T17685] ? kernfs_activate+0x34/0x1f0 [ 1414.323217][T17685] __kernfs_new_node+0xf0/0x6e0 [ 1414.332915][T17685] ? __kasan_check_write+0x14/0x20 [ 1414.338040][T17685] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1414.343513][T17685] ? wait_for_completion+0x440/0x440 [ 1414.348819][T17685] ? mutex_unlock+0x1b/0x30 [ 1414.353342][T17685] ? kernfs_activate+0x192/0x1f0 [ 1414.358298][T17685] kernfs_new_node+0x96/0x120 [ 1414.363000][T17685] __kernfs_create_file+0x51/0x340 [ 1414.368131][T17685] sysfs_add_file_mode_ns+0x222/0x560 [ 1414.373506][T17685] internal_create_group+0x359/0xc40 [ 1414.378780][T17685] ? remove_files.isra.0+0x190/0x190 [ 1414.384051][T17685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1414.390274][T17685] ? kernfs_create_link+0x1cc/0x250 [ 1414.395459][T17685] internal_create_groups.part.0+0x90/0x140 [ 1414.401355][T17685] sysfs_create_groups+0x2a/0x50 [ 1414.406291][T17685] device_add+0x13b5/0x1d00 [ 1414.410885][T17685] ? dev_set_name+0xbb/0xf0 [ 1414.415426][T17685] ? uevent_show+0x370/0x370 [ 1414.420220][T17685] ? __init_waitqueue_head+0x36/0x90 [ 1414.425500][T17685] ? pm_runtime_init+0x311/0x3b0 [ 1414.430437][T17685] netdev_register_kobject+0x183/0x3b0 [ 1414.435892][T17685] register_netdevice+0x4f4/0x1020 [ 1414.441034][T17685] ? netdev_change_features+0xb0/0xb0 [ 1414.446456][T17685] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1414.451383][T17685] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1414.456475][T17685] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1414.462261][T17685] ? __f_unlock_pos+0x19/0x20 [ 1414.466931][T17685] ? tun_chr_compat_ioctl+0x30/0x30 [ 1414.472108][T17685] tun_chr_ioctl+0x2b/0x40 [ 1414.476531][T17685] do_vfs_ioctl+0x977/0x14e0 [ 1414.481106][T17685] ? compat_ioctl_preallocate+0x220/0x220 [ 1414.486807][T17685] ? __fget+0x37f/0x550 [ 1414.490949][T17685] ? ksys_dup3+0x3e0/0x3e0 [ 1414.495354][T17685] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1414.501625][T17685] ? fput_many+0x12c/0x1a0 [ 1414.506036][T17685] ? tomoyo_file_ioctl+0x23/0x30 [ 1414.510957][T17685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1414.517278][T17685] ? security_file_ioctl+0x8d/0xc0 [ 1414.522394][T17685] ksys_ioctl+0xab/0xd0 [ 1414.526561][T17685] __x64_sys_ioctl+0x73/0xb0 [ 1414.531150][T17685] do_syscall_64+0xfa/0x790 [ 1414.535642][T17685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1414.541529][T17685] RIP: 0033:0x45a919 [ 1414.545427][T17685] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1414.565023][T17685] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1414.573626][T17685] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1414.581596][T17685] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1414.589557][T17685] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1414.597522][T17685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1414.605615][T17685] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00-\x00', 0x7302}) 08:16:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x05\x00'}) 08:16:13 executing program 4 (fault-call:3 fault-nth:70): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xd9\x00', 0x7302}) 08:16:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x06\x00'}) [ 1415.000247][T17703] FAULT_INJECTION: forcing a failure. [ 1415.000247][T17703] name failslab, interval 1, probability 0, space 0, times 0 [ 1415.025516][T17703] CPU: 0 PID: 17703 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1415.034235][T17703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.044299][T17703] Call Trace: [ 1415.047607][T17703] dump_stack+0x197/0x210 [ 1415.051958][T17703] should_fail.cold+0xa/0x15 [ 1415.056580][T17703] ? fault_create_debugfs_attr+0x180/0x180 [ 1415.062409][T17703] ? ___might_sleep+0x163/0x2c0 [ 1415.067283][T17703] __should_failslab+0x121/0x190 [ 1415.072229][T17703] should_failslab+0x9/0x14 [ 1415.076844][T17703] kmem_cache_alloc+0x2aa/0x710 [ 1415.081695][T17703] ? lock_downgrade+0x920/0x920 [ 1415.086546][T17703] ? kernfs_activate+0x34/0x1f0 [ 1415.091419][T17703] __kernfs_new_node+0xf0/0x6e0 [ 1415.096294][T17703] ? __kasan_check_write+0x14/0x20 [ 1415.101424][T17703] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1415.106891][T17703] ? wait_for_completion+0x440/0x440 [ 1415.112271][T17703] ? mutex_unlock+0x1b/0x30 [ 1415.116771][T17703] ? kernfs_activate+0x192/0x1f0 [ 1415.121707][T17703] kernfs_new_node+0x96/0x120 [ 1415.126392][T17703] __kernfs_create_file+0x51/0x340 [ 1415.131505][T17703] sysfs_add_file_mode_ns+0x222/0x560 [ 1415.136888][T17703] internal_create_group+0x359/0xc40 [ 1415.142179][T17703] ? remove_files.isra.0+0x190/0x190 [ 1415.147472][T17703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1415.153726][T17703] ? kernfs_create_link+0x1cc/0x250 [ 1415.158951][T17703] internal_create_groups.part.0+0x90/0x140 [ 1415.164861][T17703] sysfs_create_groups+0x2a/0x50 [ 1415.169902][T17703] device_add+0x13b5/0x1d00 [ 1415.174406][T17703] ? dev_set_name+0xbb/0xf0 [ 1415.178910][T17703] ? uevent_show+0x370/0x370 [ 1415.183486][T17703] ? __init_waitqueue_head+0x36/0x90 [ 1415.188779][T17703] ? pm_runtime_init+0x311/0x3b0 [ 1415.193771][T17703] netdev_register_kobject+0x183/0x3b0 [ 1415.199282][T17703] register_netdevice+0x4f4/0x1020 [ 1415.204397][T17703] ? netdev_change_features+0xb0/0xb0 [ 1415.209793][T17703] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1415.214756][T17703] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1415.219991][T17703] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1415.225799][T17703] ? __f_unlock_pos+0x19/0x20 [ 1415.230514][T17703] ? tun_chr_compat_ioctl+0x30/0x30 [ 1415.235723][T17703] tun_chr_ioctl+0x2b/0x40 [ 1415.240149][T17703] do_vfs_ioctl+0x977/0x14e0 [ 1415.244747][T17703] ? compat_ioctl_preallocate+0x220/0x220 [ 1415.250486][T17703] ? __fget+0x37f/0x550 [ 1415.254644][T17703] ? ksys_dup3+0x3e0/0x3e0 [ 1415.259069][T17703] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1415.265315][T17703] ? fput_many+0x12c/0x1a0 [ 1415.269747][T17703] ? tomoyo_file_ioctl+0x23/0x30 [ 1415.274702][T17703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1415.280947][T17703] ? security_file_ioctl+0x8d/0xc0 [ 1415.286060][T17703] ksys_ioctl+0xab/0xd0 [ 1415.290222][T17703] __x64_sys_ioctl+0x73/0xb0 [ 1415.294829][T17703] do_syscall_64+0xfa/0x790 [ 1415.299334][T17703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1415.305217][T17703] RIP: 0033:0x45a919 [ 1415.309113][T17703] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1415.328714][T17703] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1415.337127][T17703] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1415.345112][T17703] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1415.353127][T17703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1415.361090][T17703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1415.369089][T17703] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:14 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00M\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\a\x00'}) 08:16:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:14 executing program 4 (fault-call:3 fault-nth:71): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1415.828756][T17722] FAULT_INJECTION: forcing a failure. [ 1415.828756][T17722] name failslab, interval 1, probability 0, space 0, times 0 [ 1415.846020][T17722] CPU: 1 PID: 17722 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1415.854733][T17722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.864833][T17722] Call Trace: [ 1415.868138][T17722] dump_stack+0x197/0x210 [ 1415.872496][T17722] should_fail.cold+0xa/0x15 08:16:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00?\x00'}) [ 1415.877108][T17722] ? fault_create_debugfs_attr+0x180/0x180 [ 1415.882916][T17722] ? ___might_sleep+0x163/0x2c0 [ 1415.887862][T17722] __should_failslab+0x121/0x190 [ 1415.892789][T17722] should_failslab+0x9/0x14 [ 1415.897408][T17722] kmem_cache_alloc+0x2aa/0x710 [ 1415.902949][T17722] ? lock_downgrade+0x920/0x920 [ 1415.907789][T17722] ? kernfs_activate+0x34/0x1f0 [ 1415.912643][T17722] __kernfs_new_node+0xf0/0x6e0 [ 1415.917510][T17722] ? __kasan_check_write+0x14/0x20 [ 1415.922633][T17722] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1415.928078][T17722] ? wait_for_completion+0x440/0x440 [ 1415.935347][T17722] ? mutex_unlock+0x1b/0x30 [ 1415.939836][T17722] ? kernfs_activate+0x192/0x1f0 [ 1415.944774][T17722] kernfs_new_node+0x96/0x120 [ 1415.950222][T17722] __kernfs_create_file+0x51/0x340 [ 1415.955337][T17722] sysfs_add_file_mode_ns+0x222/0x560 [ 1415.960733][T17722] internal_create_group+0x359/0xc40 [ 1415.966025][T17722] ? remove_files.isra.0+0x190/0x190 [ 1415.971306][T17722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1415.977605][T17722] ? kernfs_create_link+0x1cc/0x250 [ 1415.982986][T17722] internal_create_groups.part.0+0x90/0x140 [ 1415.988876][T17722] sysfs_create_groups+0x2a/0x50 [ 1415.993833][T17722] device_add+0x13b5/0x1d00 [ 1415.998322][T17722] ? dev_set_name+0xbb/0xf0 [ 1416.002821][T17722] ? uevent_show+0x370/0x370 [ 1416.007622][T17722] ? __init_waitqueue_head+0x36/0x90 [ 1416.012904][T17722] ? pm_runtime_init+0x311/0x3b0 [ 1416.017852][T17722] netdev_register_kobject+0x183/0x3b0 [ 1416.023297][T17722] register_netdevice+0x4f4/0x1020 [ 1416.028395][T17722] ? netdev_change_features+0xb0/0xb0 [ 1416.033763][T17722] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1416.038715][T17722] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1416.043824][T17722] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1416.049616][T17722] ? __f_unlock_pos+0x19/0x20 [ 1416.054285][T17722] ? tun_chr_compat_ioctl+0x30/0x30 [ 1416.059463][T17722] tun_chr_ioctl+0x2b/0x40 [ 1416.063866][T17722] do_vfs_ioctl+0x977/0x14e0 [ 1416.068441][T17722] ? compat_ioctl_preallocate+0x220/0x220 [ 1416.074161][T17722] ? __fget+0x37f/0x550 [ 1416.078302][T17722] ? ksys_dup3+0x3e0/0x3e0 [ 1416.082711][T17722] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1416.088944][T17722] ? fput_many+0x12c/0x1a0 [ 1416.093377][T17722] ? tomoyo_file_ioctl+0x23/0x30 [ 1416.098324][T17722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1416.104560][T17722] ? security_file_ioctl+0x8d/0xc0 [ 1416.109680][T17722] ksys_ioctl+0xab/0xd0 [ 1416.113841][T17722] __x64_sys_ioctl+0x73/0xb0 [ 1416.118436][T17722] do_syscall_64+0xfa/0x790 [ 1416.122926][T17722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1416.128799][T17722] RIP: 0033:0x45a919 [ 1416.132676][T17722] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1416.152283][T17722] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1416.160677][T17722] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1416.168727][T17722] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1416.176691][T17722] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1416.184654][T17722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1416.192632][T17722] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r3) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000140)=0x1) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00.\x00', 0x7302}) 08:16:15 executing program 4 (fault-call:3 fault-nth:72): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00@\x00'}) 08:16:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="7e74833b7eecd91ed7b41287dfe49e08c26fdd04524b09ef63bdce67acc27d9aa7b9954ead7c909ca683f225f27dba74a713f51a8c8042c15abf2ff1787c2ac90ad85f4b9c850c771ba7fa25df3ae8d6", 0x50}, {&(0x7f0000000400)="b5644767d19303b19f6c37422efe264285fa26186eb05d06dd081038aa27a2c3ffb54fbb9a14f4d7024cf858849341b7517ee3ef41801c0550f4b72b9ade7980e769953f88e6c278a8867a744935fa4c9a6359709cf1246f1ad00ef14f48c2492957f021f95959517963f72fbd701fd9d9d3c17d3b6e8f2af95e4ff943c4bdceabb52055f2b3c34ec30a5a23e4470b8d52dd9d82805dbcb4d605f7fabf6633a6f831a8e0e46d1fb5de3bb8a0a1999abbfacb06b4b5724372f640fa8b0665f9a6eeb440c286badfaca754affa72d9f3", 0xcf}, {&(0x7f0000000580)="98aa6c489dfc03905994b8b8363ce754d1127e262d12dbeaba0a7e7b251604a17276d67fdd923f0e05e108ecf7d791affda07e47e7e984eb356dcc9c92c31e3b521826f0daf7fd78529a13d2ee1cff544ce07cc6630f99a05c1009ee2156729fd441c1110be045a4e27ec972510fec56eef3aa3381363bf380d94e8473c764de84b48c5f5b7a5368d1626e11625967d7f2749a397e84f028", 0x98}], 0x3, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x1010}, 0x800) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x4) 08:16:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xda\x00', 0x7302}) [ 1416.750847][T17738] FAULT_INJECTION: forcing a failure. [ 1416.750847][T17738] name failslab, interval 1, probability 0, space 0, times 0 [ 1416.796371][T17738] CPU: 1 PID: 17738 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1416.805102][T17738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1416.815170][T17738] Call Trace: [ 1416.818476][T17738] dump_stack+0x197/0x210 [ 1416.822825][T17738] should_fail.cold+0xa/0x15 [ 1416.827445][T17738] ? fault_create_debugfs_attr+0x180/0x180 [ 1416.833272][T17738] ? ___might_sleep+0x163/0x2c0 [ 1416.838146][T17738] __should_failslab+0x121/0x190 [ 1416.843097][T17738] should_failslab+0x9/0x14 [ 1416.847684][T17738] kmem_cache_alloc+0x2aa/0x710 [ 1416.852521][T17738] ? lock_downgrade+0x920/0x920 [ 1416.857366][T17738] ? kernfs_activate+0x34/0x1f0 [ 1416.862214][T17738] __kernfs_new_node+0xf0/0x6e0 [ 1416.867048][T17738] ? __kasan_check_write+0x14/0x20 [ 1416.872143][T17738] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1416.877597][T17738] ? wait_for_completion+0x440/0x440 [ 1416.882882][T17738] ? mutex_unlock+0x1b/0x30 [ 1416.887369][T17738] ? kernfs_activate+0x192/0x1f0 [ 1416.892295][T17738] kernfs_new_node+0x96/0x120 [ 1416.896984][T17738] __kernfs_create_file+0x51/0x340 [ 1416.902097][T17738] sysfs_add_file_mode_ns+0x222/0x560 [ 1416.907458][T17738] internal_create_group+0x359/0xc40 [ 1416.912835][T17738] ? remove_files.isra.0+0x190/0x190 [ 1416.918124][T17738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1416.924428][T17738] ? kernfs_create_link+0x1cc/0x250 [ 1416.929672][T17738] internal_create_groups.part.0+0x90/0x140 [ 1416.935565][T17738] sysfs_create_groups+0x2a/0x50 [ 1416.940509][T17738] device_add+0x13b5/0x1d00 [ 1416.945011][T17738] ? dev_set_name+0xbb/0xf0 [ 1416.949628][T17738] ? uevent_show+0x370/0x370 [ 1416.954359][T17738] ? __init_waitqueue_head+0x36/0x90 [ 1416.959655][T17738] ? pm_runtime_init+0x311/0x3b0 [ 1416.964593][T17738] netdev_register_kobject+0x183/0x3b0 [ 1416.970040][T17738] register_netdevice+0x4f4/0x1020 [ 1416.975184][T17738] ? netdev_change_features+0xb0/0xb0 [ 1416.980574][T17738] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1416.985515][T17738] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1416.990613][T17738] ? __this_cpu_preempt_check+0x35/0x190 [ 1416.996242][T17738] ? retint_kernel+0x2b/0x2b [ 1417.000858][T17738] ? tun_chr_compat_ioctl+0x30/0x30 [ 1417.006074][T17738] tun_chr_ioctl+0x2b/0x40 [ 1417.010478][T17738] do_vfs_ioctl+0x977/0x14e0 [ 1417.015082][T17738] ? compat_ioctl_preallocate+0x220/0x220 [ 1417.020812][T17738] ? __fget+0x37f/0x550 [ 1417.024969][T17738] ? ksys_dup3+0x3e0/0x3e0 [ 1417.029387][T17738] ? tomoyo_file_ioctl+0x23/0x30 [ 1417.034546][T17738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1417.040810][T17738] ? security_file_ioctl+0x8d/0xc0 [ 1417.045930][T17738] ksys_ioctl+0xab/0xd0 [ 1417.050097][T17738] __x64_sys_ioctl+0x73/0xb0 [ 1417.055916][T17738] ? do_syscall_64+0x5b/0x790 [ 1417.060604][T17738] do_syscall_64+0xfa/0x790 [ 1417.065382][T17738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1417.071347][T17738] RIP: 0033:0x45a919 [ 1417.075248][T17738] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1417.097147][T17738] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1417.105591][T17738] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1417.116539][T17738] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1417.125172][T17738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1417.133422][T17738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1417.141397][T17738] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:16 executing program 4 (fault-call:3 fault-nth:73): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1417.399900][T17753] FAULT_INJECTION: forcing a failure. [ 1417.399900][T17753] name failslab, interval 1, probability 0, space 0, times 0 [ 1417.413918][T17753] CPU: 1 PID: 17753 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1417.422616][T17753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.432664][T17753] Call Trace: [ 1417.436002][T17753] dump_stack+0x197/0x210 [ 1417.440353][T17753] should_fail.cold+0xa/0x15 [ 1417.444949][T17753] ? fault_create_debugfs_attr+0x180/0x180 [ 1417.450765][T17753] ? ___might_sleep+0x163/0x2c0 [ 1417.455631][T17753] __should_failslab+0x121/0x190 [ 1417.460611][T17753] should_failslab+0x9/0x14 [ 1417.465114][T17753] kmem_cache_alloc+0x2aa/0x710 [ 1417.469991][T17753] ? lock_downgrade+0x920/0x920 [ 1417.474847][T17753] ? kernfs_activate+0x34/0x1f0 [ 1417.479728][T17753] __kernfs_new_node+0xf0/0x6e0 [ 1417.484712][T17753] ? __kasan_check_write+0x14/0x20 [ 1417.489859][T17753] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1417.495333][T17753] ? wait_for_completion+0x440/0x440 [ 1417.500637][T17753] ? mutex_unlock+0x1b/0x30 [ 1417.505138][T17753] ? kernfs_activate+0x192/0x1f0 [ 1417.510077][T17753] kernfs_new_node+0x96/0x120 [ 1417.514759][T17753] __kernfs_create_file+0x51/0x340 [ 1417.520351][T17753] sysfs_add_file_mode_ns+0x222/0x560 [ 1417.525832][T17753] internal_create_group+0x359/0xc40 [ 1417.531133][T17753] ? remove_files.isra.0+0x190/0x190 [ 1417.536426][T17753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1417.542663][T17753] ? kernfs_create_link+0x1cc/0x250 [ 1417.547904][T17753] internal_create_groups.part.0+0x90/0x140 [ 1417.553791][T17753] sysfs_create_groups+0x2a/0x50 [ 1417.558727][T17753] device_add+0x13b5/0x1d00 [ 1417.563330][T17753] ? dev_set_name+0xbb/0xf0 [ 1417.567861][T17753] ? uevent_show+0x370/0x370 [ 1417.572444][T17753] ? __init_waitqueue_head+0x36/0x90 [ 1417.577721][T17753] ? pm_runtime_init+0x311/0x3b0 [ 1417.582659][T17753] netdev_register_kobject+0x183/0x3b0 [ 1417.588105][T17753] register_netdevice+0x4f4/0x1020 [ 1417.593240][T17753] ? netdev_change_features+0xb0/0xb0 [ 1417.598615][T17753] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1417.603605][T17753] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1417.608927][T17753] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1417.614742][T17753] ? __f_unlock_pos+0x19/0x20 [ 1417.619436][T17753] ? tun_chr_compat_ioctl+0x30/0x30 [ 1417.624789][T17753] tun_chr_ioctl+0x2b/0x40 [ 1417.629212][T17753] do_vfs_ioctl+0x977/0x14e0 [ 1417.633790][T17753] ? compat_ioctl_preallocate+0x220/0x220 [ 1417.639497][T17753] ? __fget+0x37f/0x550 [ 1417.643660][T17753] ? ksys_dup3+0x3e0/0x3e0 [ 1417.648066][T17753] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1417.654317][T17753] ? fput_many+0x12c/0x1a0 [ 1417.658743][T17753] ? tomoyo_file_ioctl+0x23/0x30 [ 1417.663674][T17753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1417.669904][T17753] ? security_file_ioctl+0x8d/0xc0 [ 1417.675122][T17753] ksys_ioctl+0xab/0xd0 [ 1417.679291][T17753] __x64_sys_ioctl+0x73/0xb0 [ 1417.683873][T17753] do_syscall_64+0xfa/0x790 [ 1417.688458][T17753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1417.694342][T17753] RIP: 0033:0x45a919 [ 1417.698245][T17753] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1417.717862][T17753] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1417.726265][T17753] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1417.734332][T17753] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1417.742324][T17753] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1417.750294][T17753] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1417.758251][T17753] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00N\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\xff\x00'}) 08:16:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x600200, 0x0) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:16 executing program 4 (fault-call:3 fault-nth:74): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1418.039904][T17762] FAULT_INJECTION: forcing a failure. [ 1418.039904][T17762] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.076903][T17762] CPU: 0 PID: 17762 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 08:16:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\xa0\x00`\x00'}) [ 1418.085944][T17762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1418.096126][T17762] Call Trace: [ 1418.099433][T17762] dump_stack+0x197/0x210 [ 1418.103931][T17762] should_fail.cold+0xa/0x15 [ 1418.108544][T17762] ? fault_create_debugfs_attr+0x180/0x180 [ 1418.114371][T17762] ? ___might_sleep+0x163/0x2c0 [ 1418.119236][T17762] __should_failslab+0x121/0x190 [ 1418.124187][T17762] should_failslab+0x9/0x14 [ 1418.128682][T17762] kmem_cache_alloc+0x2aa/0x710 [ 1418.133649][T17762] ? lock_downgrade+0x920/0x920 [ 1418.138522][T17762] ? kernfs_activate+0x34/0x1f0 [ 1418.143409][T17762] __kernfs_new_node+0xf0/0x6e0 [ 1418.148419][T17762] ? __kasan_check_write+0x14/0x20 [ 1418.153552][T17762] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1418.159036][T17762] ? wait_for_completion+0x440/0x440 [ 1418.164352][T17762] ? mutex_unlock+0x1b/0x30 [ 1418.168866][T17762] ? kernfs_activate+0x192/0x1f0 [ 1418.173799][T17762] kernfs_new_node+0x96/0x120 [ 1418.178575][T17762] __kernfs_create_file+0x51/0x340 [ 1418.183954][T17762] sysfs_add_file_mode_ns+0x222/0x560 [ 1418.189353][T17762] internal_create_group+0x359/0xc40 [ 1418.194652][T17762] ? remove_files.isra.0+0x190/0x190 [ 1418.199924][T17762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1418.206155][T17762] ? kernfs_create_link+0x1cc/0x250 [ 1418.211344][T17762] internal_create_groups.part.0+0x90/0x140 [ 1418.217224][T17762] sysfs_create_groups+0x2a/0x50 [ 1418.222157][T17762] device_add+0x13b5/0x1d00 [ 1418.226673][T17762] ? dev_set_name+0xbb/0xf0 [ 1418.231300][T17762] ? uevent_show+0x370/0x370 [ 1418.235893][T17762] ? __init_waitqueue_head+0x36/0x90 [ 1418.241308][T17762] ? pm_runtime_init+0x311/0x3b0 [ 1418.246244][T17762] netdev_register_kobject+0x183/0x3b0 [ 1418.251702][T17762] register_netdevice+0x4f4/0x1020 [ 1418.257155][T17762] ? netdev_change_features+0xb0/0xb0 [ 1418.262549][T17762] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1418.267514][T17762] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1418.272630][T17762] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1418.278435][T17762] ? __f_unlock_pos+0x19/0x20 [ 1418.283124][T17762] ? tun_chr_compat_ioctl+0x30/0x30 [ 1418.288311][T17762] tun_chr_ioctl+0x2b/0x40 [ 1418.292730][T17762] do_vfs_ioctl+0x977/0x14e0 [ 1418.297324][T17762] ? compat_ioctl_preallocate+0x220/0x220 [ 1418.303059][T17762] ? __fget+0x37f/0x550 [ 1418.307205][T17762] ? ksys_dup3+0x3e0/0x3e0 [ 1418.311609][T17762] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1418.317846][T17762] ? fput_many+0x12c/0x1a0 [ 1418.322268][T17762] ? tomoyo_file_ioctl+0x23/0x30 [ 1418.327207][T17762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1418.333427][T17762] ? security_file_ioctl+0x8d/0xc0 [ 1418.338651][T17762] ksys_ioctl+0xab/0xd0 [ 1418.342814][T17762] __x64_sys_ioctl+0x73/0xb0 [ 1418.347392][T17762] do_syscall_64+0xfa/0x790 [ 1418.351895][T17762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1418.357807][T17762] RIP: 0033:0x45a919 [ 1418.361791][T17762] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1418.381384][T17762] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1418.389799][T17762] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1418.397756][T17762] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1418.405742][T17762] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1418.414216][T17762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1418.422191][T17762] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\xa0\x00\x80\x00'}) 08:16:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00/\x00', 0x7302}) 08:16:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xdb\x00', 0x7302}) 08:16:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x2e579ab5bbf241, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x01\x00'}) 08:16:17 executing program 4 (fault-call:3 fault-nth:75): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x02\x00'}) [ 1418.952626][T17788] FAULT_INJECTION: forcing a failure. [ 1418.952626][T17788] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.986499][T17788] CPU: 0 PID: 17788 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1418.995207][T17788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.005252][T17788] Call Trace: [ 1419.008544][T17788] dump_stack+0x197/0x210 [ 1419.012893][T17788] should_fail.cold+0xa/0x15 [ 1419.017509][T17788] ? fault_create_debugfs_attr+0x180/0x180 [ 1419.023321][T17788] ? ___might_sleep+0x163/0x2c0 [ 1419.028162][T17788] __should_failslab+0x121/0x190 [ 1419.033100][T17788] should_failslab+0x9/0x14 [ 1419.037588][T17788] kmem_cache_alloc+0x2aa/0x710 [ 1419.042424][T17788] ? lock_downgrade+0x920/0x920 [ 1419.047271][T17788] ? kernfs_activate+0x34/0x1f0 [ 1419.052117][T17788] __kernfs_new_node+0xf0/0x6e0 [ 1419.056982][T17788] ? __kasan_check_write+0x14/0x20 [ 1419.062085][T17788] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1419.067531][T17788] ? wait_for_completion+0x440/0x440 [ 1419.072822][T17788] ? mutex_unlock+0x1b/0x30 [ 1419.077320][T17788] ? kernfs_activate+0x192/0x1f0 [ 1419.082256][T17788] kernfs_new_node+0x96/0x120 [ 1419.086935][T17788] __kernfs_create_file+0x51/0x340 [ 1419.092033][T17788] sysfs_add_file_mode_ns+0x222/0x560 [ 1419.097398][T17788] internal_create_group+0x359/0xc40 [ 1419.102693][T17788] ? remove_files.isra.0+0x190/0x190 [ 1419.108060][T17788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1419.114297][T17788] ? kernfs_create_link+0x1cc/0x250 [ 1419.119502][T17788] internal_create_groups.part.0+0x90/0x140 [ 1419.125386][T17788] sysfs_create_groups+0x2a/0x50 [ 1419.130306][T17788] device_add+0x13b5/0x1d00 [ 1419.134791][T17788] ? dev_set_name+0xbb/0xf0 [ 1419.139278][T17788] ? uevent_show+0x370/0x370 [ 1419.143848][T17788] ? __init_waitqueue_head+0x36/0x90 [ 1419.149119][T17788] ? pm_runtime_init+0x311/0x3b0 [ 1419.154041][T17788] netdev_register_kobject+0x183/0x3b0 [ 1419.159500][T17788] register_netdevice+0x4f4/0x1020 [ 1419.164619][T17788] ? netdev_change_features+0xb0/0xb0 [ 1419.169982][T17788] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1419.174909][T17788] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1419.180059][T17788] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1419.185849][T17788] ? __f_unlock_pos+0x19/0x20 [ 1419.190529][T17788] ? tun_chr_compat_ioctl+0x30/0x30 [ 1419.195716][T17788] tun_chr_ioctl+0x2b/0x40 [ 1419.200129][T17788] do_vfs_ioctl+0x977/0x14e0 [ 1419.204744][T17788] ? compat_ioctl_preallocate+0x220/0x220 [ 1419.210457][T17788] ? __fget+0x37f/0x550 [ 1419.214774][T17788] ? ksys_dup3+0x3e0/0x3e0 [ 1419.219194][T17788] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1419.225423][T17788] ? tomoyo_file_ioctl+0x23/0x30 [ 1419.230349][T17788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1419.236626][T17788] ? security_file_ioctl+0x8d/0xc0 [ 1419.241744][T17788] ksys_ioctl+0xab/0xd0 [ 1419.245893][T17788] __x64_sys_ioctl+0x73/0xb0 [ 1419.250475][T17788] do_syscall_64+0xfa/0x790 [ 1419.255488][T17788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.261378][T17788] RIP: 0033:0x45a919 [ 1419.265255][T17788] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1419.284842][T17788] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1419.293247][T17788] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1419.301215][T17788] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1419.309177][T17788] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1419.317145][T17788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1419.325100][T17788] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:18 executing program 4 (fault-call:3 fault-nth:76): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xdc\x00', 0x7302}) 08:16:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x03\x00'}) 08:16:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00O\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000380)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) [ 1419.834342][T17806] FAULT_INJECTION: forcing a failure. [ 1419.834342][T17806] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.866162][T17806] CPU: 0 PID: 17806 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1419.874902][T17806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.884983][T17806] Call Trace: [ 1419.888282][T17806] dump_stack+0x197/0x210 [ 1419.892608][T17806] should_fail.cold+0xa/0x15 [ 1419.897195][T17806] ? fault_create_debugfs_attr+0x180/0x180 [ 1419.903165][T17806] ? ___might_sleep+0x163/0x2c0 [ 1419.908110][T17806] __should_failslab+0x121/0x190 [ 1419.913820][T17806] should_failslab+0x9/0x14 [ 1419.918311][T17806] kmem_cache_alloc+0x2aa/0x710 [ 1419.923241][T17806] __kernfs_new_node+0xf0/0x6e0 [ 1419.928098][T17806] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1419.933543][T17806] ? kernfs_find_and_get_ns+0x5a/0x70 [ 1419.938947][T17806] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1419.944671][T17806] ? map_id_range_down+0x1ee/0x370 [ 1419.949797][T17806] ? __put_user_ns+0x70/0x70 [ 1419.954408][T17806] ? mutex_trylock+0x2f0/0x2f0 [ 1419.959206][T17806] kernfs_new_node+0x96/0x120 [ 1419.963878][T17806] __kernfs_create_file+0x51/0x340 [ 1419.968990][T17806] sysfs_add_file_mode_ns+0x222/0x560 [ 1419.974368][T17806] sysfs_merge_group+0x1a0/0x340 [ 1419.979305][T17806] ? sysfs_init_fs_context+0x370/0x370 [ 1419.984749][T17806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1419.990994][T17806] ? kernfs_create_link+0x1cc/0x250 [ 1419.996192][T17806] dpm_sysfs_add+0x257/0x2a0 [ 1420.000766][T17806] device_add+0x9cb/0x1d00 [ 1420.005181][T17806] ? dev_set_name+0xbb/0xf0 [ 1420.009672][T17806] ? uevent_show+0x370/0x370 [ 1420.014243][T17806] ? __init_waitqueue_head+0x36/0x90 [ 1420.019520][T17806] ? pm_runtime_init+0x311/0x3b0 [ 1420.024465][T17806] netdev_register_kobject+0x183/0x3b0 [ 1420.029914][T17806] register_netdevice+0x4f4/0x1020 [ 1420.035021][T17806] ? netdev_change_features+0xb0/0xb0 [ 1420.040389][T17806] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1420.045328][T17806] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1420.050422][T17806] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1420.056222][T17806] ? __f_unlock_pos+0x19/0x20 [ 1420.060891][T17806] ? tun_chr_compat_ioctl+0x30/0x30 [ 1420.066098][T17806] tun_chr_ioctl+0x2b/0x40 [ 1420.070529][T17806] do_vfs_ioctl+0x977/0x14e0 [ 1420.075126][T17806] ? compat_ioctl_preallocate+0x220/0x220 [ 1420.080849][T17806] ? __fget+0x37f/0x550 [ 1420.085001][T17806] ? ksys_dup3+0x3e0/0x3e0 [ 1420.089404][T17806] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1420.095646][T17806] ? fput_many+0x12c/0x1a0 [ 1420.100054][T17806] ? tomoyo_file_ioctl+0x23/0x30 [ 1420.104979][T17806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1420.111302][T17806] ? security_file_ioctl+0x8d/0xc0 [ 1420.116513][T17806] ksys_ioctl+0xab/0xd0 [ 1420.120662][T17806] __x64_sys_ioctl+0x73/0xb0 [ 1420.125246][T17806] do_syscall_64+0xfa/0x790 [ 1420.129741][T17806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1420.135620][T17806] RIP: 0033:0x45a919 [ 1420.140455][T17806] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1420.160146][T17806] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1420.168546][T17806] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1420.176503][T17806] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1420.184460][T17806] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:16:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x04\x00'}) [ 1420.192415][T17806] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1420.200390][T17806] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x000\x00', 0x7302}) 08:16:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x05\x00'}) 08:16:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(r0, &(0x7f0000000400)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000440)={r4, r5}) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) r6 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r6, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r7 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r7, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000480)={r7}) r8 = socket$kcm(0x29, 0x1, 0x0) recvmsg$kcm(r8, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000b00)=""/222, 0xde}], 0x1, &(0x7f0000000740)=""/152, 0x98}, 0x40010040) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r9, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r9) 08:16:19 executing program 4 (fault-call:3 fault-nth:77): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x06\x00'}) [ 1420.822340][T17829] FAULT_INJECTION: forcing a failure. [ 1420.822340][T17829] name failslab, interval 1, probability 0, space 0, times 0 [ 1420.835802][T17829] CPU: 0 PID: 17829 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1420.844486][T17829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1420.854533][T17829] Call Trace: [ 1420.858358][T17829] dump_stack+0x197/0x210 [ 1420.862708][T17829] should_fail.cold+0xa/0x15 [ 1420.867309][T17829] ? fault_create_debugfs_attr+0x180/0x180 [ 1420.873107][T17829] ? ___might_sleep+0x163/0x2c0 [ 1420.877975][T17829] __should_failslab+0x121/0x190 [ 1420.882930][T17829] should_failslab+0x9/0x14 [ 1420.887443][T17829] kmem_cache_alloc+0x2aa/0x710 [ 1420.892293][T17829] ? lock_downgrade+0x920/0x920 [ 1420.897228][T17829] ? kernfs_activate+0x34/0x1f0 [ 1420.902103][T17829] __kernfs_new_node+0xf0/0x6e0 [ 1420.906954][T17829] ? __kasan_check_write+0x14/0x20 [ 1420.912055][T17829] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1420.917516][T17829] ? wait_for_completion+0x440/0x440 [ 1420.922832][T17829] ? mutex_unlock+0x1b/0x30 [ 1420.927328][T17829] ? kernfs_activate+0x192/0x1f0 [ 1420.932261][T17829] kernfs_new_node+0x96/0x120 [ 1420.936947][T17829] __kernfs_create_file+0x51/0x340 [ 1420.942073][T17829] sysfs_add_file_mode_ns+0x222/0x560 [ 1420.947467][T17829] internal_create_group+0x359/0xc40 [ 1420.952789][T17829] ? remove_files.isra.0+0x190/0x190 [ 1420.958095][T17829] ? internal_create_group+0x69b/0xc40 [ 1420.963555][T17829] internal_create_groups.part.0+0x90/0x140 [ 1420.969459][T17829] sysfs_create_groups+0x2a/0x50 [ 1420.974500][T17829] device_add+0x13b5/0x1d00 [ 1420.979012][T17829] ? dev_set_name+0xbb/0xf0 [ 1420.983518][T17829] ? uevent_show+0x370/0x370 [ 1420.988094][T17829] ? __init_waitqueue_head+0x36/0x90 [ 1420.993366][T17829] ? pm_runtime_init+0x311/0x3b0 [ 1420.998305][T17829] netdev_register_kobject+0x183/0x3b0 [ 1421.003761][T17829] ? netdev_register_kobject+0x1/0x3b0 [ 1421.009223][T17829] register_netdevice+0x4f4/0x1020 [ 1421.014327][T17829] ? netdev_change_features+0xb0/0xb0 [ 1421.019725][T17829] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1421.024691][T17829] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1421.029830][T17829] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1421.035661][T17829] ? retint_kernel+0x2b/0x2b [ 1421.040279][T17829] ? tun_chr_compat_ioctl+0x30/0x30 [ 1421.045489][T17829] tun_chr_ioctl+0x2b/0x40 [ 1421.049912][T17829] do_vfs_ioctl+0x977/0x14e0 [ 1421.054555][T17829] ? compat_ioctl_preallocate+0x220/0x220 [ 1421.060296][T17829] ? ksys_dup3+0x3e0/0x3e0 [ 1421.064830][T17829] ? tomoyo_file_ioctl+0x23/0x30 [ 1421.069880][T17829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1421.076298][T17829] ? security_file_ioctl+0x8d/0xc0 [ 1421.081428][T17829] ksys_ioctl+0xab/0xd0 [ 1421.085588][T17829] __x64_sys_ioctl+0x73/0xb0 [ 1421.090170][T17829] ? do_syscall_64+0x5b/0x790 [ 1421.094853][T17829] do_syscall_64+0xfa/0x790 [ 1421.099462][T17829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1421.105361][T17829] RIP: 0033:0x45a919 [ 1421.109252][T17829] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1421.128846][T17829] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1421.137290][T17829] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1421.145279][T17829] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1421.153249][T17829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1421.161219][T17829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1421.169201][T17829] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r0, &(0x7f0000000580)="c766fcb322679c008e6911d17961b227e7a47635d1280fab02c9a9e089acd611be6c05a51150a335244279ecfcbe3a74585ff0e04a33824509d773899ba96d21e6971dacb7557ae53ab8bb30160f40247827cd14fe6fcb7a5d91ce", &(0x7f0000000c00)=""/158}, 0x20) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r4 = socket$kcm(0x2, 0x3, 0x84) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000f00)) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000ec0)=0x2) sendmsg$inet(r4, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f0000000e80)={&(0x7f0000000cc0)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x3, 0x1}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000600)="d2bc37c4682006e6ba8198", 0xb}, {&(0x7f0000000d40)="eb4fc87a9b54a7685ea2673f9f436d2ef39cce2268c9c72b0ee1b43ff5d935e1ca149190d0446e0945e277ec05e210956a2105e8a71ad722af4f1a87a776ab682f54b104c9f462929d612d55558bb5ff4fa6c0510c73525c25fbd57cea94016209b8043b0ac0fbf411d5ca750d053722945983", 0x73}, {&(0x7f0000000dc0)="924296dcc7efb82ffe938d6df2d7d52d5931fa2a476646017f463b687de57ea804cd93ec6b956ab6988eab780ae6e881a0d8c5ea0cfae42a883427b7471053a9", 0x40}, {&(0x7f0000000e00)="7480d3cbbb6776b494a80041585ed51a", 0x10}], 0x4}, 0x80) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r7, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r7, 0x15, 0x1, 0x4, 0x0, 0xfffffffffffffeb2}, 0x35e4ed281d171825) r8 = perf_event_open$cgroup(&(0x7f0000000780)={0x0, 0x70, 0x1, 0x3, 0x0, 0x20, 0x0, 0xfffffffffffffff7, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000740), 0x5}, 0x80, 0x6, 0x0, 0x6, 0x0, 0xff, 0x8}, r7, 0x2, 0xffffffffffffffff, 0x4) perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x1f, 0x7, 0x5, 0x0, 0x2, 0x100000, 0x452f0df672bb9efe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x1, 0x400, 0x3ff, 0x9, 0x0, 0x0, 0x5}, r6, 0x1, r8, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r5, r6, 0x0, 0x1, &(0x7f0000000400)='\x00'}, 0x30) perf_event_open(&(0x7f0000000f80)={0x1, 0x70, 0x2, 0x1, 0x0, 0x2, 0x0, 0x6, 0x100, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000f40), 0x2}, 0x10090, 0x3, 0xfffffff8, 0x2, 0x9, 0x1, 0x1}, r5, 0x8, 0xffffffffffffffff, 0xf) sendmsg(r3, &(0x7f00000004c0)={&(0x7f0000000100)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)="2aaca852c5c368", 0x7}, {&(0x7f0000000280)="719343b1518865c6dc47727d2504bb4a7937c538555ec14e6321423bc27e", 0x1e}, {&(0x7f0000000300)="cbe8922e23d132aab6cde3d36a2aaabfdb32ba4b00b60e56d8987a727baa7b71d8599df396085b69c75aeff17ab135", 0x2f}, {&(0x7f0000000400)="1e57483165746726a5fcc0504b12448fdd73310b7a9fbc672dbb098a51aa76870572ef1dd815a393009399ae3295472d14e760579fd23529ef1783ced1faf7be4e197eab78827cf834b7dba2078b85bc3585a91ebb62ee1ba270778f599fa26a68d0b412fff20c1b7e53cb40ae95f342370479070e0396cfc1e4f9bf5fb8b11f249252", 0x83}], 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3e8}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r9, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r9, 0x2402, 0xfa) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x001\x00', 0x7302}) 08:16:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xdd\x00', 0x7302}) 08:16:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\a\x00'}) 08:16:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00P\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:20 executing program 4 (fault-call:3 fault-nth:78): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\b\x00'}) 08:16:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xf5, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0xffffffff, 0x0, 0x5, 0x201, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000400)="8ab7a8e9db4e1ece6e299dfde8ae9ad3d155e7c8ba100cbb100058c9107c5ee18066e24982a4aa456a06135423b79e4c571f61c792e2b2bb080ade95b5e84ddbb7da9ba45034876ddde5cc7b0181432a6395b2739d3c480e1acac9837b20752e55c0d631500692159da71779d9e0ee22172e92c11c2367394175528f9ea811f845d9877d9461f3e7935fe4f1a261a5132e405c444aecf11dca30663f6ccb31304730158c94f06cda897b7aabc545fe5813db21e62995822cb9f31bed5d7a6d4780824f87854137ea74099d6d3caf67d9b3b0a054", &(0x7f0000000580)=""/176, 0x6}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r2, &(0x7f0000000500)={&(0x7f0000000300)=@nl=@kern={0x10, 0x0, 0x0, 0x40020}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000000200)="cb50e4c40edf1d3179721fdcdf79497c8cc55e37e60d743a85fe8378432d2044d102bbddf3a9", 0x26}], 0x2, &(0x7f0000001800)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0xa5}}, @timestamping={{0x14, 0x1, 0x25, 0x28}}], 0x48}, 0x44c10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) openat$cgroup_type(r6, &(0x7f0000001bc0)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, 0x0, 0x4) r7 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r7, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0x10}], 0x1, 0x0, 0xffffffbe}, 0x800) recvmsg(r7, &(0x7f0000001b80)={&(0x7f0000001880)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001900)=""/33, 0x21}, {&(0x7f0000001940)=""/197, 0xc5}], 0x2, &(0x7f0000001a80)=""/206, 0xce}, 0x0) [ 1421.801507][T17858] FAULT_INJECTION: forcing a failure. [ 1421.801507][T17858] name failslab, interval 1, probability 0, space 0, times 0 [ 1421.821891][T17858] CPU: 1 PID: 17858 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1421.830607][T17858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1421.840909][T17858] Call Trace: [ 1421.844266][T17858] dump_stack+0x197/0x210 [ 1421.848590][T17858] should_fail.cold+0xa/0x15 [ 1421.853169][T17858] ? fault_create_debugfs_attr+0x180/0x180 [ 1421.859097][T17858] ? ___might_sleep+0x163/0x2c0 [ 1421.863947][T17858] __should_failslab+0x121/0x190 [ 1421.868873][T17858] should_failslab+0x9/0x14 [ 1421.873382][T17858] kmem_cache_alloc+0x2aa/0x710 [ 1421.878216][T17858] ? lock_downgrade+0x920/0x920 [ 1421.883051][T17858] ? kernfs_activate+0x34/0x1f0 [ 1421.887912][T17858] __kernfs_new_node+0xf0/0x6e0 [ 1421.892782][T17858] ? __kasan_check_write+0x14/0x20 [ 1421.897923][T17858] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1421.903407][T17858] ? wait_for_completion+0x440/0x440 [ 1421.908742][T17858] ? mutex_unlock+0x1b/0x30 [ 1421.913243][T17858] ? kernfs_activate+0x192/0x1f0 [ 1421.918375][T17858] kernfs_new_node+0x96/0x120 [ 1421.923052][T17858] __kernfs_create_file+0x51/0x340 [ 1421.928208][T17858] sysfs_add_file_mode_ns+0x222/0x560 [ 1421.933607][T17858] internal_create_group+0x359/0xc40 [ 1421.938901][T17858] ? remove_files.isra.0+0x190/0x190 [ 1421.944194][T17858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1421.950538][T17858] ? kernfs_create_link+0x1cc/0x250 [ 1421.955733][T17858] internal_create_groups.part.0+0x90/0x140 [ 1421.961628][T17858] sysfs_create_groups+0x2a/0x50 [ 1421.966856][T17858] device_add+0x13b5/0x1d00 [ 1421.971446][T17858] ? dev_set_name+0xbb/0xf0 [ 1421.976506][T17858] ? uevent_show+0x370/0x370 [ 1421.981300][T17858] ? __init_waitqueue_head+0x36/0x90 [ 1421.986584][T17858] ? pm_runtime_init+0x311/0x3b0 [ 1421.991539][T17858] netdev_register_kobject+0x183/0x3b0 [ 1421.996991][T17858] register_netdevice+0x4f4/0x1020 [ 1422.002154][T17858] ? netdev_change_features+0xb0/0xb0 [ 1422.007528][T17858] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1422.012739][T17858] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1422.017854][T17858] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1422.023658][T17858] ? __f_unlock_pos+0x19/0x20 [ 1422.028343][T17858] ? tun_chr_compat_ioctl+0x30/0x30 [ 1422.033529][T17858] tun_chr_ioctl+0x2b/0x40 [ 1422.037950][T17858] do_vfs_ioctl+0x977/0x14e0 [ 1422.042539][T17858] ? compat_ioctl_preallocate+0x220/0x220 [ 1422.048245][T17858] ? __fget+0x37f/0x550 [ 1422.052388][T17858] ? ksys_dup3+0x3e0/0x3e0 [ 1422.056813][T17858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1422.063055][T17858] ? tomoyo_file_ioctl+0x23/0x30 [ 1422.068011][T17858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.074614][T17858] ? security_file_ioctl+0x8d/0xc0 [ 1422.079721][T17858] ksys_ioctl+0xab/0xd0 [ 1422.083873][T17858] __x64_sys_ioctl+0x73/0xb0 [ 1422.088460][T17858] do_syscall_64+0xfa/0x790 [ 1422.092984][T17858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1422.098869][T17858] RIP: 0033:0x45a919 [ 1422.102761][T17858] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1422.122370][T17858] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1422.130771][T17858] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1422.138746][T17858] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 08:16:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x10\x00'}) [ 1422.146702][T17858] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1422.154657][T17858] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1422.162699][T17858] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:21 executing program 4 (fault-call:3 fault-nth:79): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x002\x00', 0x7302}) 08:16:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00?\x00'}) [ 1422.490133][T17871] FAULT_INJECTION: forcing a failure. [ 1422.490133][T17871] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.504062][T17871] CPU: 1 PID: 17871 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1422.512778][T17871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1422.522851][T17871] Call Trace: [ 1422.526171][T17871] dump_stack+0x197/0x210 [ 1422.530530][T17871] should_fail.cold+0xa/0x15 [ 1422.535153][T17871] ? fault_create_debugfs_attr+0x180/0x180 [ 1422.540987][T17871] ? ___might_sleep+0x163/0x2c0 [ 1422.545864][T17871] __should_failslab+0x121/0x190 [ 1422.550840][T17871] should_failslab+0x9/0x14 [ 1422.555363][T17871] kmem_cache_alloc+0x2aa/0x710 [ 1422.560249][T17871] __kernfs_new_node+0xf0/0x6e0 [ 1422.565135][T17871] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1422.570737][T17871] ? kernfs_find_and_get_ns+0x5a/0x70 [ 1422.576214][T17871] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1422.581945][T17871] ? map_id_range_down+0x1ee/0x370 [ 1422.587055][T17871] ? __put_user_ns+0x70/0x70 [ 1422.591637][T17871] ? mutex_trylock+0x2f0/0x2f0 [ 1422.596411][T17871] kernfs_new_node+0x96/0x120 [ 1422.601085][T17871] __kernfs_create_file+0x51/0x340 [ 1422.606189][T17871] sysfs_add_file_mode_ns+0x222/0x560 [ 1422.611554][T17871] sysfs_merge_group+0x1a0/0x340 [ 1422.616569][T17871] ? sysfs_init_fs_context+0x370/0x370 [ 1422.622037][T17871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.628273][T17871] ? kernfs_create_link+0x1cc/0x250 [ 1422.633475][T17871] dpm_sysfs_add+0x257/0x2a0 [ 1422.638053][T17871] device_add+0x9cb/0x1d00 [ 1422.642457][T17871] ? dev_set_name+0xbb/0xf0 [ 1422.646952][T17871] ? uevent_show+0x370/0x370 [ 1422.652131][T17871] ? __init_waitqueue_head+0x36/0x90 [ 1422.657416][T17871] ? pm_runtime_init+0x311/0x3b0 [ 1422.662346][T17871] netdev_register_kobject+0x183/0x3b0 [ 1422.667802][T17871] register_netdevice+0x4f4/0x1020 [ 1422.672904][T17871] ? netdev_change_features+0xb0/0xb0 [ 1422.678270][T17871] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1422.683206][T17871] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1422.688305][T17871] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1422.694099][T17871] ? __f_unlock_pos+0x19/0x20 [ 1422.698774][T17871] ? tun_chr_compat_ioctl+0x30/0x30 [ 1422.703956][T17871] tun_chr_ioctl+0x2b/0x40 [ 1422.708367][T17871] do_vfs_ioctl+0x977/0x14e0 [ 1422.712953][T17871] ? compat_ioctl_preallocate+0x220/0x220 [ 1422.718655][T17871] ? __fget+0x37f/0x550 [ 1422.722807][T17871] ? ksys_dup3+0x3e0/0x3e0 [ 1422.727223][T17871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1422.733462][T17871] ? tomoyo_file_ioctl+0x23/0x30 [ 1422.738384][T17871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.744606][T17871] ? security_file_ioctl+0x8d/0xc0 [ 1422.750048][T17871] ksys_ioctl+0xab/0xd0 [ 1422.754192][T17871] __x64_sys_ioctl+0x73/0xb0 [ 1422.758772][T17871] do_syscall_64+0xfa/0x790 [ 1422.763265][T17871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1422.769138][T17871] RIP: 0033:0x45a919 [ 1422.773021][T17871] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1422.792607][T17871] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1422.801001][T17871] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1422.808956][T17871] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1422.816921][T17871] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1422.824877][T17871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1422.832845][T17871] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00@\x00'}) 08:16:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xde\x00', 0x7302}) 08:16:22 executing program 4 (fault-call:3 fault-nth:80): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1423.221866][T17887] FAULT_INJECTION: forcing a failure. [ 1423.221866][T17887] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.257476][T17887] CPU: 1 PID: 17887 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1423.266194][T17887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1423.276258][T17887] Call Trace: [ 1423.279656][T17887] dump_stack+0x197/0x210 [ 1423.284042][T17887] should_fail.cold+0xa/0x15 [ 1423.288646][T17887] ? fault_create_debugfs_attr+0x180/0x180 [ 1423.294446][T17887] ? ___might_sleep+0x163/0x2c0 [ 1423.299303][T17887] __should_failslab+0x121/0x190 [ 1423.304226][T17887] should_failslab+0x9/0x14 [ 1423.309173][T17887] kmem_cache_alloc+0x2aa/0x710 [ 1423.314629][T17887] __kernfs_new_node+0xf0/0x6e0 [ 1423.319468][T17887] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1423.324923][T17887] ? kernfs_find_and_get_ns+0x5a/0x70 [ 1423.330291][T17887] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1423.335994][T17887] ? map_id_range_down+0x1ee/0x370 [ 1423.341094][T17887] ? __put_user_ns+0x70/0x70 [ 1423.345671][T17887] ? mutex_trylock+0x2f0/0x2f0 [ 1423.350424][T17887] kernfs_new_node+0x96/0x120 [ 1423.355090][T17887] __kernfs_create_file+0x51/0x340 [ 1423.360201][T17887] sysfs_add_file_mode_ns+0x222/0x560 [ 1423.365562][T17887] sysfs_merge_group+0x1a0/0x340 [ 1423.370482][T17887] ? sysfs_init_fs_context+0x370/0x370 [ 1423.375930][T17887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1423.382156][T17887] ? kernfs_create_link+0x1cc/0x250 [ 1423.387359][T17887] dpm_sysfs_add+0x257/0x2a0 [ 1423.391932][T17887] device_add+0x9cb/0x1d00 [ 1423.396326][T17887] ? dev_set_name+0xbb/0xf0 [ 1423.400813][T17887] ? uevent_show+0x370/0x370 [ 1423.405391][T17887] ? __init_waitqueue_head+0x36/0x90 [ 1423.410661][T17887] ? pm_runtime_init+0x311/0x3b0 [ 1423.415582][T17887] netdev_register_kobject+0x183/0x3b0 [ 1423.421035][T17887] register_netdevice+0x4f4/0x1020 [ 1423.426148][T17887] ? netdev_change_features+0xb0/0xb0 [ 1423.431532][T17887] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1423.436456][T17887] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1423.441552][T17887] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1423.447341][T17887] ? __f_unlock_pos+0x19/0x20 [ 1423.452010][T17887] ? tun_chr_compat_ioctl+0x30/0x30 [ 1423.457194][T17887] tun_chr_ioctl+0x2b/0x40 [ 1423.462212][T17887] do_vfs_ioctl+0x977/0x14e0 [ 1423.466805][T17887] ? compat_ioctl_preallocate+0x220/0x220 [ 1423.472533][T17887] ? __fget+0x37f/0x550 [ 1423.476688][T17887] ? ksys_dup3+0x3e0/0x3e0 [ 1423.481089][T17887] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1423.487327][T17887] ? fput_many+0x12c/0x1a0 [ 1423.491756][T17887] ? tomoyo_file_ioctl+0x23/0x30 [ 1423.496701][T17887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1423.502929][T17887] ? security_file_ioctl+0x8d/0xc0 [ 1423.508029][T17887] ksys_ioctl+0xab/0xd0 [ 1423.512187][T17887] __x64_sys_ioctl+0x73/0xb0 [ 1423.516779][T17887] do_syscall_64+0xfa/0x790 [ 1423.521272][T17887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1423.527173][T17887] RIP: 0033:0x45a919 [ 1423.531056][T17887] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1423.550950][T17887] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1423.559361][T17887] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1423.567333][T17887] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1423.575297][T17887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1423.583270][T17887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1423.591228][T17887] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00`\x00\xa0\x00'}) 08:16:22 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00Q\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:22 executing program 4 (fault-call:3 fault-nth:81): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x80\x00\xa0\x00'}) 08:16:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce7587b1229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0be11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef38000000000079ab1e0ec0601205ebabcf51104192746f059b05220baed67a08f2f50b94dc0c6c5558cedb21b3cabc3f92cc0b578c40b28e3103eb2d8d5b8742dea6fb5269d8d2cc73edb790481b05d5602c6ff2f24d6a1a90b99ab0cecec0127e4bbfba87254011a9aaafe883dec3db0ace3b9f5dfa561a7f5da947d5664fa0a1672264c382fc2c7330409efd938fedcd1ce5bda9d8f9d64e9b3e4e7a3460877e901b2ebc7da5e13d1ad4438f34fb399ae7379241cc0771fab65e85c3b687b0e249819878d72678a468106afe09861b10b0293ac4c0d98e2a8dcd38a706bda576de4ab4ffd63fbea2bdff71d05ddffdea99cfa47c0c61249ad7d6dc3fd9042bc6acaefbc9e0fe863c22c936a22679b9d46ea791792dd35d6c8e2b1ad26598a63f9f6113c68ea063c739e3ce5b91867c001214392d65847a9f8dd0e49b55c6da31465c16b99a5798363d8f7a7e0453699c1895ed95eb1b2fa1efdd133ebb8132ebacd9bb68c9a61ee8d7b68425779d0b170b01bf1464eb6731e6efa510ab03f717f6b20b978497cf36370a1ff9d5039cf7dfca45d556d3d4610dc988e544d5d3d7f3912acae140c08d2505283b71e1f67c83bcf31db4779af37fa492963c71fd21f1b675b7ecde70"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) 08:16:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x003\x00', 0x7302}) 08:16:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\xff\x00'}) [ 1424.102961][T17903] FAULT_INJECTION: forcing a failure. [ 1424.102961][T17903] name failslab, interval 1, probability 0, space 0, times 0 [ 1424.137735][T17903] CPU: 0 PID: 17903 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1424.146463][T17903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1424.156527][T17903] Call Trace: [ 1424.160007][T17903] dump_stack+0x197/0x210 [ 1424.164360][T17903] should_fail.cold+0xa/0x15 [ 1424.168995][T17903] ? fault_create_debugfs_attr+0x180/0x180 [ 1424.174810][T17903] ? ___might_sleep+0x163/0x2c0 [ 1424.179677][T17903] __should_failslab+0x121/0x190 [ 1424.184690][T17903] should_failslab+0x9/0x14 [ 1424.189213][T17903] kmem_cache_alloc_trace+0x2d3/0x790 [ 1424.194598][T17903] ? dev_uevent_name+0x9b/0xf0 [ 1424.199381][T17903] ? dev_uevent_name+0xb5/0xf0 [ 1424.204171][T17903] kobject_uevent_env+0x387/0x10a6 [ 1424.209317][T17903] kobject_uevent+0x20/0x26 [ 1424.213841][T17903] device_add+0xac4/0x1d00 [ 1424.218270][T17903] ? dev_set_name+0xbb/0xf0 [ 1424.222785][T17903] ? uevent_show+0x370/0x370 [ 1424.227361][T17903] ? __init_waitqueue_head+0x36/0x90 [ 1424.232650][T17903] ? pm_runtime_init+0x311/0x3b0 [ 1424.237606][T17903] netdev_register_kobject+0x183/0x3b0 [ 1424.243079][T17903] register_netdevice+0x4f4/0x1020 [ 1424.248195][T17903] ? netdev_change_features+0xb0/0xb0 [ 1424.253567][T17903] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1424.258540][T17903] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1424.263762][T17903] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1424.269561][T17903] ? __f_unlock_pos+0x19/0x20 [ 1424.274271][T17903] ? tun_chr_compat_ioctl+0x30/0x30 [ 1424.279488][T17903] tun_chr_ioctl+0x2b/0x40 [ 1424.283920][T17903] do_vfs_ioctl+0x977/0x14e0 [ 1424.288507][T17903] ? compat_ioctl_preallocate+0x220/0x220 [ 1424.294228][T17903] ? __fget+0x37f/0x550 [ 1424.298401][T17903] ? ksys_dup3+0x3e0/0x3e0 [ 1424.302858][T17903] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1424.309181][T17903] ? fput_many+0x12c/0x1a0 [ 1424.313608][T17903] ? tomoyo_file_ioctl+0x23/0x30 [ 1424.318544][T17903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1424.324782][T17903] ? security_file_ioctl+0x8d/0xc0 [ 1424.329895][T17903] ksys_ioctl+0xab/0xd0 [ 1424.334072][T17903] __x64_sys_ioctl+0x73/0xb0 [ 1424.338680][T17903] do_syscall_64+0xfa/0x790 [ 1424.343193][T17903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1424.349082][T17903] RIP: 0033:0x45a919 [ 1424.353006][T17903] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1424.372634][T17903] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1424.381279][T17903] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1424.389251][T17903] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1424.397219][T17903] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1424.405203][T17903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1424.413298][T17903] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\xff\xff\xff\xff\xa0\x00`\x00'}) 08:16:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}) 08:16:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}) 08:16:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xdf\x00', 0x7302}) 08:16:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3f, 0x5}, 0x0, 0x0, &(0x7f00000006c0)={0x3, 0x1, 0x8d2f}, &(0x7f0000000700)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x25bf583d}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a00)={0xffffffffffffffff, 0xc0, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000640)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000680)={0x5, 0xc, 0x2, 0x9}, &(0x7f0000000780)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001900)=0x1}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3f, 0x5}, 0x0, 0x0, &(0x7f00000006c0)={0x3, 0x1, 0x8d2f}, &(0x7f0000000700)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x25bf583d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r1, 0x219) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xb7, &(0x7f000000cf3d)=""/183, 0x0, 0x1, [], 0x0, 0xa, r2, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r6, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r6, 0x0, 0x49, 0x1000, &(0x7f0000000300)="3500784f2b52185df047a64d0c0ad29ad39033072b1717bece961ff0fa41bc17d65253f48beda088aa265cf4c49f2515f036b71391f012dd9985f9fc2672c28d3a68aa8e540c0482e7", &(0x7f0000000900)=""/4096, 0x7fff, 0x0, 0x4b, 0xb2, &(0x7f0000000400)="049918e73792af333471f84f3acb74dd4d8d6e38462ac3c02367c0562b067130021c465aa795bfd860eca0d126d11d043a90d43ab699b1bd177265dc2ee926d91a7a494ef9147d419633e6", &(0x7f0000000580)="17346fe7867b6cb4a213591d41d4410103124b69472abf7fb2debda74ab87eda3733a13608e490ef65ef4114f51fa350874a71858f28aab6e0d17fdc64af94928d7a56294b58f4282fead2c87beb2f1a6ef162656b4313588d0da89b9eb8f018af23d8c54bc42749b87ed1d77af11ad299cdfa173a3d41cf3d1403c6716be0b53ed1b31eb405e35c64945e2bc811e5757c02e1e742d718fc09ee87f6a97bb2cbb7d50f4a4192c8a83605e72ed0ab2c38a1dd"}, 0x40) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, 0x0, 0x4) 08:16:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) 08:16:23 executing program 4 (fault-call:3 fault-nth:82): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}) 08:16:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00R\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000140)=r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) r4 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r4, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000400)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xce\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\a\x10yL\x8c\x96\xff\x0f\x00\x00.%\x95\x119\xbd\xa5\xd2\xb8\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd\xd0~\xb5@mj\xac\xe0T\xbd\xc5\xc44\x1eU\xee\xa7]\x0f\xbd4\xe5\xe4 B', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x10, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffa, 0x0, 0x2}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffff44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r6, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) close(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) sendmsg$kcm(r8, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r8, 0x0, 0x4) 08:16:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x004\x00', 0x7302}) [ 1424.994237][T17940] FAULT_INJECTION: forcing a failure. [ 1424.994237][T17940] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.050333][T17940] CPU: 1 PID: 17940 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1425.059061][T17940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.069130][T17940] Call Trace: [ 1425.072442][T17940] dump_stack+0x197/0x210 [ 1425.076788][T17940] should_fail.cold+0xa/0x15 [ 1425.081380][T17940] ? fault_create_debugfs_attr+0x180/0x180 [ 1425.087190][T17940] ? ___might_sleep+0x163/0x2c0 [ 1425.092042][T17940] __should_failslab+0x121/0x190 [ 1425.096983][T17940] should_failslab+0x9/0x14 [ 1425.101475][T17940] kmem_cache_alloc+0x2aa/0x710 [ 1425.106328][T17940] ? lock_downgrade+0x920/0x920 [ 1425.111426][T17940] ? kernfs_activate+0x34/0x1f0 [ 1425.116451][T17940] __kernfs_new_node+0xf0/0x6e0 [ 1425.121291][T17940] ? __kasan_check_write+0x14/0x20 [ 1425.126392][T17940] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1425.131845][T17940] ? wait_for_completion+0x440/0x440 [ 1425.137140][T17940] ? mutex_unlock+0x1b/0x30 [ 1425.141632][T17940] ? kernfs_activate+0x192/0x1f0 [ 1425.146562][T17940] kernfs_new_node+0x96/0x120 [ 1425.151230][T17940] __kernfs_create_file+0x51/0x340 [ 1425.156329][T17940] sysfs_add_file_mode_ns+0x222/0x560 [ 1425.161706][T17940] sysfs_merge_group+0x1a0/0x340 [ 1425.166650][T17940] ? sysfs_init_fs_context+0x370/0x370 [ 1425.172134][T17940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1425.178620][T17940] ? kernfs_create_link+0x1cc/0x250 [ 1425.183818][T17940] dpm_sysfs_add+0x257/0x2a0 [ 1425.188404][T17940] device_add+0x9cb/0x1d00 [ 1425.192809][T17940] ? dev_set_name+0xbb/0xf0 [ 1425.197316][T17940] ? uevent_show+0x370/0x370 [ 1425.201891][T17940] ? __init_waitqueue_head+0x36/0x90 [ 1425.207173][T17940] ? pm_runtime_init+0x311/0x3b0 [ 1425.212725][T17940] netdev_register_kobject+0x183/0x3b0 [ 1425.218195][T17940] register_netdevice+0x4f4/0x1020 [ 1425.223482][T17940] ? netdev_change_features+0xb0/0xb0 [ 1425.228853][T17940] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1425.234057][T17940] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1425.239156][T17940] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1425.245752][T17940] ? __f_unlock_pos+0x19/0x20 [ 1425.250435][T17940] ? tun_chr_compat_ioctl+0x30/0x30 [ 1425.255621][T17940] tun_chr_ioctl+0x2b/0x40 [ 1425.260055][T17940] do_vfs_ioctl+0x977/0x14e0 [ 1425.264651][T17940] ? compat_ioctl_preallocate+0x220/0x220 [ 1425.271397][T17940] ? __fget+0x37f/0x550 [ 1425.275544][T17940] ? ksys_dup3+0x3e0/0x3e0 [ 1425.279983][T17940] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1425.286210][T17940] ? fput_many+0x12c/0x1a0 [ 1425.291104][T17940] ? tomoyo_file_ioctl+0x23/0x30 [ 1425.296289][T17940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1425.302613][T17940] ? security_file_ioctl+0x8d/0xc0 [ 1425.307840][T17940] ksys_ioctl+0xab/0xd0 [ 1425.311985][T17940] __x64_sys_ioctl+0x73/0xb0 [ 1425.316584][T17940] do_syscall_64+0xfa/0x790 [ 1425.321262][T17940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.327759][T17940] RIP: 0033:0x45a919 [ 1425.331834][T17940] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1425.352127][T17940] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1425.362881][T17940] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1425.371046][T17940] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1425.379699][T17940] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1425.387660][T17940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1425.395617][T17940] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}) 08:16:24 executing program 4 (fault-call:3 fault-nth:83): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe0\x00', 0x7302}) 08:16:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}) 08:16:24 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc3bf}, 0x1, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x8, &(0x7f0000000100)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @generic={0x0, 0x7, 0xd, 0xcf96, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000140)='syzkaller\x00', 0x6fd0134, 0x9a, &(0x7f0000000400)=""/154, 0x40f00, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xe, 0x6386, 0x3}, 0x10, 0xffffffffffffffff, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1, &(0x7f0000000640)=ANY=[@ANYRES64=r0], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7ff, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r2}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0x14f0ffff}, {0x6}]}) recvmsg(r3, &(0x7f0000005ec0)={&(0x7f0000004940)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004e40)=[{&(0x7f00000049c0)=""/105, 0x69}, {&(0x7f0000004a40)=""/149, 0x95}, {&(0x7f0000004b00)=""/89, 0x59}, {&(0x7f0000004b80)=""/206, 0xce}, {&(0x7f0000004c80)=""/32, 0x20}, {&(0x7f0000004cc0)}, {&(0x7f0000004d00)=""/172, 0xac}, {&(0x7f0000004dc0)=""/77, 0x4d}], 0x8, &(0x7f0000004ec0)=""/4096, 0x1000}, 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c190b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd952aa6226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r6, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002500)={r6, 0x0, 0x69, 0xb4, &(0x7f0000002300)="ee7dd4e2fd555f315337e5c147c6f7a6813a84893785e7d1290b229c4a33b6f9cd3152e3b2758de7fa0706e07c59218db977adc6dc8aaf3bce7bc8317f2b4b74fa4aed6768fcb179bb49d783900d39912f803f2b042b317dbbc0a7416ec8d4dec0b056ae2a39aa6ea5", &(0x7f0000002380)=""/180, 0x5c, 0x0, 0x55, 0x0, &(0x7f0000002440)="843b19c1317634478954cd830b6c2a5dc98b2f2f8a6ad4ca3b719791c32fe7e8b91747fa3d1e5a49a0f342fa9900228b742c896292cce21f1210d77f32996c31878366909063e344a7e8dc246a9942e0af4be67a48", &(0x7f00000024c0)}, 0x40) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000005f00)=r5) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0x68, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xb, 0x0, &(0x7f00000004c0), &(0x7f0000000500)='syzkaller\x00', 0x2, 0x50, &(0x7f0000000580)=""/80, 0x41100, 0x7, [], r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x4, 0xffff}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x2, 0xffffffff, 0x96}, 0x10, 0xffffffffffffffff, r7}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={r8, 0xc0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x416, 0x0, 0x0, 0x0, &(0x7f0000000780)={0x8, 0x1}, 0x0, 0x0, &(0x7f00000007c0)={0x0, 0x1, 0x58b, 0x2}, &(0x7f0000000b00)=0x800, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0x2fd7}}, 0x10) sendmsg$sock(r3, &(0x7f00000022c0)={&(0x7f0000001000)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @empty}, 0x2, 0x3, 0x4, 0x2}}, 0x80, &(0x7f00000021c0)=[{&(0x7f00000004c0)="3699946de7d98675dc61f71943c8c07980f5a3b73245914d842063e070f0f9d7d7f8ebc5e643790811071466d7b15f398531668e1a856e7e07b7", 0x3a}, {&(0x7f0000001080)="c90242859518874543dbc2e042e6e46d7b635311c2b62a529634d9002ffe9a115c6eec0dd58c6167bdbb61ae388c5b672721915c149e175ea6a08e9f24cff1c4f07a4265705eca696b039967eadd3197b8dbaf346739f59745451d2de427ba3dfa924d89b4c350995a1bc50303766e30aaca49f7ea19dc3607ac56798ba4e5677b11b3ba47536909ec8d", 0x8a}, {&(0x7f0000001140)="dc79ad6181fc9eaa05d0a7371e932df48cd736b1b65228131dece83b3bb44d8f6af6096ba517f3c61bb8f1ff2d5d340959de6f7753b18bd0874b2cb93c8ef8e0ede98217589a8f6344ee8ea9a78fdfcd94c305c6f937972c9a5581b488fe", 0x5e}, {&(0x7f00000011c0)="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", 0x1000}], 0x4, &(0x7f0000002200)=[@txtime={{0x18, 0x1, 0x3d, 0xae7c}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0x90}, 0x4000004) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r11, 0x1, 0x3e, &(0x7f00000002c0)=r9, 0x161) sendmsg$kcm(r11, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) r12 = openat$tun(0xffffffffffffff9c, &(0x7f00000024c0)='/dev/net/tun\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) ioctl$TUNATTACHFILTER(r14, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0x14f0ffff}, {0x6}]}) recvmsg(r13, &(0x7f0000005ec0)={&(0x7f0000004940)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004e40)=[{&(0x7f00000049c0)=""/105, 0x69}, {&(0x7f0000004a40)=""/149, 0x95}, {&(0x7f0000004b00)=""/89, 0x59}, {&(0x7f0000004b80)=""/206, 0xce}, {&(0x7f0000004c80)=""/32, 0x20}, {&(0x7f0000004cc0)}, {&(0x7f0000004d00)=""/172, 0xac}, {&(0x7f0000004dc0)=""/77, 0x4d}], 0x8, &(0x7f0000004ec0)=""/4096, 0x1000}, 0x1) ioctl$TUNSETIFINDEX(r14, 0x400454da, &(0x7f0000005f00)=r15) ioctl$TUNSETIFINDEX(r12, 0x400454da, &(0x7f0000002540)=r15) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) write$cgroup_subtree(r11, 0x0, 0x4) [ 1425.900909][T17957] FAULT_INJECTION: forcing a failure. [ 1425.900909][T17957] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.925684][T17957] CPU: 1 PID: 17957 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1425.934415][T17957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.944468][T17957] Call Trace: [ 1425.947753][T17957] dump_stack+0x197/0x210 [ 1425.952071][T17957] should_fail.cold+0xa/0x15 [ 1425.956653][T17957] ? fault_create_debugfs_attr+0x180/0x180 [ 1425.962450][T17957] ? ___might_sleep+0x163/0x2c0 [ 1425.967303][T17957] __should_failslab+0x121/0x190 [ 1425.972239][T17957] should_failslab+0x9/0x14 [ 1425.976729][T17957] kmem_cache_alloc+0x2aa/0x710 [ 1425.981562][T17957] ? lock_downgrade+0x920/0x920 [ 1425.986407][T17957] ? kernfs_activate+0x34/0x1f0 [ 1425.991250][T17957] __kernfs_new_node+0xf0/0x6e0 [ 1425.996112][T17957] ? __kasan_check_write+0x14/0x20 [ 1426.001212][T17957] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1426.006659][T17957] ? wait_for_completion+0x440/0x440 [ 1426.011935][T17957] ? mutex_unlock+0x1b/0x30 [ 1426.016433][T17957] ? kernfs_activate+0x192/0x1f0 [ 1426.021534][T17957] kernfs_new_node+0x96/0x120 [ 1426.026206][T17957] __kernfs_create_file+0x51/0x340 [ 1426.031311][T17957] sysfs_add_file_mode_ns+0x222/0x560 [ 1426.036679][T17957] sysfs_merge_group+0x1a0/0x340 [ 1426.041606][T17957] ? sysfs_init_fs_context+0x370/0x370 [ 1426.047071][T17957] dpm_sysfs_add+0x257/0x2a0 [ 1426.051648][T17957] device_add+0x9cb/0x1d00 [ 1426.057717][T17957] ? dev_set_name+0xbb/0xf0 [ 1426.062244][T17957] ? uevent_show+0x370/0x370 [ 1426.066835][T17957] ? __init_waitqueue_head+0x36/0x90 [ 1426.072131][T17957] ? pm_runtime_init+0x311/0x3b0 [ 1426.077089][T17957] netdev_register_kobject+0x183/0x3b0 [ 1426.082563][T17957] register_netdevice+0x4f4/0x1020 [ 1426.087733][T17957] ? netdev_change_features+0xb0/0xb0 [ 1426.093295][T17957] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1426.098231][T17957] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1426.103332][T17957] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1426.109142][T17957] ? __fget+0x35d/0x550 [ 1426.113391][T17957] ? tun_chr_compat_ioctl+0x30/0x30 [ 1426.118593][T17957] tun_chr_ioctl+0x2b/0x40 [ 1426.123014][T17957] do_vfs_ioctl+0x977/0x14e0 [ 1426.127619][T17957] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1426.132904][T17957] ? retint_kernel+0x2b/0x2b [ 1426.137482][T17957] ? compat_ioctl_preallocate+0x220/0x220 [ 1426.143972][T17957] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1426.149432][T17957] ? __this_cpu_preempt_check+0x35/0x190 [ 1426.155051][T17957] ? retint_kernel+0x2b/0x2b [ 1426.159653][T17957] ksys_ioctl+0xab/0xd0 [ 1426.163810][T17957] __x64_sys_ioctl+0x73/0xb0 [ 1426.168396][T17957] do_syscall_64+0xfa/0x790 [ 1426.172901][T17957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.178878][T17957] RIP: 0033:0x45a919 [ 1426.182761][T17957] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1426.202571][T17957] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1426.211532][T17957] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1426.219502][T17957] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1426.227463][T17957] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1426.235971][T17957] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1426.244040][T17957] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:25 executing program 4 (fault-call:3 fault-nth:84): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) [ 1426.589964][T17977] FAULT_INJECTION: forcing a failure. [ 1426.589964][T17977] name failslab, interval 1, probability 0, space 0, times 0 [ 1426.604332][T17977] CPU: 1 PID: 17977 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1426.613031][T17977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1426.623086][T17977] Call Trace: [ 1426.626378][T17977] dump_stack+0x197/0x210 [ 1426.630702][T17977] should_fail.cold+0xa/0x15 [ 1426.635284][T17977] ? fault_create_debugfs_attr+0x180/0x180 [ 1426.641106][T17977] ? ___might_sleep+0x163/0x2c0 [ 1426.645972][T17977] __should_failslab+0x121/0x190 [ 1426.651070][T17977] should_failslab+0x9/0x14 [ 1426.655747][T17977] kmem_cache_alloc_node_trace+0x274/0x750 [ 1426.661553][T17977] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1426.667526][T17977] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1426.673630][T17977] __kmalloc_node_track_caller+0x3d/0x70 [ 1426.679369][T17977] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1426.684851][T17977] __alloc_skb+0x10b/0x5e0 [ 1426.689281][T17977] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1426.694837][T17977] alloc_uevent_skb+0x83/0x1e2 [ 1426.701152][T17977] ? dev_attr_store+0x80/0x80 [ 1426.705832][T17977] kobject_uevent_env+0xc5f/0x10a6 [ 1426.711571][T17977] kobject_uevent+0x20/0x26 [ 1426.716187][T17977] device_add+0xac4/0x1d00 [ 1426.721224][T17977] ? dev_set_name+0xbb/0xf0 [ 1426.725718][T17977] ? uevent_show+0x370/0x370 [ 1426.730296][T17977] ? __init_waitqueue_head+0x36/0x90 [ 1426.736197][T17977] ? pm_runtime_init+0x311/0x3b0 [ 1426.741230][T17977] netdev_register_kobject+0x183/0x3b0 [ 1426.746942][T17977] register_netdevice+0x4f4/0x1020 [ 1426.752093][T17977] ? netdev_change_features+0xb0/0xb0 [ 1426.757488][T17977] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1426.762858][T17977] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1426.768139][T17977] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1426.774931][T17977] ? __f_unlock_pos+0x19/0x20 [ 1426.779968][T17977] ? tun_chr_compat_ioctl+0x30/0x30 [ 1426.785606][T17977] tun_chr_ioctl+0x2b/0x40 [ 1426.790039][T17977] do_vfs_ioctl+0x977/0x14e0 [ 1426.794682][T17977] ? compat_ioctl_preallocate+0x220/0x220 [ 1426.800751][T17977] ? __fget+0x37f/0x550 [ 1426.804926][T17977] ? ksys_dup3+0x3e0/0x3e0 [ 1426.809431][T17977] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1426.816181][T17977] ? fput_many+0x12c/0x1a0 [ 1426.821810][T17977] ? tomoyo_file_ioctl+0x23/0x30 [ 1426.826768][T17977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1426.832999][T17977] ? security_file_ioctl+0x8d/0xc0 [ 1426.838188][T17977] ksys_ioctl+0xab/0xd0 [ 1426.842336][T17977] __x64_sys_ioctl+0x73/0xb0 [ 1426.847717][T17977] do_syscall_64+0xfa/0x790 [ 1426.852212][T17977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.858090][T17977] RIP: 0033:0x45a919 [ 1426.861970][T17977] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1426.881660][T17977] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1426.890073][T17977] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1426.898030][T17977] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1426.906002][T17977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1426.913975][T17977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1426.921943][T17977] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 08:16:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x005\x00', 0x7302}) 08:16:26 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00S\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 08:16:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000005580)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000054c0)=[{&(0x7f00000004c0)="70c406ebe5597ab0395d08170e4145d5", 0xffeb}], 0x1}, 0x0) recvmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000100)=@x25, 0x80, &(0x7f0000000200)=[{&(0x7f0000000400)=""/249, 0xf9}, {&(0x7f0000000300)=""/95, 0x5f}, {&(0x7f0000000580)=""/83, 0x53}], 0x3}, 0x2065) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) 08:16:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe1\x00', 0x7302}) 08:16:26 executing program 4 (fault-call:3 fault-nth:85): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) 08:16:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)=@generic={0x11, "cd5bd573494bf1e2b56d6bfa6bd1c646ac33c7e1f575d2324873d982435e8e599f2117b88e732b2f8ec7f94000041eff87a6ad26137d6fb4489d0c31ec7dca1965e1e2ac0ca0c0bf3827a3f2c7902a708f13d00068025b4b8b4be5974d14e3701bd72e07fefde3f1fc68f9fdfa7da72bd876d5d61ba9b0c1cb0ef6d33bf6"}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="855bb3cfafb9f73b423ca6c49c6aed6a416967044317d1a034082758d6ae9bed77da7e6ac4a59727d840e43fc0d680cdd9546b7a03b2f9f372ba1e0c202949daa439449af0ac0545e2e315d3710f42e1481f20af7589447002dc260ebc995f4dadd1591b5486efa7f705cb95040a726a", 0x70}], 0x1}, 0x20000000) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, 0x0, 0x4) [ 1427.489133][T18000] FAULT_INJECTION: forcing a failure. [ 1427.489133][T18000] name failslab, interval 1, probability 0, space 0, times 0 [ 1427.504004][T18000] CPU: 0 PID: 18000 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1427.512916][T18000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1427.522973][T18000] Call Trace: [ 1427.523057][T18000] dump_stack+0x197/0x210 [ 1427.523082][T18000] should_fail.cold+0xa/0x15 [ 1427.523102][T18000] ? fault_create_debugfs_attr+0x180/0x180 [ 1427.541272][T18000] ? ___might_sleep+0x163/0x2c0 [ 1427.546137][T18000] __should_failslab+0x121/0x190 [ 1427.546159][T18000] should_failslab+0x9/0x14 [ 1427.546175][T18000] kmem_cache_alloc_node_trace+0x274/0x750 [ 1427.546195][T18000] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1427.546209][T18000] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1427.546232][T18000] __kmalloc_node_track_caller+0x3d/0x70 [ 1427.546254][T18000] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1427.546275][T18000] __alloc_skb+0x10b/0x5e0 [ 1427.546297][T18000] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1427.546313][T18000] ? retint_kernel+0x2b/0x2b [ 1427.546330][T18000] ? device_get_devnode+0x2d0/0x2d0 [ 1427.546350][T18000] alloc_uevent_skb+0x83/0x1e2 [ 1427.609883][T18000] ? dev_attr_store+0x80/0x80 [ 1427.614567][T18000] kobject_uevent_env+0xc5f/0x10a6 [ 1427.619687][T18000] ? _raw_spin_unlock_irq+0x4f/0x80 [ 1427.624881][T18000] kobject_uevent+0x20/0x26 [ 1427.629384][T18000] device_add+0xac4/0x1d00 [ 1427.634139][T18000] ? dev_set_name+0xbb/0xf0 [ 1427.638896][T18000] ? uevent_show+0x370/0x370 [ 1427.643482][T18000] ? __init_waitqueue_head+0x36/0x90 [ 1427.648767][T18000] ? pm_runtime_init+0x311/0x3b0 [ 1427.653705][T18000] netdev_register_kobject+0x183/0x3b0 [ 1427.659160][T18000] register_netdevice+0x4f4/0x1020 [ 1427.664866][T18000] ? netdev_change_features+0xb0/0xb0 [ 1427.671047][T18000] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1427.676327][T18000] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1427.681599][T18000] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1427.687744][T18000] ? __f_unlock_pos+0x19/0x20 [ 1427.692430][T18000] ? tun_chr_compat_ioctl+0x30/0x30 [ 1427.697632][T18000] tun_chr_ioctl+0x2b/0x40 [ 1427.702048][T18000] do_vfs_ioctl+0x977/0x14e0 [ 1427.706632][T18000] ? compat_ioctl_preallocate+0x220/0x220 [ 1427.712771][T18000] ? __fget+0x37f/0x550 [ 1427.716936][T18000] ? ksys_dup3+0x3e0/0x3e0 [ 1427.721424][T18000] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1427.727785][T18000] ? fput_many+0x12c/0x1a0 [ 1427.732523][T18000] ? tomoyo_file_ioctl+0x23/0x30 [ 1427.737471][T18000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1427.743901][T18000] ? security_file_ioctl+0x8d/0xc0 [ 1427.749489][T18000] ksys_ioctl+0xab/0xd0 [ 1427.753754][T18000] __x64_sys_ioctl+0x73/0xb0 [ 1427.758537][T18000] do_syscall_64+0xfa/0x790 [ 1427.763512][T18000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1427.770715][T18000] RIP: 0033:0x45a919 [ 1427.774859][T18000] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1427.794455][T18000] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1427.803111][T18000] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1427.811082][T18000] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1427.819041][T18000] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1427.827012][T18000] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1427.834981][T18000] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe2\x00', 0x7302}) 08:16:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 08:16:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x006\x00', 0x7302}) 08:16:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 08:16:27 executing program 4 (fault-call:3 fault-nth:86): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1428.367964][T18027] FAULT_INJECTION: forcing a failure. [ 1428.367964][T18027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1428.381229][T18027] CPU: 1 PID: 18027 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1428.389907][T18027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1428.399970][T18027] Call Trace: [ 1428.403273][T18027] dump_stack+0x197/0x210 [ 1428.407724][T18027] should_fail.cold+0xa/0x15 [ 1428.412300][T18027] ? fault_create_debugfs_attr+0x180/0x180 [ 1428.418198][T18027] ? __kasan_check_read+0x11/0x20 [ 1428.423469][T18027] ? __lock_acquire+0x16f2/0x4a00 [ 1428.428482][T18027] should_fail_alloc_page+0x50/0x60 [ 1428.433687][T18027] __alloc_pages_nodemask+0x1a1/0x910 [ 1428.439043][T18027] ? fs_reclaim_release+0xf/0x30 [ 1428.443962][T18027] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1428.449668][T18027] ? fs_reclaim_release+0xf/0x30 [ 1428.454595][T18027] ? fault_create_debugfs_attr+0x180/0x180 [ 1428.460382][T18027] cache_grow_begin+0x90/0xc60 [ 1428.465169][T18027] ? kobject_uevent_env+0x387/0x10a6 [ 1428.470437][T18027] ? trace_hardirqs_off+0x62/0x240 [ 1428.475540][T18027] kmem_cache_alloc_trace+0x6b3/0x790 [ 1428.480940][T18027] ? __kasan_check_write+0x14/0x20 [ 1428.486039][T18027] kobject_uevent_env+0x387/0x10a6 [ 1428.491149][T18027] kobject_uevent+0x20/0x26 [ 1428.495633][T18027] device_add+0xac4/0x1d00 [ 1428.500025][T18027] ? dev_set_name+0xbb/0xf0 [ 1428.504509][T18027] ? uevent_show+0x370/0x370 [ 1428.509076][T18027] ? __init_waitqueue_head+0x36/0x90 [ 1428.514367][T18027] ? pm_runtime_init+0x311/0x3b0 [ 1428.519297][T18027] netdev_register_kobject+0x183/0x3b0 [ 1428.524758][T18027] register_netdevice+0x4f4/0x1020 [ 1428.529897][T18027] ? netdev_change_features+0xb0/0xb0 [ 1428.535268][T18027] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1428.540194][T18027] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1428.545329][T18027] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1428.551123][T18027] ? __f_unlock_pos+0x19/0x20 [ 1428.555809][T18027] ? tun_chr_compat_ioctl+0x30/0x30 [ 1428.560989][T18027] tun_chr_ioctl+0x2b/0x40 [ 1428.565386][T18027] do_vfs_ioctl+0x977/0x14e0 [ 1428.569959][T18027] ? compat_ioctl_preallocate+0x220/0x220 [ 1428.575656][T18027] ? __fget+0x37f/0x550 [ 1428.579794][T18027] ? ksys_dup3+0x3e0/0x3e0 [ 1428.584214][T18027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1428.590441][T18027] ? fput_many+0x12c/0x1a0 [ 1428.595131][T18027] ? tomoyo_file_ioctl+0x23/0x30 [ 1428.601827][T18027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.608064][T18027] ? security_file_ioctl+0x8d/0xc0 [ 1428.613430][T18027] ksys_ioctl+0xab/0xd0 [ 1428.617593][T18027] __x64_sys_ioctl+0x73/0xb0 [ 1428.622189][T18027] do_syscall_64+0xfa/0x790 [ 1428.626942][T18027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.633082][T18027] RIP: 0033:0x45a919 [ 1428.637218][T18027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1428.657405][T18027] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1428.665844][T18027] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1428.673809][T18027] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1428.681762][T18027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1428.689715][T18027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1428.697667][T18027] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:27 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00T\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}) 08:16:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="850000000e00000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb09acbc7b716441ef6bac34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0x14f0ffff}, {0x6}]}) recvmsg(r2, &(0x7f0000005ec0)={&(0x7f0000004940)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004e40)=[{&(0x7f00000049c0)=""/105, 0x69}, {&(0x7f0000004a40)=""/149, 0x95}, {&(0x7f0000004b00)=""/89, 0x59}, {&(0x7f0000004b80)=""/206, 0xce}, {&(0x7f0000004c80)=""/32, 0x20}, {&(0x7f0000004cc0)}, {&(0x7f0000004d00)=""/172, 0xac}, {&(0x7f0000004dc0)=""/77, 0x4d}], 0x8, &(0x7f0000004ec0)=""/4096, 0x1000}, 0x1) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000005f00)=r4) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000900)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xa, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xa8, &(0x7f00000000c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x2, &(0x7f00000001c0), 0xfffffffffffffdef}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3f, 0x5}, 0x0, 0x0, &(0x7f00000006c0)={0x3, 0x1, 0x8d2f}, &(0x7f0000000700)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x25bf583d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r7, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r5, 0x10, &(0x7f0000000300)={&(0x7f0000000800)=""/207, 0xcf, r7}}, 0x10) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x519f62cdae7187f9, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1}, [@func]}, &(0x7f0000000140)='syzkaller\x00', 0xffff, 0xea, &(0x7f0000000400)=""/234, 0x41000, 0x4, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x2, 0x4, 0xc0000000}, 0x10, r8, r9}, 0x78) r10 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r10, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r10, 0x0, 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000940), 0x4) 08:16:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00`\x00\xa0\xff\xff\xff\xff\x00'}) 08:16:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x007\x00', 0x7302}) 08:16:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe3\x00', 0x7302}) 08:16:28 executing program 4 (fault-call:3 fault-nth:87): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x80\x00\xa0\xff\xff\xff\xff\x00'}) 08:16:28 executing program 0: gettid() r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c190b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd952aa6226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="020e003f0000007e5bc5795eca00054300ffffffba000060ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r0, r1, 0x15, 0x1}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x3}, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, 0x0, 0x4) 08:16:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x02\x00'}) [ 1429.199954][T18053] FAULT_INJECTION: forcing a failure. [ 1429.199954][T18053] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.242322][T18053] CPU: 1 PID: 18053 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1429.251165][T18053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.263403][T18053] Call Trace: [ 1429.266700][T18053] dump_stack+0x197/0x210 [ 1429.271041][T18053] should_fail.cold+0xa/0x15 [ 1429.275715][T18053] ? fault_create_debugfs_attr+0x180/0x180 [ 1429.281561][T18053] ? ___might_sleep+0x163/0x2c0 [ 1429.286862][T18053] __should_failslab+0x121/0x190 [ 1429.291931][T18053] should_failslab+0x9/0x14 [ 1429.296435][T18053] kmem_cache_alloc_node_trace+0x274/0x750 [ 1429.302606][T18053] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1429.308771][T18053] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1429.314584][T18053] __kmalloc_node_track_caller+0x3d/0x70 [ 1429.320388][T18053] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1429.326068][T18053] __alloc_skb+0x10b/0x5e0 [ 1429.330479][T18053] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1429.336019][T18053] alloc_uevent_skb+0x83/0x1e2 [ 1429.340778][T18053] ? dev_attr_store+0x80/0x80 [ 1429.345446][T18053] kobject_uevent_env+0xc5f/0x10a6 [ 1429.350565][T18053] kobject_uevent+0x20/0x26 [ 1429.355054][T18053] device_add+0xac4/0x1d00 [ 1429.359466][T18053] ? dev_set_name+0xbb/0xf0 [ 1429.363957][T18053] ? uevent_show+0x370/0x370 [ 1429.368545][T18053] ? __init_waitqueue_head+0x36/0x90 [ 1429.373821][T18053] ? pm_runtime_init+0x311/0x3b0 [ 1429.378761][T18053] netdev_register_kobject+0x183/0x3b0 [ 1429.384222][T18053] register_netdevice+0x4f4/0x1020 [ 1429.389342][T18053] ? netdev_change_features+0xb0/0xb0 [ 1429.394706][T18053] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1429.399643][T18053] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1429.404740][T18053] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1429.410529][T18053] ? __f_unlock_pos+0x19/0x20 [ 1429.415207][T18053] ? tun_chr_compat_ioctl+0x30/0x30 [ 1429.420480][T18053] tun_chr_ioctl+0x2b/0x40 [ 1429.424886][T18053] do_vfs_ioctl+0x977/0x14e0 [ 1429.429464][T18053] ? compat_ioctl_preallocate+0x220/0x220 [ 1429.435184][T18053] ? __fget+0x37f/0x550 [ 1429.439344][T18053] ? ksys_dup3+0x3e0/0x3e0 [ 1429.443750][T18053] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1429.449287][T18053] ? tomoyo_file_ioctl+0x23/0x30 [ 1429.454215][T18053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.460538][T18053] ? security_file_ioctl+0x8d/0xc0 [ 1429.465638][T18053] ksys_ioctl+0xab/0xd0 [ 1429.469795][T18053] __x64_sys_ioctl+0x73/0xb0 [ 1429.474385][T18053] do_syscall_64+0xfa/0x790 [ 1429.478900][T18053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1429.484775][T18053] RIP: 0033:0x45a919 [ 1429.488656][T18053] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1429.508330][T18053] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1429.517631][T18053] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1429.527954][T18053] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1429.535908][T18053] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1429.543962][T18053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1429.552004][T18053] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x03\x00'}) 08:16:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x008\x00', 0x7302}) 08:16:29 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00U\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x04\x00'}) 08:16:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3ea, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000200), 0x10, 0x0, r1}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x1000, 0x7fffffff, 0x0, 0x6, 0x0, 0x9, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='cgroup\x00') 08:16:29 executing program 4 (fault-call:3 fault-nth:88): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe4\x00', 0x7302}) [ 1430.076073][T18077] FAULT_INJECTION: forcing a failure. [ 1430.076073][T18077] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.114923][T18077] CPU: 1 PID: 18077 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1430.124342][T18077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1430.134491][T18077] Call Trace: [ 1430.137967][T18077] dump_stack+0x197/0x210 [ 1430.142310][T18077] should_fail.cold+0xa/0x15 [ 1430.146896][T18077] ? fault_create_debugfs_attr+0x180/0x180 [ 1430.152700][T18077] ? ___might_sleep+0x163/0x2c0 [ 1430.157584][T18077] __should_failslab+0x121/0x190 [ 1430.162540][T18077] should_failslab+0x9/0x14 [ 1430.167060][T18077] kmem_cache_alloc_node_trace+0x274/0x750 [ 1430.173013][T18077] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1430.179013][T18077] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1430.184848][T18077] __kmalloc_node_track_caller+0x3d/0x70 [ 1430.190595][T18077] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1430.196020][T18077] __alloc_skb+0x10b/0x5e0 [ 1430.200454][T18077] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1430.206041][T18077] alloc_uevent_skb+0x83/0x1e2 [ 1430.210902][T18077] ? dev_attr_store+0x80/0x80 [ 1430.215576][T18077] kobject_uevent_env+0xc5f/0x10a6 [ 1430.220823][T18077] kobject_uevent+0x20/0x26 [ 1430.225330][T18077] device_add+0xac4/0x1d00 [ 1430.229754][T18077] ? dev_set_name+0xbb/0xf0 [ 1430.234371][T18077] ? uevent_show+0x370/0x370 [ 1430.239007][T18077] ? __init_waitqueue_head+0x36/0x90 [ 1430.244344][T18077] ? pm_runtime_init+0x311/0x3b0 [ 1430.249300][T18077] netdev_register_kobject+0x183/0x3b0 [ 1430.254780][T18077] register_netdevice+0x4f4/0x1020 [ 1430.259892][T18077] ? netdev_change_features+0xb0/0xb0 [ 1430.265275][T18077] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1430.270235][T18077] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1430.275446][T18077] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1430.281235][T18077] ? __f_unlock_pos+0x19/0x20 [ 1430.285927][T18077] ? tun_chr_compat_ioctl+0x30/0x30 [ 1430.291144][T18077] tun_chr_ioctl+0x2b/0x40 [ 1430.295558][T18077] do_vfs_ioctl+0x977/0x14e0 [ 1430.300186][T18077] ? compat_ioctl_preallocate+0x220/0x220 [ 1430.305901][T18077] ? __fget+0x37f/0x550 [ 1430.310082][T18077] ? ksys_dup3+0x3e0/0x3e0 [ 1430.314528][T18077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1430.320773][T18077] ? tomoyo_file_ioctl+0x23/0x30 [ 1430.325723][T18077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1430.331982][T18077] ? security_file_ioctl+0x8d/0xc0 [ 1430.337100][T18077] ksys_ioctl+0xab/0xd0 [ 1430.341246][T18077] __x64_sys_ioctl+0x73/0xb0 [ 1430.345841][T18077] do_syscall_64+0xfa/0x790 [ 1430.350447][T18077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1430.356353][T18077] RIP: 0033:0x45a919 [ 1430.360237][T18077] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1430.379917][T18077] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1430.388333][T18077] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1430.396317][T18077] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1430.404272][T18077] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1430.412229][T18077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1430.420186][T18077] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x05\x00'}) 08:16:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="850000000e1c000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e9f748b4ee09cc6fa47ef6943a1c3669ef5fc545ab7ffef72fd2ca305f386142d7835f213e7ff0f0000177e389eba975d4a180ebd219b65dabb34d0c99d62456cc766085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f633b5b0402ffa95acb5142878584c1fdae241f51f7ff22745696f1fff2ca9ed226213275a566ae3f64fb2cfe777d16832bbb703ea39868fcf0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b7af791e60d45b3d86f73a45230bc2693b5917cab174bebbb64268f772950c80fb42432bb3d74d74298cc5422347a9be93d38719fbe289f00d85f50c4f930cf992422161ef674401295be59e41f6e99dc26f634fef380000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) close(r3) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r6 = openat$cgroup_ro(r5, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000300)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd') setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, 0x0, 0x4) 08:16:29 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x009\x00', 0x7302}) 08:16:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x06\x00'}) 08:16:29 executing program 4 (fault-call:3 fault-nth:89): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\xff\xff\xff\xe4\x00', 0x7302}) 08:16:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\a\x00'}) [ 1430.931932][T18110] FAULT_INJECTION: forcing a failure. [ 1430.931932][T18110] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.945253][T18110] CPU: 1 PID: 18110 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1430.954059][T18110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1430.964103][T18110] Call Trace: [ 1430.967405][T18110] dump_stack+0x197/0x210 [ 1430.971749][T18110] should_fail.cold+0xa/0x15 [ 1430.976353][T18110] ? fault_create_debugfs_attr+0x180/0x180 [ 1430.982195][T18110] ? ___might_sleep+0x163/0x2c0 [ 1430.987061][T18110] __should_failslab+0x121/0x190 [ 1430.992007][T18110] should_failslab+0x9/0x14 [ 1430.996533][T18110] kmem_cache_alloc_node_trace+0x274/0x750 [ 1431.002469][T18110] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1431.008440][T18110] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1431.014249][T18110] __kmalloc_node_track_caller+0x3d/0x70 [ 1431.019967][T18110] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1431.027953][T18110] __alloc_skb+0x10b/0x5e0 [ 1431.032366][T18110] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1431.037912][T18110] alloc_uevent_skb+0x83/0x1e2 [ 1431.042695][T18110] ? dev_attr_store+0x80/0x80 [ 1431.047438][T18110] kobject_uevent_env+0xc5f/0x10a6 [ 1431.052584][T18110] kobject_uevent+0x20/0x26 [ 1431.057098][T18110] device_add+0xac4/0x1d00 [ 1431.061531][T18110] ? dev_set_name+0xbb/0xf0 [ 1431.066041][T18110] ? uevent_show+0x370/0x370 [ 1431.070646][T18110] ? __init_waitqueue_head+0x36/0x90 [ 1431.075940][T18110] ? pm_runtime_init+0x311/0x3b0 [ 1431.080877][T18110] netdev_register_kobject+0x183/0x3b0 [ 1431.086492][T18110] register_netdevice+0x4f4/0x1020 [ 1431.091604][T18110] ? netdev_change_features+0xb0/0xb0 [ 1431.096989][T18110] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1431.101977][T18110] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1431.107106][T18110] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1431.112940][T18110] ? __f_unlock_pos+0x19/0x20 [ 1431.117725][T18110] ? tun_chr_compat_ioctl+0x30/0x30 [ 1431.122922][T18110] tun_chr_ioctl+0x2b/0x40 [ 1431.127338][T18110] do_vfs_ioctl+0x977/0x14e0 [ 1431.131944][T18110] ? compat_ioctl_preallocate+0x220/0x220 [ 1431.137656][T18110] ? __fget+0x37f/0x550 [ 1431.141799][T18110] ? ksys_dup3+0x3e0/0x3e0 [ 1431.146214][T18110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1431.152453][T18110] ? fput_many+0x12c/0x1a0 [ 1431.156884][T18110] ? tomoyo_file_ioctl+0x23/0x30 [ 1431.163224][T18110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1431.169478][T18110] ? security_file_ioctl+0x8d/0xc0 [ 1431.174598][T18110] ksys_ioctl+0xab/0xd0 [ 1431.178763][T18110] __x64_sys_ioctl+0x73/0xb0 [ 1431.183351][T18110] do_syscall_64+0xfa/0x790 [ 1431.187860][T18110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1431.193743][T18110] RIP: 0033:0x45a919 [ 1431.197631][T18110] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1431.217241][T18110] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1431.225681][T18110] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1431.233651][T18110] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1431.241607][T18110] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1431.249566][T18110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1431.257526][T18110] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 08:16:30 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00V\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0x14f0ffff}, {0x6}]}) recvmsg(r2, &(0x7f0000005ec0)={&(0x7f0000004940)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004e40)=[{&(0x7f00000049c0)=""/105, 0x69}, {&(0x7f0000004a40)=""/149, 0x95}, {&(0x7f0000004b00)=""/89, 0x59}, {&(0x7f0000004b80)=""/206, 0xce}, {&(0x7f0000004c80)=""/32, 0x20}, {&(0x7f0000004cc0)}, {&(0x7f0000004d00)=""/172, 0xac}, {&(0x7f0000004dc0)=""/77, 0x4d}], 0x8, &(0x7f0000004ec0)=""/4096, 0x1000}, 0x1) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000005f00)=r4) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000900)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xa, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xa8, &(0x7f00000000c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x2, &(0x7f00000001c0), 0xfffffffffffffdef}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x6, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3f, 0x5}, 0x0, 0x0, &(0x7f00000006c0)={0x3, 0x1, 0x8d2f}, &(0x7f0000000700)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x25bf583d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=r7, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r5, 0x10, &(0x7f0000000300)={&(0x7f0000000800)=""/207, 0xcf, r7}}, 0x10) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x519f62cdae7187f9, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1}, [@func]}, &(0x7f0000000140)='syzkaller\x00', 0xffff, 0xea, &(0x7f0000000400)=""/234, 0x41000, 0x4, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x2, 0x4, 0xc0000000}, 0x10, r8, r9}, 0x78) r10 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r10, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r10, 0x0, 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000940), 0x4) 08:16:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\b\x00'}) 08:16:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x10\x00'}) 08:16:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x03\x00'}) 08:16:30 executing program 4 (fault-call:3 fault-nth:90): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00:\x00', 0x7302}) 08:16:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x1000000000000002, 0x0) gettid() gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000500)='mcurrent\x00\x00\x00\x00 \x0f\x00', 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100d00, 0x500001c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) 08:16:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe5\x00', 0x7302}) 08:16:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x05\x00'}) [ 1431.903677][T18132] FAULT_INJECTION: forcing a failure. [ 1431.903677][T18132] name failslab, interval 1, probability 0, space 0, times 0 [ 1431.918402][T18132] CPU: 0 PID: 18132 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1431.927102][T18132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1431.937159][T18132] Call Trace: [ 1431.940448][T18132] dump_stack+0x197/0x210 [ 1431.944765][T18132] should_fail.cold+0xa/0x15 [ 1431.949339][T18132] ? fault_create_debugfs_attr+0x180/0x180 [ 1431.955144][T18132] ? ___might_sleep+0x163/0x2c0 [ 1431.960010][T18132] __should_failslab+0x121/0x190 [ 1431.964958][T18132] should_failslab+0x9/0x14 [ 1431.969486][T18132] kmem_cache_alloc+0x2aa/0x710 [ 1431.974348][T18132] ? mark_held_locks+0xf0/0xf0 [ 1431.979140][T18132] __kernfs_new_node+0xf0/0x6e0 [ 1431.984010][T18132] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1431.989467][T18132] ? kernfs_activate+0x192/0x1f0 [ 1431.994413][T18132] ? lock_downgrade+0x920/0x920 [ 1431.999272][T18132] ? kernfs_activate+0x34/0x1f0 [ 1432.004136][T18132] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1432.009230][ T27] audit: type=1804 audit(1577520990.902:83): pid=18142 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir565356715/syzkaller.Jpm23l/3048/memory.events" dev="sda1" ino=16769 res=1 [ 1432.009859][T18132] ? map_id_range_down+0x1ee/0x370 [ 1432.009887][T18132] kernfs_new_node+0x96/0x120 [ 1432.009909][T18132] __kernfs_create_file+0x51/0x340 [ 1432.009931][T18132] sysfs_add_file_mode_ns+0x222/0x560 [ 1432.057034][T18132] internal_create_group+0x359/0xc40 [ 1432.062350][T18132] ? remove_files.isra.0+0x190/0x190 [ 1432.067795][T18132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1432.074058][T18132] ? sysfs_create_dir_ns+0x181/0x2a0 [ 1432.079371][T18132] ? sysfs_create_mount_point+0xa0/0xa0 [ 1432.084958][T18132] internal_create_groups.part.0+0x90/0x140 [ 1432.090885][T18132] sysfs_create_groups+0x2a/0x50 [ 1432.095848][T18132] kobject_add_internal.cold+0x31f/0x662 [ 1432.101512][T18132] kobject_init_and_add+0x101/0x160 [ 1432.106731][T18132] ? kobject_add_internal+0x380/0x380 [ 1432.112137][T18132] ? kobject_uevent_env+0x1094/0x10a6 [ 1432.117547][T18132] net_rx_queue_update_kobjects+0x1d3/0x460 [ 1432.123497][T18132] netdev_register_kobject+0x278/0x3b0 [ 1432.128983][T18132] register_netdevice+0x4f4/0x1020 [ 1432.134213][T18132] ? netdev_change_features+0xb0/0xb0 [ 1432.139616][T18132] __tun_chr_ioctl+0x2c5a/0x3fa0 [ 1432.144586][T18132] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1432.149717][T18132] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1432.155575][T18132] ? tun_chr_compat_ioctl+0x30/0x30 [ 1432.160822][T18132] tun_chr_ioctl+0x2b/0x40 [ 1432.165266][T18132] do_vfs_ioctl+0x977/0x14e0 [ 1432.169892][T18132] ? compat_ioctl_preallocate+0x220/0x220 [ 1432.175630][T18132] ? __fget+0x37f/0x550 [ 1432.177246][ T27] audit: type=1804 audit(1577520990.902:84): pid=18142 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir565356715/syzkaller.Jpm23l/3048/memory.events" dev="sda1" ino=16769 res=1 [ 1432.179802][T18132] ? ksys_dup3+0x3e0/0x3e0 [ 1432.179826][T18132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1432.179848][T18132] ? tomoyo_file_ioctl+0x23/0x30 [ 1432.179869][T18132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.226576][T18132] ? security_file_ioctl+0x8d/0xc0 [ 1432.231693][T18132] ksys_ioctl+0xab/0xd0 [ 1432.235863][T18132] __x64_sys_ioctl+0x73/0xb0 [ 1432.240452][T18132] do_syscall_64+0xfa/0x790 [ 1432.244956][T18132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.250834][T18132] RIP: 0033:0x45a919 [ 1432.254732][T18132] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1432.274357][T18132] RSP: 002b:00007f351a62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1432.282810][T18132] RAX: ffffffffffffffda RBX: 00007f351a62ac90 RCX: 000000000045a919 [ 1432.290794][T18132] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 1432.298749][T18132] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1432.306880][T18132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f351a62b6d4 [ 1432.314844][T18132] R13: 00000000004c5fbf R14: 00000000004dc4d0 R15: 0000000000000005 [ 1432.329488][T18132] kobject_add_internal failed for rx-0 (error: -12 parent: queues) 08:16:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x06\x00'}) 08:16:31 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:31 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00W\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x05\x00'}) 08:16:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\a\x00'}) 08:16:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00?\x00'}) 08:16:31 executing program 0 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:31 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00;\x00', 0x7302}) 08:16:32 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x2, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00@\x00'}) [ 1433.040027][T18172] FAULT_INJECTION: forcing a failure. [ 1433.040027][T18172] name failslab, interval 1, probability 0, space 0, times 0 [ 1433.092221][T18172] CPU: 0 PID: 18172 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1433.100934][T18172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1433.100941][T18172] Call Trace: [ 1433.100962][T18172] dump_stack+0x197/0x210 [ 1433.100983][T18172] should_fail.cold+0xa/0x15 [ 1433.101003][T18172] ? fault_create_debugfs_attr+0x180/0x180 [ 1433.101030][T18172] ? ___might_sleep+0x163/0x2c0 [ 1433.133930][T18172] __should_failslab+0x121/0x190 [ 1433.138894][T18172] should_failslab+0x9/0x14 [ 1433.143397][T18172] kmem_cache_alloc_trace+0x2d3/0x790 [ 1433.148797][T18172] htab_map_alloc+0xe3/0x11c0 [ 1433.153508][T18172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.159769][T18172] ? htab_map_update_elem+0xca0/0xca0 [ 1433.165270][T18172] __do_sys_bpf+0x478/0x3610 [ 1433.169887][T18172] ? bpf_prog_load+0x1960/0x1960 [ 1433.174840][T18172] ? __kasan_check_write+0x14/0x20 [ 1433.179973][T18172] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1433.185626][T18172] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1433.190933][T18172] ? wait_for_completion+0x440/0x440 [ 1433.196246][T18172] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1433.202522][T18172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1433.208524][T18172] ? do_syscall_64+0x26/0x790 [ 1433.213221][T18172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.219306][T18172] ? do_syscall_64+0x26/0x790 [ 1433.224187][T18172] __x64_sys_bpf+0x73/0xb0 [ 1433.228601][T18172] do_syscall_64+0xfa/0x790 [ 1433.228623][T18172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.228634][T18172] RIP: 0033:0x45a919 08:16:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe6\x00', 0x7302}) 08:16:32 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x10, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\xff\x00'}) [ 1433.228649][T18172] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1433.228656][T18172] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1433.228668][T18172] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1433.228682][T18172] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1433.287930][T18172] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1433.295914][T18172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1433.303903][T18172] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\xa0\x00`\x00'}) 08:16:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00X\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:32 executing program 0 (fault-call:7 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:32 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5421, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\xa0\x00\x80\x00'}) 08:16:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00<\x00', 0x7302}) 08:16:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x01\x00'}) 08:16:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe7\x00', 0x7302}) [ 1433.833994][T18207] FAULT_INJECTION: forcing a failure. [ 1433.833994][T18207] name failslab, interval 1, probability 0, space 0, times 0 [ 1433.860253][T18207] CPU: 0 PID: 18207 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1433.868982][T18207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1433.879047][T18207] Call Trace: 08:16:32 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5450, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1433.882353][T18207] dump_stack+0x197/0x210 [ 1433.886719][T18207] should_fail.cold+0xa/0x15 [ 1433.891329][T18207] ? fault_create_debugfs_attr+0x180/0x180 [ 1433.897155][T18207] ? ___might_sleep+0x163/0x2c0 [ 1433.902029][T18207] __should_failslab+0x121/0x190 [ 1433.906987][T18207] should_failslab+0x9/0x14 [ 1433.907004][T18207] kmem_cache_alloc_node_trace+0x274/0x750 [ 1433.907023][T18207] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1433.907040][T18207] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1433.907056][T18207] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1433.907076][T18207] __kmalloc_node+0x3d/0x70 [ 1433.907095][T18207] __bpf_map_area_alloc+0xbd/0xf0 [ 1433.907114][T18207] bpf_map_area_alloc+0x20/0x30 [ 1433.907130][T18207] htab_map_alloc+0x589/0x11c0 [ 1433.907158][T18207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.907174][T18207] ? htab_map_update_elem+0xca0/0xca0 [ 1433.907193][T18207] __do_sys_bpf+0x478/0x3610 [ 1433.929009][T18207] ? bpf_prog_load+0x1960/0x1960 [ 1433.929027][T18207] ? __kasan_check_write+0x14/0x20 [ 1433.929045][T18207] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1433.929062][T18207] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1433.929080][T18207] ? wait_for_completion+0x440/0x440 [ 1433.929106][T18207] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1433.929138][T18207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1433.929154][T18207] ? do_syscall_64+0x26/0x790 [ 1433.929174][T18207] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.965638][T18207] ? do_syscall_64+0x26/0x790 [ 1433.965665][T18207] __x64_sys_bpf+0x73/0xb0 [ 1433.965685][T18207] do_syscall_64+0xfa/0x790 [ 1433.965708][T18207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.965720][T18207] RIP: 0033:0x45a919 [ 1433.965737][T18207] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1433.965746][T18207] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1433.965760][T18207] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1433.965770][T18207] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1433.965779][T18207] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1433.965788][T18207] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1433.965796][T18207] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) 08:16:33 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5451, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:33 executing program 0 (fault-call:7 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x03\x00'}) [ 1434.395847][T18231] FAULT_INJECTION: forcing a failure. [ 1434.395847][T18231] name failslab, interval 1, probability 0, space 0, times 0 [ 1434.410314][T18231] CPU: 0 PID: 18231 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1434.419014][T18231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1434.433503][T18231] Call Trace: [ 1434.436906][T18231] dump_stack+0x197/0x210 [ 1434.441259][T18231] should_fail.cold+0xa/0x15 [ 1434.445961][T18231] ? fault_create_debugfs_attr+0x180/0x180 [ 1434.451985][T18231] ? ___might_sleep+0x163/0x2c0 [ 1434.457303][T18231] __should_failslab+0x121/0x190 [ 1434.462263][T18231] should_failslab+0x9/0x14 [ 1434.466771][T18231] kmem_cache_alloc_node_trace+0x274/0x750 [ 1434.466789][T18231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.466806][T18231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.466820][T18231] ? debug_smp_processor_id+0x33/0x18a [ 1434.466843][T18231] __get_vm_area_node+0x12b/0x4f0 [ 1434.479029][T18231] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1434.479052][T18231] __vmalloc_node_range+0xd4/0x810 [ 1434.479067][T18231] ? bpf_map_area_alloc+0x20/0x30 [ 1434.479083][T18231] ? kasan_unpoison_shadow+0x35/0x50 [ 1434.479104][T18231] ? bpf_map_area_alloc+0x20/0x30 [ 1434.521939][T18231] __vmalloc_node_flags_caller+0x71/0x90 [ 1434.527604][T18231] ? bpf_map_area_alloc+0x20/0x30 [ 1434.532731][T18231] __bpf_map_area_alloc+0xde/0xf0 [ 1434.537831][T18231] bpf_map_area_alloc+0x20/0x30 [ 1434.542693][T18231] htab_map_alloc+0x8d3/0x11c0 [ 1434.547527][T18231] ? htab_map_update_elem+0xca0/0xca0 [ 1434.552888][T18231] __do_sys_bpf+0x478/0x3610 [ 1434.557470][T18231] ? bpf_prog_load+0x1960/0x1960 [ 1434.562405][T18231] ? __kasan_check_write+0x14/0x20 [ 1434.567501][T18231] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1434.573031][T18231] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1434.578298][T18231] ? wait_for_completion+0x440/0x440 [ 1434.583572][T18231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1434.589805][T18231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1434.595250][T18231] ? do_syscall_64+0x26/0x790 [ 1434.599919][T18231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1434.605976][T18231] ? do_syscall_64+0x26/0x790 [ 1434.610653][T18231] __x64_sys_bpf+0x73/0xb0 [ 1434.615056][T18231] do_syscall_64+0xfa/0x790 [ 1434.619545][T18231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1434.625418][T18231] RIP: 0033:0x45a919 [ 1434.629368][T18231] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1434.648970][T18231] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1434.657367][T18231] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1434.665323][T18231] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1434.673281][T18231] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1434.681248][T18231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1434.689287][T18231] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00Y\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:34 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:34 executing program 0 (fault-call:7 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x04\x00'}) 08:16:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00=\x00', 0x7302}) 08:16:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x03\xe8\x00', 0x7302}) 08:16:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x05\x00'}) [ 1435.190920][T18261] FAULT_INJECTION: forcing a failure. [ 1435.190920][T18261] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.219542][T18261] CPU: 0 PID: 18261 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1435.228392][T18261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1435.238451][T18261] Call Trace: [ 1435.238481][T18261] dump_stack+0x197/0x210 [ 1435.238500][T18261] should_fail.cold+0xa/0x15 [ 1435.238516][T18261] ? htab_map_alloc+0x8d3/0x11c0 [ 1435.238532][T18261] ? fault_create_debugfs_attr+0x180/0x180 [ 1435.238554][T18261] ? ___might_sleep+0x163/0x2c0 [ 1435.238578][T18261] __should_failslab+0x121/0x190 [ 1435.238598][T18261] should_failslab+0x9/0x14 [ 1435.238618][T18261] kmem_cache_alloc_node+0x268/0x740 [ 1435.250925][T18261] ? ___might_sleep+0x163/0x2c0 [ 1435.250957][T18261] alloc_vmap_area+0x147/0x2030 [ 1435.250983][T18261] ? __get_vm_area_node+0x12b/0x4f0 [ 1435.261717][T18261] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1435.261748][T18261] ? purge_vmap_area_lazy+0x40/0x40 [ 1435.261768][T18261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.261784][T18261] ? debug_smp_processor_id+0x33/0x18a [ 1435.261807][T18261] __get_vm_area_node+0x179/0x4f0 [ 1435.261833][T18261] __vmalloc_node_range+0xd4/0x810 [ 1435.261855][T18261] ? bpf_map_area_alloc+0x20/0x30 [ 1435.271640][T18261] ? kasan_unpoison_shadow+0x35/0x50 08:16:34 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5460, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1435.271663][T18261] ? bpf_map_area_alloc+0x20/0x30 [ 1435.271682][T18261] __vmalloc_node_flags_caller+0x71/0x90 [ 1435.271700][T18261] ? bpf_map_area_alloc+0x20/0x30 [ 1435.271723][T18261] __bpf_map_area_alloc+0xde/0xf0 [ 1435.281504][T18261] bpf_map_area_alloc+0x20/0x30 [ 1435.281523][T18261] htab_map_alloc+0x8d3/0x11c0 [ 1435.281552][T18261] ? htab_map_update_elem+0xca0/0xca0 [ 1435.291219][T18261] __do_sys_bpf+0x478/0x3610 [ 1435.291243][T18261] ? bpf_prog_load+0x1960/0x1960 [ 1435.291259][T18261] ? __kasan_check_write+0x14/0x20 [ 1435.291280][T18261] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1435.302013][T18261] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1435.302032][T18261] ? wait_for_completion+0x440/0x440 [ 1435.302057][T18261] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1435.302087][T18261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1435.313482][T18261] ? do_syscall_64+0x26/0x790 [ 1435.313500][T18261] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1435.313516][T18261] ? do_syscall_64+0x26/0x790 [ 1435.313539][T18261] __x64_sys_bpf+0x73/0xb0 [ 1435.313563][T18261] do_syscall_64+0xfa/0x790 [ 1435.324009][T18261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1435.324021][T18261] RIP: 0033:0x45a919 [ 1435.324039][T18261] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1435.324047][T18261] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1435.324061][T18261] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 08:16:34 executing program 0 (fault-call:7 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1435.324071][T18261] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1435.324080][T18261] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1435.324087][T18261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1435.324101][T18261] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) 08:16:34 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x8933, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1435.662951][T18279] FAULT_INJECTION: forcing a failure. [ 1435.662951][T18279] name failslab, interval 1, probability 0, space 0, times 0 08:16:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe8\x00', 0x7302}) [ 1435.705717][T18279] CPU: 1 PID: 18279 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1435.714455][T18279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1435.724516][T18279] Call Trace: [ 1435.727823][T18279] dump_stack+0x197/0x210 [ 1435.732173][T18279] should_fail.cold+0xa/0x15 [ 1435.736778][T18279] ? fault_create_debugfs_attr+0x180/0x180 [ 1435.743047][T18279] ? ___might_sleep+0x163/0x2c0 [ 1435.747899][T18279] __should_failslab+0x121/0x190 [ 1435.747920][T18279] should_failslab+0x9/0x14 [ 1435.747934][T18279] kmem_cache_alloc_node_trace+0x274/0x750 [ 1435.747950][T18279] ? do_raw_spin_unlock+0x178/0x270 [ 1435.747972][T18279] __kmalloc_node+0x3d/0x70 [ 1435.747988][T18279] __vmalloc_node_range+0x1db/0x810 [ 1435.748012][T18279] ? bpf_map_area_alloc+0x20/0x30 [ 1435.783112][T18279] __vmalloc_node_flags_caller+0x71/0x90 [ 1435.788759][T18279] ? bpf_map_area_alloc+0x20/0x30 [ 1435.793796][T18279] __bpf_map_area_alloc+0xde/0xf0 [ 1435.798840][T18279] bpf_map_area_alloc+0x20/0x30 [ 1435.803698][T18279] htab_map_alloc+0x8d3/0x11c0 [ 1435.808493][T18279] ? htab_map_update_elem+0xca0/0xca0 [ 1435.813877][T18279] __do_sys_bpf+0x478/0x3610 [ 1435.818483][T18279] ? bpf_prog_load+0x1960/0x1960 [ 1435.823441][T18279] ? __kasan_check_write+0x14/0x20 [ 1435.828560][T18279] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1435.834114][T18279] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1435.839413][T18279] ? wait_for_completion+0x440/0x440 [ 1435.844718][T18279] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1435.850978][T18279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1435.856437][T18279] ? do_syscall_64+0x26/0x790 [ 1435.856455][T18279] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1435.856470][T18279] ? do_syscall_64+0x26/0x790 [ 1435.856492][T18279] __x64_sys_bpf+0x73/0xb0 [ 1435.856513][T18279] do_syscall_64+0xfa/0x790 [ 1435.867259][T18279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1435.867273][T18279] RIP: 0033:0x45a919 [ 1435.867288][T18279] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1435.867305][T18279] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1435.876368][T18279] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1435.876378][T18279] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1435.876387][T18279] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1435.876397][T18279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1435.876405][T18279] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:35 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00Z\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 08:16:35 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x894c, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:35 executing program 0 (fault-call:7 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00>\x00', 0x7302}) 08:16:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 1436.417019][T18305] FAULT_INJECTION: forcing a failure. [ 1436.417019][T18305] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.465396][T18305] CPU: 0 PID: 18305 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1436.474108][T18305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1436.474115][T18305] Call Trace: [ 1436.474136][T18305] dump_stack+0x197/0x210 [ 1436.474158][T18305] should_fail.cold+0xa/0x15 [ 1436.474188][T18305] ? fault_create_debugfs_attr+0x180/0x180 [ 1436.502241][T18305] ? ___might_sleep+0x163/0x2c0 [ 1436.507099][T18305] __should_failslab+0x121/0x190 [ 1436.507119][T18305] should_failslab+0x9/0x14 [ 1436.507133][T18305] kmem_cache_alloc_node_trace+0x274/0x750 [ 1436.507150][T18305] ? do_raw_spin_unlock+0x178/0x270 [ 1436.507179][T18305] __kmalloc_node+0x3d/0x70 [ 1436.507200][T18305] __vmalloc_node_range+0x1db/0x810 [ 1436.507227][T18305] ? bpf_map_area_alloc+0x20/0x30 [ 1436.507245][T18305] __vmalloc_node_flags_caller+0x71/0x90 [ 1436.507259][T18305] ? bpf_map_area_alloc+0x20/0x30 [ 1436.507278][T18305] __bpf_map_area_alloc+0xde/0xf0 [ 1436.516696][T18305] bpf_map_area_alloc+0x20/0x30 [ 1436.516715][T18305] htab_map_alloc+0x8d3/0x11c0 [ 1436.516745][T18305] ? htab_map_update_elem+0xca0/0xca0 [ 1436.562979][T18305] __do_sys_bpf+0x478/0x3610 [ 1436.563002][T18305] ? bpf_prog_load+0x1960/0x1960 [ 1436.582630][T18305] ? __kasan_check_write+0x14/0x20 [ 1436.587761][T18305] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1436.593322][T18305] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1436.598963][T18305] ? wait_for_completion+0x440/0x440 [ 1436.598992][T18305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1436.599024][T18305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1436.599041][T18305] ? do_syscall_64+0x26/0x790 [ 1436.599058][T18305] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1436.599074][T18305] ? do_syscall_64+0x26/0x790 [ 1436.599097][T18305] __x64_sys_bpf+0x73/0xb0 [ 1436.599124][T18305] do_syscall_64+0xfa/0x790 [ 1436.616085][T18305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1436.616098][T18305] RIP: 0033:0x45a919 08:16:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xe9\x00', 0x7302}) [ 1436.616115][T18305] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1436.616128][T18305] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1436.626848][T18305] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1436.626858][T18305] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1436.626866][T18305] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1436.626876][T18305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 08:16:35 executing program 0 (fault-call:7 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1436.626885][T18305] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:35 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454d9, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) [ 1436.872943][T18324] FAULT_INJECTION: forcing a failure. [ 1436.872943][T18324] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1436.892883][T18324] CPU: 0 PID: 18324 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1436.901597][T18324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1436.911676][T18324] Call Trace: [ 1436.911704][T18324] dump_stack+0x197/0x210 [ 1436.911726][T18324] should_fail.cold+0xa/0x15 [ 1436.911751][T18324] ? fault_create_debugfs_attr+0x180/0x180 [ 1436.929742][T18324] ? ___might_sleep+0x163/0x2c0 [ 1436.934623][T18324] should_fail_alloc_page+0x50/0x60 [ 1436.940931][T18324] __alloc_pages_nodemask+0x1a1/0x910 [ 1436.946332][T18324] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1436.951901][T18324] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1436.951926][T18324] ? kasan_unpoison_shadow+0x35/0x50 [ 1436.951949][T18324] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1436.969200][T18324] alloc_pages_current+0x107/0x210 [ 1436.974340][T18324] __vmalloc_node_range+0x4f8/0x810 [ 1436.979566][T18324] ? bpf_map_area_alloc+0x20/0x30 [ 1436.984609][T18324] __vmalloc_node_flags_caller+0x71/0x90 [ 1436.990253][T18324] ? bpf_map_area_alloc+0x20/0x30 [ 1436.995297][T18324] __bpf_map_area_alloc+0xde/0xf0 [ 1437.000352][T18324] bpf_map_area_alloc+0x20/0x30 [ 1437.005219][T18324] htab_map_alloc+0x8d3/0x11c0 [ 1437.010009][T18324] ? htab_map_update_elem+0xca0/0xca0 [ 1437.015398][T18324] __do_sys_bpf+0x478/0x3610 [ 1437.020008][T18324] ? bpf_prog_load+0x1960/0x1960 [ 1437.024963][T18324] ? __kasan_check_write+0x14/0x20 [ 1437.030085][T18324] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1437.035645][T18324] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1437.040955][T18324] ? wait_for_completion+0x440/0x440 [ 1437.046266][T18324] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1437.052544][T18324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1437.058019][T18324] ? do_syscall_64+0x26/0x790 [ 1437.062711][T18324] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.068789][T18324] ? do_syscall_64+0x26/0x790 08:16:35 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x40049409, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 1437.073477][T18324] __x64_sys_bpf+0x73/0xb0 [ 1437.077911][T18324] do_syscall_64+0xfa/0x790 [ 1437.082444][T18324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.088345][T18324] RIP: 0033:0x45a919 [ 1437.092337][T18324] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.111953][T18324] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1437.120368][T18324] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1437.128342][T18324] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1437.136328][T18324] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1437.144323][T18324] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1437.152299][T18324] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00[\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:36 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x40186366, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00?\x00', 0x7302}) 08:16:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00@\x00'}) 08:16:36 executing program 0 (fault-call:7 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xea\x00', 0x7302}) 08:16:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00`\x00\xa0\x00'}) [ 1437.696198][T18357] FAULT_INJECTION: forcing a failure. [ 1437.696198][T18357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1437.734902][T18357] CPU: 0 PID: 18357 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1437.743639][T18357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1437.743646][T18357] Call Trace: [ 1437.743667][T18357] dump_stack+0x197/0x210 [ 1437.743690][T18357] should_fail.cold+0xa/0x15 [ 1437.743710][T18357] ? fault_create_debugfs_attr+0x180/0x180 [ 1437.743728][T18357] ? ___might_sleep+0x163/0x2c0 [ 1437.743754][T18357] should_fail_alloc_page+0x50/0x60 [ 1437.781805][T18357] __alloc_pages_nodemask+0x1a1/0x910 [ 1437.781825][T18357] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1437.781841][T18357] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1437.781863][T18357] ? kasan_unpoison_shadow+0x35/0x50 [ 1437.803733][T18357] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1437.803757][T18357] alloc_pages_current+0x107/0x210 [ 1437.803772][T18357] ? ___might_sleep+0x163/0x2c0 [ 1437.803795][T18357] __vmalloc_node_range+0x4f8/0x810 [ 1437.825159][T18357] ? bpf_map_area_alloc+0x20/0x30 [ 1437.830197][T18357] __vmalloc_node_flags_caller+0x71/0x90 [ 1437.835964][T18357] ? bpf_map_area_alloc+0x20/0x30 [ 1437.841002][T18357] __bpf_map_area_alloc+0xde/0xf0 [ 1437.846035][T18357] bpf_map_area_alloc+0x20/0x30 [ 1437.846052][T18357] htab_map_alloc+0x8d3/0x11c0 [ 1437.846082][T18357] ? htab_map_update_elem+0xca0/0xca0 [ 1437.846099][T18357] __do_sys_bpf+0x478/0x3610 [ 1437.846121][T18357] ? bpf_prog_load+0x1960/0x1960 [ 1437.846139][T18357] ? __kasan_check_write+0x14/0x20 [ 1437.846157][T18357] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1437.846174][T18357] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1437.846192][T18357] ? wait_for_completion+0x440/0x440 08:16:36 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x4020940d, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1437.846218][T18357] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1437.846250][T18357] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1437.846265][T18357] ? do_syscall_64+0x26/0x790 [ 1437.846282][T18357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.846298][T18357] ? do_syscall_64+0x26/0x790 [ 1437.846321][T18357] __x64_sys_bpf+0x73/0xb0 [ 1437.846340][T18357] do_syscall_64+0xfa/0x790 [ 1437.846366][T18357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1437.865898][T18357] RIP: 0033:0x45a919 [ 1437.865914][T18357] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.865922][T18357] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1437.865937][T18357] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1437.865945][T18357] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1437.865952][T18357] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 08:16:36 executing program 0 (fault-call:7 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1437.865960][T18357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1437.865968][T18357] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x80\x00\xa0\x00'}) 08:16:37 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x800454cf, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) [ 1438.128966][T18373] FAULT_INJECTION: forcing a failure. [ 1438.128966][T18373] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1438.168496][T18373] CPU: 0 PID: 18373 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1438.177910][T18373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1438.187969][T18373] Call Trace: [ 1438.191260][T18373] dump_stack+0x197/0x210 [ 1438.195596][T18373] should_fail.cold+0xa/0x15 [ 1438.200187][T18373] ? fault_create_debugfs_attr+0x180/0x180 [ 1438.205984][T18373] ? ___might_sleep+0x163/0x2c0 [ 1438.210849][T18373] should_fail_alloc_page+0x50/0x60 [ 1438.216042][T18373] __alloc_pages_nodemask+0x1a1/0x910 [ 1438.221405][T18373] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1438.226943][T18373] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1438.232790][T18373] ? kasan_unpoison_shadow+0x35/0x50 [ 1438.238081][T18373] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1438.244318][T18373] alloc_pages_current+0x107/0x210 [ 1438.249421][T18373] ? ___might_sleep+0x163/0x2c0 [ 1438.254269][T18373] __vmalloc_node_range+0x4f8/0x810 [ 1438.259462][T18373] ? bpf_map_area_alloc+0x20/0x30 [ 1438.264472][T18373] __vmalloc_node_flags_caller+0x71/0x90 [ 1438.270088][T18373] ? bpf_map_area_alloc+0x20/0x30 [ 1438.275099][T18373] __bpf_map_area_alloc+0xde/0xf0 [ 1438.280118][T18373] bpf_map_area_alloc+0x20/0x30 [ 1438.284970][T18373] htab_map_alloc+0x8d3/0x11c0 [ 1438.289749][T18373] ? htab_map_update_elem+0xca0/0xca0 [ 1438.295131][T18373] __do_sys_bpf+0x478/0x3610 [ 1438.299738][T18373] ? bpf_prog_load+0x1960/0x1960 [ 1438.304674][T18373] ? __kasan_check_write+0x14/0x20 [ 1438.309783][T18373] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1438.315363][T18373] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1438.320640][T18373] ? wait_for_completion+0x440/0x440 [ 1438.325930][T18373] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1438.332256][T18373] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1438.337728][T18373] ? do_syscall_64+0x26/0x790 [ 1438.342406][T18373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.348456][T18373] ? do_syscall_64+0x26/0x790 [ 1438.353129][T18373] __x64_sys_bpf+0x73/0xb0 [ 1438.357532][T18373] do_syscall_64+0xfa/0x790 [ 1438.362028][T18373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1438.367939][T18373] RIP: 0033:0x45a919 [ 1438.371840][T18373] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1438.391437][T18373] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1438.399837][T18373] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1438.407812][T18373] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1438.415767][T18373] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 08:16:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xeb\x00', 0x7302}) [ 1438.423812][T18373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1438.431771][T18373] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:37 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00\\\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\xff\x00'}) 08:16:37 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x80086301, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:37 executing program 0 (fault-call:7 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00@\x00', 0x7302}) 08:16:38 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0045878, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xec\x00', 0x7302}) [ 1438.994168][T18404] FAULT_INJECTION: forcing a failure. [ 1438.994168][T18404] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1439.084578][T18404] CPU: 1 PID: 18404 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1439.093292][T18404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1439.103338][T18404] Call Trace: [ 1439.106627][T18404] dump_stack+0x197/0x210 [ 1439.110952][T18404] should_fail.cold+0xa/0x15 [ 1439.115586][T18404] ? fault_create_debugfs_attr+0x180/0x180 [ 1439.121468][T18404] ? ___might_sleep+0x163/0x2c0 [ 1439.126338][T18404] should_fail_alloc_page+0x50/0x60 [ 1439.131540][T18404] __alloc_pages_nodemask+0x1a1/0x910 [ 1439.136912][T18404] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1439.142460][T18404] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1439.148529][T18404] ? kasan_unpoison_shadow+0x35/0x50 [ 1439.153802][T18404] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1439.160035][T18404] alloc_pages_current+0x107/0x210 [ 1439.165158][T18404] ? ___might_sleep+0x163/0x2c0 [ 1439.170961][T18404] __vmalloc_node_range+0x4f8/0x810 [ 1439.176156][T18404] ? bpf_map_area_alloc+0x20/0x30 [ 1439.181169][T18404] __vmalloc_node_flags_caller+0x71/0x90 [ 1439.186787][T18404] ? bpf_map_area_alloc+0x20/0x30 [ 1439.191800][T18404] __bpf_map_area_alloc+0xde/0xf0 [ 1439.196814][T18404] bpf_map_area_alloc+0x20/0x30 [ 1439.201651][T18404] htab_map_alloc+0x8d3/0x11c0 [ 1439.206501][T18404] ? htab_map_update_elem+0xca0/0xca0 [ 1439.211970][T18404] __do_sys_bpf+0x478/0x3610 [ 1439.216551][T18404] ? bpf_prog_load+0x1960/0x1960 [ 1439.221560][T18404] ? __kasan_check_write+0x14/0x20 [ 1439.226832][T18404] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1439.233776][T18404] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1439.240847][T18404] ? wait_for_completion+0x440/0x440 [ 1439.246154][T18404] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1439.252417][T18404] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1439.257892][T18404] ? do_syscall_64+0x26/0x790 [ 1439.262649][T18404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1439.269485][T18404] ? do_syscall_64+0x26/0x790 [ 1439.274154][T18404] __x64_sys_bpf+0x73/0xb0 [ 1439.278565][T18404] do_syscall_64+0xfa/0x790 [ 1439.283071][T18404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1439.288952][T18404] RIP: 0033:0x45a919 [ 1439.292836][T18404] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1439.312424][T18404] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1439.320835][T18404] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1439.328796][T18404] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 08:16:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00`\x00'}) [ 1439.336753][T18404] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1439.344713][T18404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1439.352683][T18404] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}) 08:16:38 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0045878, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}) 08:16:38 executing program 0 (fault-call:7 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1439.716417][T18429] FAULT_INJECTION: forcing a failure. [ 1439.716417][T18429] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1439.745797][T18429] CPU: 1 PID: 18429 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1439.754504][T18429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1439.754510][T18429] Call Trace: [ 1439.754534][T18429] dump_stack+0x197/0x210 [ 1439.754555][T18429] should_fail.cold+0xa/0x15 [ 1439.754574][T18429] ? fault_create_debugfs_attr+0x180/0x180 [ 1439.754591][T18429] ? ___might_sleep+0x163/0x2c0 [ 1439.754616][T18429] should_fail_alloc_page+0x50/0x60 [ 1439.754631][T18429] __alloc_pages_nodemask+0x1a1/0x910 [ 1439.754649][T18429] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1439.754667][T18429] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1439.754690][T18429] ? kasan_unpoison_shadow+0x35/0x50 [ 1439.754709][T18429] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1439.754729][T18429] alloc_pages_current+0x107/0x210 [ 1439.754742][T18429] ? ___might_sleep+0x163/0x2c0 [ 1439.754766][T18429] __vmalloc_node_range+0x4f8/0x810 [ 1439.782799][T18429] ? bpf_map_area_alloc+0x20/0x30 [ 1439.782820][T18429] __vmalloc_node_flags_caller+0x71/0x90 [ 1439.782835][T18429] ? bpf_map_area_alloc+0x20/0x30 [ 1439.782854][T18429] __bpf_map_area_alloc+0xde/0xf0 [ 1439.792879][T18429] bpf_map_area_alloc+0x20/0x30 [ 1439.792899][T18429] htab_map_alloc+0x8d3/0x11c0 [ 1439.792933][T18429] ? htab_map_update_elem+0xca0/0xca0 [ 1439.803818][T18429] __do_sys_bpf+0x478/0x3610 [ 1439.803843][T18429] ? bpf_prog_load+0x1960/0x1960 [ 1439.803859][T18429] ? __kasan_check_write+0x14/0x20 [ 1439.803879][T18429] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1439.891938][T18429] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1439.897248][T18429] ? wait_for_completion+0x440/0x440 [ 1439.902532][T18429] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1439.908777][T18429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1439.914235][T18429] ? do_syscall_64+0x26/0x790 [ 1439.918917][T18429] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1439.924981][T18429] ? do_syscall_64+0x26/0x790 [ 1439.929658][T18429] __x64_sys_bpf+0x73/0xb0 [ 1439.934064][T18429] do_syscall_64+0xfa/0x790 [ 1439.938557][T18429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1439.944446][T18429] RIP: 0033:0x45a919 [ 1439.948421][T18429] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1439.968016][T18429] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1439.976425][T18429] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1439.984403][T18429] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1439.992375][T18429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1440.000334][T18429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1440.008299][T18429] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:39 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00]\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:39 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0189436, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}) 08:16:39 executing program 0 (fault-call:7 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xed\x00', 0x7302}) 08:16:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00A\x00', 0x7302}) 08:16:39 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc020660b, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) 08:16:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03'}) [ 1440.366162][T18457] FAULT_INJECTION: forcing a failure. [ 1440.366162][T18457] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1440.391138][T18457] CPU: 0 PID: 18457 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1440.399861][T18457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.409928][T18457] Call Trace: [ 1440.413225][T18457] dump_stack+0x197/0x210 [ 1440.413249][T18457] should_fail.cold+0xa/0x15 [ 1440.413269][T18457] ? fault_create_debugfs_attr+0x180/0x180 [ 1440.413287][T18457] ? ___might_sleep+0x163/0x2c0 [ 1440.413316][T18457] should_fail_alloc_page+0x50/0x60 [ 1440.413331][T18457] __alloc_pages_nodemask+0x1a1/0x910 [ 1440.413355][T18457] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1440.449002][T18457] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1440.454736][T18457] ? kasan_unpoison_shadow+0x35/0x50 [ 1440.454757][T18457] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1440.454777][T18457] alloc_pages_current+0x107/0x210 [ 1440.454791][T18457] ? ___might_sleep+0x163/0x2c0 [ 1440.454812][T18457] __vmalloc_node_range+0x4f8/0x810 [ 1440.454879][T18457] ? bpf_map_area_alloc+0x20/0x30 [ 1440.454898][T18457] __vmalloc_node_flags_caller+0x71/0x90 [ 1440.454914][T18457] ? bpf_map_area_alloc+0x20/0x30 [ 1440.454933][T18457] __bpf_map_area_alloc+0xde/0xf0 [ 1440.454956][T18457] bpf_map_area_alloc+0x20/0x30 [ 1440.471570][T18457] htab_map_alloc+0x8d3/0x11c0 [ 1440.471604][T18457] ? htab_map_update_elem+0xca0/0xca0 [ 1440.471623][T18457] __do_sys_bpf+0x478/0x3610 [ 1440.471646][T18457] ? bpf_prog_load+0x1960/0x1960 [ 1440.471662][T18457] ? __kasan_check_write+0x14/0x20 [ 1440.471676][T18457] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1440.471696][T18457] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1440.486738][T18457] ? wait_for_completion+0x440/0x440 [ 1440.486767][T18457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1440.486797][T18457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1440.486815][T18457] ? do_syscall_64+0x26/0x790 [ 1440.486837][T18457] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1440.486853][T18457] ? do_syscall_64+0x26/0x790 [ 1440.486878][T18457] __x64_sys_bpf+0x73/0xb0 [ 1440.486897][T18457] do_syscall_64+0xfa/0x790 [ 1440.486919][T18457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1440.486931][T18457] RIP: 0033:0x45a919 [ 1440.486946][T18457] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:16:39 executing program 0 (fault-call:7 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1440.486959][T18457] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1440.502610][T18457] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1440.502620][T18457] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1440.502628][T18457] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1440.502638][T18457] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1440.502647][T18457] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:39 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'%r0\x01\x00', 0x7302}) 08:16:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}) [ 1440.732544][T18466] FAULT_INJECTION: forcing a failure. [ 1440.732544][T18466] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1440.815060][T18466] CPU: 0 PID: 18466 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1440.823792][T18466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.833854][T18466] Call Trace: [ 1440.837169][T18466] dump_stack+0x197/0x210 [ 1440.841517][T18466] should_fail.cold+0xa/0x15 [ 1440.846129][T18466] ? fault_create_debugfs_attr+0x180/0x180 [ 1440.851953][T18466] ? ___might_sleep+0x163/0x2c0 [ 1440.856834][T18466] should_fail_alloc_page+0x50/0x60 [ 1440.862046][T18466] __alloc_pages_nodemask+0x1a1/0x910 [ 1440.867430][T18466] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1440.872993][T18466] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1440.878719][T18466] ? kasan_unpoison_shadow+0x35/0x50 [ 1440.884065][T18466] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1440.890363][T18466] alloc_pages_current+0x107/0x210 [ 1440.895606][T18466] ? ___might_sleep+0x163/0x2c0 [ 1440.900461][T18466] __vmalloc_node_range+0x4f8/0x810 [ 1440.905654][T18466] ? bpf_map_area_alloc+0x20/0x30 [ 1440.910680][T18466] __vmalloc_node_flags_caller+0x71/0x90 [ 1440.916410][T18466] ? bpf_map_area_alloc+0x20/0x30 [ 1440.922109][T18466] __bpf_map_area_alloc+0xde/0xf0 [ 1440.927270][T18466] bpf_map_area_alloc+0x20/0x30 [ 1440.932119][T18466] htab_map_alloc+0x8d3/0x11c0 [ 1440.936886][T18466] ? htab_map_update_elem+0xca0/0xca0 [ 1440.942253][T18466] __do_sys_bpf+0x478/0x3610 [ 1440.946835][T18466] ? bpf_prog_load+0x1960/0x1960 [ 1440.951756][T18466] ? __kasan_check_write+0x14/0x20 [ 1440.956871][T18466] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1440.962433][T18466] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1440.967723][T18466] ? wait_for_completion+0x440/0x440 [ 1440.973067][T18466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1440.979312][T18466] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1440.984768][T18466] ? do_syscall_64+0x26/0x790 [ 1440.989452][T18466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1440.995511][T18466] ? do_syscall_64+0x26/0x790 [ 1441.000203][T18466] __x64_sys_bpf+0x73/0xb0 [ 1441.004643][T18466] do_syscall_64+0xfa/0x790 [ 1441.009167][T18466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.015067][T18466] RIP: 0033:0x45a919 [ 1441.018955][T18466] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1441.038558][T18466] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1441.046975][T18466] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1441.054943][T18466] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 08:16:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05'}) [ 1441.062951][T18466] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1441.070917][T18466] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1441.078912][T18466] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00^\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:40 executing program 0 (fault-call:7 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06'}) 08:16:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xee\x00', 0x7302}) 08:16:40 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/r0\x01\x00', 0x7302}) 08:16:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00B\x00', 0x7302}) [ 1441.704230][T18502] FAULT_INJECTION: forcing a failure. [ 1441.704230][T18502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1441.721740][T18502] CPU: 1 PID: 18502 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1441.730423][T18502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.740482][T18502] Call Trace: [ 1441.743778][T18502] dump_stack+0x197/0x210 [ 1441.748120][T18502] should_fail.cold+0xa/0x15 [ 1441.752701][T18502] ? fault_create_debugfs_attr+0x180/0x180 [ 1441.758524][T18502] ? ___might_sleep+0x163/0x2c0 [ 1441.763392][T18502] should_fail_alloc_page+0x50/0x60 [ 1441.768864][T18502] __alloc_pages_nodemask+0x1a1/0x910 [ 1441.774236][T18502] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1441.779947][T18502] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1441.785659][T18502] ? kasan_unpoison_shadow+0x35/0x50 [ 1441.790939][T18502] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1441.797184][T18502] alloc_pages_current+0x107/0x210 [ 1441.802283][T18502] ? ___might_sleep+0x163/0x2c0 [ 1441.807134][T18502] __vmalloc_node_range+0x4f8/0x810 [ 1441.812543][T18502] ? bpf_map_area_alloc+0x20/0x30 [ 1441.817583][T18502] __vmalloc_node_flags_caller+0x71/0x90 [ 1441.823217][T18502] ? bpf_map_area_alloc+0x20/0x30 [ 1441.828244][T18502] __bpf_map_area_alloc+0xde/0xf0 [ 1441.833274][T18502] bpf_map_area_alloc+0x20/0x30 [ 1441.838116][T18502] htab_map_alloc+0x8d3/0x11c0 [ 1441.842897][T18502] ? htab_map_update_elem+0xca0/0xca0 [ 1441.848270][T18502] __do_sys_bpf+0x478/0x3610 [ 1441.852883][T18502] ? bpf_prog_load+0x1960/0x1960 [ 1441.857844][T18502] ? __kasan_check_write+0x14/0x20 [ 1441.862963][T18502] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1441.868503][T18502] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1441.873772][T18502] ? wait_for_completion+0x440/0x440 [ 1441.879058][T18502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1441.885308][T18502] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1441.890763][T18502] ? do_syscall_64+0x26/0x790 [ 1441.895431][T18502] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.901483][T18502] ? do_syscall_64+0x26/0x790 [ 1441.906154][T18502] __x64_sys_bpf+0x73/0xb0 [ 1441.910556][T18502] do_syscall_64+0xfa/0x790 [ 1441.915061][T18502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1441.920950][T18502] RIP: 0033:0x45a919 [ 1441.924839][T18502] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1441.944436][T18502] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1441.952854][T18502] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1441.960816][T18502] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1441.968786][T18502] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1441.976762][T18502] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1441.984834][T18502] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:41 executing program 0 (fault-call:7 fault-nth:14): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}) [ 1442.230153][T18512] FAULT_INJECTION: forcing a failure. [ 1442.230153][T18512] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1442.243788][T18512] CPU: 0 PID: 18512 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1442.252481][T18512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.262654][T18512] Call Trace: [ 1442.265961][T18512] dump_stack+0x197/0x210 [ 1442.270288][T18512] should_fail.cold+0xa/0x15 [ 1442.274895][T18512] ? fault_create_debugfs_attr+0x180/0x180 [ 1442.280700][T18512] ? ___might_sleep+0x163/0x2c0 [ 1442.285552][T18512] should_fail_alloc_page+0x50/0x60 [ 1442.290741][T18512] __alloc_pages_nodemask+0x1a1/0x910 [ 1442.296114][T18512] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1442.301663][T18512] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1442.307379][T18512] ? kasan_unpoison_shadow+0x35/0x50 [ 1442.312662][T18512] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1442.318893][T18512] alloc_pages_current+0x107/0x210 [ 1442.324000][T18512] ? ___might_sleep+0x163/0x2c0 [ 1442.328863][T18512] __vmalloc_node_range+0x4f8/0x810 [ 1442.334242][T18512] ? bpf_map_area_alloc+0x20/0x30 [ 1442.339273][T18512] __vmalloc_node_flags_caller+0x71/0x90 [ 1442.346142][T18512] ? bpf_map_area_alloc+0x20/0x30 [ 1442.351158][T18512] __bpf_map_area_alloc+0xde/0xf0 [ 1442.356177][T18512] bpf_map_area_alloc+0x20/0x30 [ 1442.361026][T18512] htab_map_alloc+0x8d3/0x11c0 [ 1442.365888][T18512] ? htab_map_update_elem+0xca0/0xca0 [ 1442.371279][T18512] __do_sys_bpf+0x478/0x3610 [ 1442.375861][T18512] ? bpf_prog_load+0x1960/0x1960 [ 1442.380813][T18512] ? __kasan_check_write+0x14/0x20 [ 1442.385922][T18512] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1442.391462][T18512] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1442.396829][T18512] ? wait_for_completion+0x440/0x440 [ 1442.402135][T18512] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1442.408377][T18512] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1442.414255][T18512] ? do_syscall_64+0x26/0x790 [ 1442.418931][T18512] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1442.425009][T18512] ? do_syscall_64+0x26/0x790 [ 1442.429706][T18512] __x64_sys_bpf+0x73/0xb0 [ 1442.434137][T18512] do_syscall_64+0xfa/0x790 [ 1442.438648][T18512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1442.444536][T18512] RIP: 0033:0x45a919 [ 1442.448433][T18512] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1442.468196][T18512] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1442.477062][T18512] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1442.485033][T18512] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1442.493793][T18512] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1442.501777][T18512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1442.509733][T18512] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:41 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={':r0\x01\x00', 0x7302}) 08:16:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b'}) 08:16:41 executing program 0 (fault-call:7 fault-nth:15): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1442.752131][T18525] FAULT_INJECTION: forcing a failure. [ 1442.752131][T18525] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1442.765833][T18525] CPU: 1 PID: 18525 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1442.774513][T18525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.784576][T18525] Call Trace: [ 1442.787912][T18525] dump_stack+0x197/0x210 [ 1442.792263][T18525] should_fail.cold+0xa/0x15 [ 1442.796858][T18525] ? fault_create_debugfs_attr+0x180/0x180 [ 1442.802682][T18525] ? ___might_sleep+0x163/0x2c0 [ 1442.807563][T18525] should_fail_alloc_page+0x50/0x60 [ 1442.812765][T18525] __alloc_pages_nodemask+0x1a1/0x910 [ 1442.818138][T18525] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1442.823691][T18525] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1442.829414][T18525] ? kasan_unpoison_shadow+0x35/0x50 [ 1442.834703][T18525] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1442.840957][T18525] alloc_pages_current+0x107/0x210 [ 1442.846252][T18525] ? ___might_sleep+0x163/0x2c0 [ 1442.851110][T18525] __vmalloc_node_range+0x4f8/0x810 [ 1442.856332][T18525] ? bpf_map_area_alloc+0x20/0x30 [ 1442.861451][T18525] __vmalloc_node_flags_caller+0x71/0x90 [ 1442.867083][T18525] ? bpf_map_area_alloc+0x20/0x30 [ 1442.872136][T18525] __bpf_map_area_alloc+0xde/0xf0 [ 1442.877160][T18525] bpf_map_area_alloc+0x20/0x30 [ 1442.882012][T18525] htab_map_alloc+0x8d3/0x11c0 [ 1442.886770][T18525] ? htab_map_update_elem+0xca0/0xca0 [ 1442.892125][T18525] __do_sys_bpf+0x478/0x3610 [ 1442.896717][T18525] ? bpf_prog_load+0x1960/0x1960 [ 1442.901653][T18525] ? __kasan_check_write+0x14/0x20 [ 1442.906763][T18525] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1442.912318][T18525] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1442.917612][T18525] ? wait_for_completion+0x440/0x440 [ 1442.922900][T18525] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1442.929158][T18525] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1442.934624][T18525] ? do_syscall_64+0x26/0x790 [ 1442.939320][T18525] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1442.945394][T18525] ? do_syscall_64+0x26/0x790 [ 1442.950086][T18525] __x64_sys_bpf+0x73/0xb0 [ 1442.954514][T18525] do_syscall_64+0xfa/0x790 [ 1442.959029][T18525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1442.964925][T18525] RIP: 0033:0x45a919 [ 1442.968829][T18525] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1442.988517][T18525] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1442.996921][T18525] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1443.004898][T18525] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1443.012925][T18525] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1443.020889][T18525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1443.028860][T18525] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:42 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\\r0\x01\x00', 0x7302}) 08:16:42 executing program 0 (fault-call:7 fault-nth:16): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00C\x00', 0x7302}) 08:16:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10'}) 08:16:42 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00_\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xef\x00', 0x7302}) 08:16:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?'}) [ 1443.393919][T18548] FAULT_INJECTION: forcing a failure. [ 1443.393919][T18548] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1443.433038][T18548] CPU: 0 PID: 18548 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1443.441756][T18548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.441763][T18548] Call Trace: [ 1443.441784][T18548] dump_stack+0x197/0x210 [ 1443.441807][T18548] should_fail.cold+0xa/0x15 [ 1443.441828][T18548] ? fault_create_debugfs_attr+0x180/0x180 [ 1443.441844][T18548] ? ___might_sleep+0x163/0x2c0 [ 1443.441869][T18548] should_fail_alloc_page+0x50/0x60 [ 1443.441884][T18548] __alloc_pages_nodemask+0x1a1/0x910 [ 1443.441900][T18548] ? rcu_read_lock_sched_held+0x9c/0xd0 08:16:42 executing program 0 (fault-call:7 fault-nth:17): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1443.441916][T18548] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1443.441939][T18548] ? kasan_unpoison_shadow+0x35/0x50 [ 1443.441958][T18548] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1443.441978][T18548] alloc_pages_current+0x107/0x210 [ 1443.441991][T18548] ? ___might_sleep+0x163/0x2c0 [ 1443.442010][T18548] __vmalloc_node_range+0x4f8/0x810 [ 1443.442036][T18548] ? bpf_map_area_alloc+0x20/0x30 [ 1443.442058][T18548] __vmalloc_node_flags_caller+0x71/0x90 [ 1443.464311][T18548] ? bpf_map_area_alloc+0x20/0x30 [ 1443.464332][T18548] __bpf_map_area_alloc+0xde/0xf0 [ 1443.464351][T18548] bpf_map_area_alloc+0x20/0x30 [ 1443.464368][T18548] htab_map_alloc+0x8d3/0x11c0 [ 1443.464396][T18548] ? htab_map_update_elem+0xca0/0xca0 [ 1443.464416][T18548] __do_sys_bpf+0x478/0x3610 [ 1443.475054][T18548] ? bpf_prog_load+0x1960/0x1960 [ 1443.475072][T18548] ? __kasan_check_write+0x14/0x20 [ 1443.475089][T18548] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1443.475105][T18548] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1443.475127][T18548] ? wait_for_completion+0x440/0x440 [ 1443.475150][T18548] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1443.485705][T18548] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1443.485723][T18548] ? do_syscall_64+0x26/0x790 [ 1443.485742][T18548] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1443.485757][T18548] ? do_syscall_64+0x26/0x790 [ 1443.485779][T18548] __x64_sys_bpf+0x73/0xb0 [ 1443.485802][T18548] do_syscall_64+0xfa/0x790 [ 1443.497044][T18548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1443.497057][T18548] RIP: 0033:0x45a919 [ 1443.497074][T18548] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1443.497082][T18548] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1443.497097][T18548] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1443.497110][T18548] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1443.497118][T18548] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1443.497132][T18548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1443.508616][T18548] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1443.757243][T18561] FAULT_INJECTION: forcing a failure. [ 1443.757243][T18561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1443.786816][T18561] CPU: 1 PID: 18561 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1443.795530][T18561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.805585][T18561] Call Trace: [ 1443.808891][T18561] dump_stack+0x197/0x210 [ 1443.813229][T18561] should_fail.cold+0xa/0x15 [ 1443.817818][T18561] ? fault_create_debugfs_attr+0x180/0x180 [ 1443.823631][T18561] ? ___might_sleep+0x163/0x2c0 [ 1443.829267][T18561] should_fail_alloc_page+0x50/0x60 [ 1443.834473][T18561] __alloc_pages_nodemask+0x1a1/0x910 [ 1443.839835][T18561] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1443.845372][T18561] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1443.851098][T18561] ? kasan_unpoison_shadow+0x35/0x50 [ 1443.856378][T18561] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1443.862608][T18561] alloc_pages_current+0x107/0x210 [ 1443.867712][T18561] ? ___might_sleep+0x163/0x2c0 [ 1443.872558][T18561] __vmalloc_node_range+0x4f8/0x810 [ 1443.877752][T18561] ? bpf_map_area_alloc+0x20/0x30 [ 1443.882762][T18561] __vmalloc_node_flags_caller+0x71/0x90 [ 1443.888379][T18561] ? bpf_map_area_alloc+0x20/0x30 [ 1443.893392][T18561] __bpf_map_area_alloc+0xde/0xf0 [ 1443.898419][T18561] bpf_map_area_alloc+0x20/0x30 [ 1443.903519][T18561] htab_map_alloc+0x8d3/0x11c0 [ 1443.908290][T18561] ? htab_map_update_elem+0xca0/0xca0 [ 1443.913657][T18561] __do_sys_bpf+0x478/0x3610 [ 1443.918246][T18561] ? bpf_prog_load+0x1960/0x1960 [ 1443.923169][T18561] ? __kasan_check_write+0x14/0x20 [ 1443.928267][T18561] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1443.933796][T18561] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1443.939067][T18561] ? wait_for_completion+0x440/0x440 [ 1443.944348][T18561] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1443.950592][T18561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1443.956036][T18561] ? do_syscall_64+0x26/0x790 [ 1443.960699][T18561] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1443.966752][T18561] ? do_syscall_64+0x26/0x790 [ 1443.971419][T18561] __x64_sys_bpf+0x73/0xb0 [ 1443.975820][T18561] do_syscall_64+0xfa/0x790 [ 1443.980320][T18561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1443.986202][T18561] RIP: 0033:0x45a919 08:16:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@'}) [ 1443.990092][T18561] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1444.009683][T18561] RSP: 002b:00007f30aab23c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1444.018086][T18561] RAX: ffffffffffffffda RBX: 00007f30aab23c90 RCX: 000000000045a919 [ 1444.026054][T18561] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1444.034011][T18561] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1444.041968][T18561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab246d4 [ 1444.049925][T18561] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:43 executing program 0 (fault-call:7 fault-nth:18): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff'}) [ 1444.206345][T18567] FAULT_INJECTION: forcing a failure. [ 1444.206345][T18567] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1444.228707][T18567] CPU: 0 PID: 18567 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1444.237416][T18567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.237423][T18567] Call Trace: [ 1444.237444][T18567] dump_stack+0x197/0x210 [ 1444.237466][T18567] should_fail.cold+0xa/0x15 [ 1444.237487][T18567] ? fault_create_debugfs_attr+0x180/0x180 [ 1444.250858][T18567] ? ___might_sleep+0x163/0x2c0 [ 1444.250890][T18567] should_fail_alloc_page+0x50/0x60 [ 1444.250904][T18567] __alloc_pages_nodemask+0x1a1/0x910 [ 1444.250924][T18567] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1444.259824][T18567] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1444.259851][T18567] ? kasan_unpoison_shadow+0x35/0x50 [ 1444.259869][T18567] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1444.259890][T18567] alloc_pages_current+0x107/0x210 [ 1444.270509][T18567] ? ___might_sleep+0x163/0x2c0 [ 1444.270532][T18567] __vmalloc_node_range+0x4f8/0x810 [ 1444.270561][T18567] ? bpf_map_area_alloc+0x20/0x30 [ 1444.270582][T18567] __vmalloc_node_flags_caller+0x71/0x90 [ 1444.281121][T18567] ? bpf_map_area_alloc+0x20/0x30 [ 1444.281140][T18567] __bpf_map_area_alloc+0xde/0xf0 [ 1444.281161][T18567] bpf_map_area_alloc+0x20/0x30 [ 1444.281175][T18567] htab_map_alloc+0x8d3/0x11c0 [ 1444.281204][T18567] ? htab_map_update_elem+0xca0/0xca0 [ 1444.292533][T18567] __do_sys_bpf+0x478/0x3610 [ 1444.292594][T18567] ? bpf_prog_load+0x1960/0x1960 [ 1444.292613][T18567] ? __kasan_check_write+0x14/0x20 [ 1444.292631][T18567] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1444.292647][T18567] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1444.292668][T18567] ? wait_for_completion+0x440/0x440 [ 1444.385465][T18567] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1444.391753][T18567] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1444.397229][T18567] ? do_syscall_64+0x26/0x790 [ 1444.401928][T18567] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.407991][T18567] ? do_syscall_64+0x26/0x790 [ 1444.412669][T18567] __x64_sys_bpf+0x73/0xb0 [ 1444.417094][T18567] do_syscall_64+0xfa/0x790 [ 1444.421617][T18567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.427507][T18567] RIP: 0033:0x45a919 [ 1444.431385][T18567] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:16:43 executing program 0 (fault-call:7 fault-nth:19): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1444.451120][T18567] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1444.459562][T18567] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1444.467516][T18567] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1444.475469][T18567] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1444.483519][T18567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1444.491491][T18567] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:43 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'n%0\x01\x00', 0x7302}) 08:16:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00`\x00\xa0\xff\xff\xff\xff'}) [ 1444.637092][T18580] FAULT_INJECTION: forcing a failure. [ 1444.637092][T18580] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1444.685764][T18580] CPU: 0 PID: 18580 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1444.694492][T18580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.704559][T18580] Call Trace: [ 1444.707867][T18580] dump_stack+0x197/0x210 [ 1444.712219][T18580] should_fail.cold+0xa/0x15 [ 1444.716833][T18580] ? fault_create_debugfs_attr+0x180/0x180 [ 1444.722682][T18580] ? ___might_sleep+0x163/0x2c0 [ 1444.727559][T18580] should_fail_alloc_page+0x50/0x60 [ 1444.732776][T18580] __alloc_pages_nodemask+0x1a1/0x910 [ 1444.738286][T18580] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1444.743863][T18580] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1444.749581][T18580] ? kasan_unpoison_shadow+0x35/0x50 [ 1444.754854][T18580] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1444.761095][T18580] alloc_pages_current+0x107/0x210 [ 1444.766191][T18580] ? ___might_sleep+0x163/0x2c0 [ 1444.771029][T18580] __vmalloc_node_range+0x4f8/0x810 [ 1444.776213][T18580] ? bpf_map_area_alloc+0x20/0x30 [ 1444.781224][T18580] __vmalloc_node_flags_caller+0x71/0x90 [ 1444.786849][T18580] ? bpf_map_area_alloc+0x20/0x30 [ 1444.791864][T18580] __bpf_map_area_alloc+0xde/0xf0 [ 1444.796877][T18580] bpf_map_area_alloc+0x20/0x30 [ 1444.801711][T18580] htab_map_alloc+0x8d3/0x11c0 [ 1444.806467][T18580] ? htab_map_update_elem+0xca0/0xca0 [ 1444.811835][T18580] __do_sys_bpf+0x478/0x3610 [ 1444.816424][T18580] ? bpf_prog_load+0x1960/0x1960 [ 1444.821358][T18580] ? __kasan_check_write+0x14/0x20 [ 1444.826454][T18580] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1444.831978][T18580] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1444.837262][T18580] ? wait_for_completion+0x440/0x440 [ 1444.842540][T18580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1444.848793][T18580] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1444.854250][T18580] ? do_syscall_64+0x26/0x790 [ 1444.859032][T18580] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.865103][T18580] ? do_syscall_64+0x26/0x790 [ 1444.869786][T18580] __x64_sys_bpf+0x73/0xb0 [ 1444.874194][T18580] do_syscall_64+0xfa/0x790 [ 1444.878686][T18580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1444.884566][T18580] RIP: 0033:0x45a919 [ 1444.888443][T18580] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1444.908059][T18580] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1444.916464][T18580] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1444.924574][T18580] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1444.932555][T18580] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1444.940522][T18580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1444.948482][T18580] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00D\x00', 0x7302}) 08:16:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x80\x00\xa0\xff\xff\xff\xff'}) 08:16:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00`\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:44 executing program 0 (fault-call:7 fault-nth:20): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:44 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'n/0\x01\x00', 0x7302}) 08:16:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf0\x00', 0x7302}) 08:16:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x02\x00'}) [ 1445.289052][T18600] FAULT_INJECTION: forcing a failure. [ 1445.289052][T18600] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1445.345710][T18600] CPU: 0 PID: 18600 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1445.354451][T18600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1445.364602][T18600] Call Trace: [ 1445.367916][T18600] dump_stack+0x197/0x210 [ 1445.372271][T18600] should_fail.cold+0xa/0x15 [ 1445.376882][T18600] ? fault_create_debugfs_attr+0x180/0x180 [ 1445.382702][T18600] ? ___might_sleep+0x163/0x2c0 [ 1445.387645][T18600] should_fail_alloc_page+0x50/0x60 [ 1445.392920][T18600] __alloc_pages_nodemask+0x1a1/0x910 [ 1445.398290][T18600] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1445.403832][T18600] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1445.410157][T18600] ? kasan_unpoison_shadow+0x35/0x50 [ 1445.415432][T18600] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1445.421660][T18600] alloc_pages_current+0x107/0x210 [ 1445.426769][T18600] ? ___might_sleep+0x163/0x2c0 [ 1445.431627][T18600] __vmalloc_node_range+0x4f8/0x810 [ 1445.436831][T18600] ? bpf_map_area_alloc+0x20/0x30 [ 1445.441987][T18600] __vmalloc_node_flags_caller+0x71/0x90 [ 1445.447612][T18600] ? bpf_map_area_alloc+0x20/0x30 [ 1445.452637][T18600] __bpf_map_area_alloc+0xde/0xf0 [ 1445.457752][T18600] bpf_map_area_alloc+0x20/0x30 [ 1445.462610][T18600] htab_map_alloc+0x8d3/0x11c0 [ 1445.467446][T18600] ? htab_map_update_elem+0xca0/0xca0 [ 1445.472803][T18600] __do_sys_bpf+0x478/0x3610 [ 1445.477380][T18600] ? bpf_prog_load+0x1960/0x1960 [ 1445.482309][T18600] ? __kasan_check_write+0x14/0x20 [ 1445.487496][T18600] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1445.493027][T18600] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1445.498305][T18600] ? wait_for_completion+0x440/0x440 [ 1445.503579][T18600] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1445.509813][T18600] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1445.515271][T18600] ? do_syscall_64+0x26/0x790 [ 1445.519930][T18600] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1445.526013][T18600] ? do_syscall_64+0x26/0x790 [ 1445.530707][T18600] __x64_sys_bpf+0x73/0xb0 [ 1445.535140][T18600] do_syscall_64+0xfa/0x790 [ 1445.539640][T18600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1445.545604][T18600] RIP: 0033:0x45a919 [ 1445.549479][T18600] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1445.569067][T18600] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1445.577478][T18600] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1445.585460][T18600] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1445.593819][T18600] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1445.602045][T18600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1445.610029][T18600] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:44 executing program 0 (fault-call:7 fault-nth:21): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1445.782040][T18615] FAULT_INJECTION: forcing a failure. [ 1445.782040][T18615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1445.795691][T18615] CPU: 1 PID: 18615 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1445.795703][T18615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1445.795709][T18615] Call Trace: [ 1445.795729][T18615] dump_stack+0x197/0x210 [ 1445.795751][T18615] should_fail.cold+0xa/0x15 [ 1445.795772][T18615] ? fault_create_debugfs_attr+0x180/0x180 [ 1445.795789][T18615] ? ___might_sleep+0x163/0x2c0 [ 1445.795814][T18615] should_fail_alloc_page+0x50/0x60 [ 1445.814546][T18615] __alloc_pages_nodemask+0x1a1/0x910 [ 1445.814565][T18615] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1445.814585][T18615] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1445.814606][T18615] ? kasan_unpoison_shadow+0x35/0x50 [ 1445.814624][T18615] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1445.814645][T18615] alloc_pages_current+0x107/0x210 [ 1445.814665][T18615] ? ___might_sleep+0x163/0x2c0 08:16:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x03\x00'}) [ 1445.814688][T18615] __vmalloc_node_range+0x4f8/0x810 [ 1445.814716][T18615] ? bpf_map_area_alloc+0x20/0x30 [ 1445.814734][T18615] __vmalloc_node_flags_caller+0x71/0x90 [ 1445.814750][T18615] ? bpf_map_area_alloc+0x20/0x30 [ 1445.814770][T18615] __bpf_map_area_alloc+0xde/0xf0 [ 1445.814788][T18615] bpf_map_area_alloc+0x20/0x30 [ 1445.814803][T18615] htab_map_alloc+0x8d3/0x11c0 [ 1445.814834][T18615] ? htab_map_update_elem+0xca0/0xca0 [ 1445.814852][T18615] __do_sys_bpf+0x478/0x3610 [ 1445.814872][T18615] ? bpf_prog_load+0x1960/0x1960 08:16:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x04\x00'}) [ 1445.832851][T18615] ? __kasan_check_write+0x14/0x20 [ 1445.832871][T18615] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1445.832887][T18615] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1445.832905][T18615] ? wait_for_completion+0x440/0x440 [ 1445.832929][T18615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1445.960210][T18615] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1445.965686][T18615] ? do_syscall_64+0x26/0x790 [ 1445.970385][T18615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1445.976470][T18615] ? do_syscall_64+0x26/0x790 08:16:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x05\x00'}) [ 1445.981267][T18615] __x64_sys_bpf+0x73/0xb0 [ 1445.985737][T18615] do_syscall_64+0xfa/0x790 [ 1445.990363][T18615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1445.996277][T18615] RIP: 0033:0x45a919 [ 1446.000423][T18615] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1446.022456][T18615] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 08:16:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x06\x00'}) [ 1446.032308][T18615] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1446.041882][T18615] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1446.050309][T18615] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1446.058778][T18615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1446.067139][T18615] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00E\x00', 0x7302}) 08:16:45 executing program 0 (fault-call:7 fault-nth:22): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1446.589042][T18634] FAULT_INJECTION: forcing a failure. [ 1446.589042][T18634] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1446.602530][T18634] CPU: 1 PID: 18634 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1446.611488][T18634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1446.611495][T18634] Call Trace: [ 1446.611519][T18634] dump_stack+0x197/0x210 [ 1446.611538][T18634] should_fail.cold+0xa/0x15 [ 1446.611556][T18634] ? fault_create_debugfs_attr+0x180/0x180 [ 1446.611571][T18634] ? ___might_sleep+0x163/0x2c0 [ 1446.611599][T18634] should_fail_alloc_page+0x50/0x60 [ 1446.611612][T18634] __alloc_pages_nodemask+0x1a1/0x910 [ 1446.611627][T18634] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1446.611644][T18634] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1446.611666][T18634] ? kasan_unpoison_shadow+0x35/0x50 [ 1446.611685][T18634] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1446.611706][T18634] alloc_pages_current+0x107/0x210 [ 1446.611718][T18634] ? ___might_sleep+0x163/0x2c0 08:16:45 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00a\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:45 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'n:0\x01\x00', 0x7302}) 08:16:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\a\x00'}) 08:16:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf1\x00', 0x7302}) [ 1446.611737][T18634] __vmalloc_node_range+0x4f8/0x810 [ 1446.611763][T18634] ? bpf_map_area_alloc+0x20/0x30 [ 1446.611784][T18634] __vmalloc_node_flags_caller+0x71/0x90 [ 1446.644738][T18634] ? bpf_map_area_alloc+0x20/0x30 [ 1446.644756][T18634] __bpf_map_area_alloc+0xde/0xf0 [ 1446.644774][T18634] bpf_map_area_alloc+0x20/0x30 [ 1446.644789][T18634] htab_map_alloc+0x8d3/0x11c0 [ 1446.644817][T18634] ? htab_map_update_elem+0xca0/0xca0 [ 1446.644835][T18634] __do_sys_bpf+0x478/0x3610 [ 1446.644856][T18634] ? bpf_prog_load+0x1960/0x1960 [ 1446.644872][T18634] ? __kasan_check_write+0x14/0x20 [ 1446.644890][T18634] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1446.644919][T18634] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1446.644940][T18634] ? wait_for_completion+0x440/0x440 [ 1446.655502][T18634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1446.655533][T18634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1446.655549][T18634] ? do_syscall_64+0x26/0x790 [ 1446.655566][T18634] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 08:16:45 executing program 0 (fault-call:7 fault-nth:23): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1446.655581][T18634] ? do_syscall_64+0x26/0x790 [ 1446.655603][T18634] __x64_sys_bpf+0x73/0xb0 [ 1446.666859][T18634] do_syscall_64+0xfa/0x790 [ 1446.666890][T18634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1446.666902][T18634] RIP: 0033:0x45a919 [ 1446.666918][T18634] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1446.666925][T18634] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1446.666938][T18634] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1446.666947][T18634] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1446.666954][T18634] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1446.666967][T18634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1446.678457][T18634] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1446.928442][T18659] FAULT_INJECTION: forcing a failure. [ 1446.928442][T18659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1446.962563][T18659] CPU: 0 PID: 18659 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1446.971403][T18659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1446.981469][T18659] Call Trace: [ 1446.984750][T18659] dump_stack+0x197/0x210 [ 1446.989090][T18659] should_fail.cold+0xa/0x15 [ 1446.993701][T18659] ? fault_create_debugfs_attr+0x180/0x180 [ 1446.999593][T18659] ? ___might_sleep+0x163/0x2c0 [ 1447.004456][T18659] should_fail_alloc_page+0x50/0x60 [ 1447.009784][T18659] __alloc_pages_nodemask+0x1a1/0x910 [ 1447.015162][T18659] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1447.020699][T18659] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1447.026424][T18659] ? kasan_unpoison_shadow+0x35/0x50 [ 1447.031691][T18659] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1447.037928][T18659] alloc_pages_current+0x107/0x210 [ 1447.043030][T18659] ? ___might_sleep+0x163/0x2c0 [ 1447.047877][T18659] __vmalloc_node_range+0x4f8/0x810 [ 1447.053073][T18659] ? bpf_map_area_alloc+0x20/0x30 [ 1447.058131][T18659] __vmalloc_node_flags_caller+0x71/0x90 [ 1447.063866][T18659] ? bpf_map_area_alloc+0x20/0x30 [ 1447.068975][T18659] __bpf_map_area_alloc+0xde/0xf0 [ 1447.074003][T18659] bpf_map_area_alloc+0x20/0x30 [ 1447.078841][T18659] htab_map_alloc+0x8d3/0x11c0 [ 1447.083730][T18659] ? htab_map_update_elem+0xca0/0xca0 [ 1447.089089][T18659] __do_sys_bpf+0x478/0x3610 [ 1447.093669][T18659] ? bpf_prog_load+0x1960/0x1960 [ 1447.098592][T18659] ? __kasan_check_write+0x14/0x20 [ 1447.103699][T18659] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1447.109259][T18659] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1447.114547][T18659] ? wait_for_completion+0x440/0x440 [ 1447.119828][T18659] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1447.126059][T18659] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1447.131505][T18659] ? do_syscall_64+0x26/0x790 [ 1447.136168][T18659] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1447.142222][T18659] ? do_syscall_64+0x26/0x790 [ 1447.146894][T18659] __x64_sys_bpf+0x73/0xb0 [ 1447.151301][T18659] do_syscall_64+0xfa/0x790 [ 1447.156661][T18659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1447.162794][T18659] RIP: 0033:0x45a919 [ 1447.166681][T18659] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1447.186288][T18659] RSP: 002b:00007f30aab23c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1447.194706][T18659] RAX: ffffffffffffffda RBX: 00007f30aab23c90 RCX: 000000000045a919 [ 1447.202678][T18659] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1447.210733][T18659] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1447.218686][T18659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab246d4 08:16:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\b\x00'}) [ 1447.226650][T18659] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:46 executing program 0 (fault-call:7 fault-nth:24): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x10\x00'}) 08:16:46 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr%\x01\x00', 0x7302}) 08:16:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x03\x00'}) [ 1447.525375][T18673] FAULT_INJECTION: forcing a failure. [ 1447.525375][T18673] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1447.573296][T18673] CPU: 0 PID: 18673 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1447.582019][T18673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1447.592085][T18673] Call Trace: [ 1447.595396][T18673] dump_stack+0x197/0x210 [ 1447.599722][T18673] should_fail.cold+0xa/0x15 [ 1447.604424][T18673] ? fault_create_debugfs_attr+0x180/0x180 [ 1447.610250][T18673] ? ___might_sleep+0x163/0x2c0 [ 1447.615210][T18673] should_fail_alloc_page+0x50/0x60 [ 1447.620493][T18673] __alloc_pages_nodemask+0x1a1/0x910 [ 1447.625877][T18673] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1447.631456][T18673] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1447.637195][T18673] ? kasan_unpoison_shadow+0x35/0x50 [ 1447.642482][T18673] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1447.648712][T18673] alloc_pages_current+0x107/0x210 [ 1447.653838][T18673] ? ___might_sleep+0x163/0x2c0 [ 1447.658693][T18673] __vmalloc_node_range+0x4f8/0x810 [ 1447.663916][T18673] ? bpf_map_area_alloc+0x20/0x30 [ 1447.668960][T18673] __vmalloc_node_flags_caller+0x71/0x90 [ 1447.674607][T18673] ? bpf_map_area_alloc+0x20/0x30 [ 1447.679642][T18673] __bpf_map_area_alloc+0xde/0xf0 [ 1447.684682][T18673] bpf_map_area_alloc+0x20/0x30 [ 1447.689548][T18673] htab_map_alloc+0x8d3/0x11c0 [ 1447.694341][T18673] ? htab_map_update_elem+0xca0/0xca0 [ 1447.699721][T18673] __do_sys_bpf+0x478/0x3610 [ 1447.704305][T18673] ? bpf_prog_load+0x1960/0x1960 [ 1447.709240][T18673] ? __kasan_check_write+0x14/0x20 [ 1447.714340][T18673] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1447.719882][T18673] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1447.725166][T18673] ? wait_for_completion+0x440/0x440 [ 1447.730453][T18673] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1447.736687][T18673] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1447.742131][T18673] ? do_syscall_64+0x26/0x790 [ 1447.746795][T18673] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1447.752848][T18673] ? do_syscall_64+0x26/0x790 [ 1447.757540][T18673] __x64_sys_bpf+0x73/0xb0 [ 1447.761970][T18673] do_syscall_64+0xfa/0x790 [ 1447.766491][T18673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1447.772389][T18673] RIP: 0033:0x45a919 [ 1447.776284][T18673] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1447.795967][T18673] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1447.804371][T18673] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1447.812348][T18673] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1447.820317][T18673] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1447.828277][T18673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1447.836251][T18673] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x05\x00'}) 08:16:47 executing program 0 (fault-call:7 fault-nth:25): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:47 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr/\x01\x00', 0x7302}) 08:16:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00F\x00', 0x7302}) 08:16:47 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00b\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf2\x00', 0x7302}) [ 1448.482281][T18695] FAULT_INJECTION: forcing a failure. [ 1448.482281][T18695] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1448.521701][T18695] CPU: 0 PID: 18695 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 08:16:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x06\x00'}) [ 1448.530419][T18695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.540487][T18695] Call Trace: [ 1448.543792][T18695] dump_stack+0x197/0x210 [ 1448.548144][T18695] should_fail.cold+0xa/0x15 [ 1448.552757][T18695] ? fault_create_debugfs_attr+0x180/0x180 [ 1448.558579][T18695] ? ___might_sleep+0x163/0x2c0 [ 1448.563463][T18695] should_fail_alloc_page+0x50/0x60 [ 1448.569196][T18695] __alloc_pages_nodemask+0x1a1/0x910 [ 1448.574589][T18695] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1448.580238][T18695] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1448.585986][T18695] ? kasan_unpoison_shadow+0x35/0x50 [ 1448.591423][T18695] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1448.597690][T18695] alloc_pages_current+0x107/0x210 [ 1448.602799][T18695] ? ___might_sleep+0x163/0x2c0 [ 1448.607745][T18695] __vmalloc_node_range+0x4f8/0x810 [ 1448.612984][T18695] ? bpf_map_area_alloc+0x20/0x30 [ 1448.618005][T18695] __vmalloc_node_flags_caller+0x71/0x90 [ 1448.623651][T18695] ? bpf_map_area_alloc+0x20/0x30 [ 1448.628680][T18695] __bpf_map_area_alloc+0xde/0xf0 [ 1448.633706][T18695] bpf_map_area_alloc+0x20/0x30 [ 1448.638552][T18695] htab_map_alloc+0x8d3/0x11c0 [ 1448.643324][T18695] ? htab_map_update_elem+0xca0/0xca0 [ 1448.648684][T18695] __do_sys_bpf+0x478/0x3610 [ 1448.653279][T18695] ? bpf_prog_load+0x1960/0x1960 [ 1448.658214][T18695] ? __kasan_check_write+0x14/0x20 [ 1448.663318][T18695] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1448.668888][T18695] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1448.674197][T18695] ? wait_for_completion+0x440/0x440 [ 1448.679482][T18695] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1448.685746][T18695] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1448.691198][T18695] ? do_syscall_64+0x26/0x790 [ 1448.695875][T18695] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1448.701929][T18695] ? do_syscall_64+0x26/0x790 [ 1448.706593][T18695] __x64_sys_bpf+0x73/0xb0 [ 1448.710994][T18695] do_syscall_64+0xfa/0x790 [ 1448.715509][T18695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1448.721388][T18695] RIP: 0033:0x45a919 [ 1448.725272][T18695] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1448.744951][T18695] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1448.753362][T18695] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1448.761331][T18695] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1448.769326][T18695] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 08:16:47 executing program 0 (fault-call:7 fault-nth:26): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1448.777293][T18695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1448.785247][T18695] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\a\x00'}) 08:16:47 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr:\x01\x00', 0x7302}) [ 1448.946580][T18707] FAULT_INJECTION: forcing a failure. [ 1448.946580][T18707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1448.976509][T18707] CPU: 0 PID: 18707 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1448.986177][T18707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.986184][T18707] Call Trace: [ 1448.986205][T18707] dump_stack+0x197/0x210 [ 1448.986232][T18707] should_fail.cold+0xa/0x15 [ 1449.008499][T18707] ? fault_create_debugfs_attr+0x180/0x180 [ 1449.008518][T18707] ? ___might_sleep+0x163/0x2c0 [ 1449.008545][T18707] should_fail_alloc_page+0x50/0x60 [ 1449.008563][T18707] __alloc_pages_nodemask+0x1a1/0x910 [ 1449.029765][T18707] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1449.035509][T18707] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1449.041074][T18707] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1449.047071][T18707] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1449.053328][T18707] alloc_pages_current+0x107/0x210 [ 1449.058467][T18707] __get_free_pages+0xc/0x40 [ 1449.063069][T18707] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1449.068900][T18707] apply_to_page_range+0x445/0x700 [ 1449.074030][T18707] ? memset+0x40/0x40 [ 1449.078035][T18707] kasan_populate_vmalloc+0x68/0x90 [ 1449.083347][T18707] __vmalloc_node_range+0x47e/0x810 [ 1449.088557][T18707] ? bpf_map_area_alloc+0x20/0x30 [ 1449.093567][T18707] __vmalloc_node_flags_caller+0x71/0x90 [ 1449.099182][T18707] ? bpf_map_area_alloc+0x20/0x30 [ 1449.104280][T18707] __bpf_map_area_alloc+0xde/0xf0 [ 1449.109289][T18707] bpf_map_area_alloc+0x20/0x30 [ 1449.114131][T18707] htab_map_alloc+0x8d3/0x11c0 [ 1449.118889][T18707] ? htab_map_update_elem+0xca0/0xca0 [ 1449.124255][T18707] __do_sys_bpf+0x478/0x3610 [ 1449.128848][T18707] ? bpf_prog_load+0x1960/0x1960 [ 1449.133810][T18707] ? __kasan_check_write+0x14/0x20 [ 1449.138944][T18707] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1449.144513][T18707] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1449.149790][T18707] ? wait_for_completion+0x440/0x440 [ 1449.155066][T18707] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1449.161312][T18707] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1449.166755][T18707] ? do_syscall_64+0x26/0x790 [ 1449.171429][T18707] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.177479][T18707] ? do_syscall_64+0x26/0x790 [ 1449.182159][T18707] __x64_sys_bpf+0x73/0xb0 [ 1449.186580][T18707] do_syscall_64+0xfa/0x790 [ 1449.191171][T18707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.197062][T18707] RIP: 0033:0x45a919 [ 1449.200950][T18707] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.220567][T18707] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1449.228969][T18707] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1449.236935][T18707] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 08:16:48 executing program 0 (fault-call:7 fault-nth:27): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1449.244895][T18707] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1449.252880][T18707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1449.260849][T18707] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1449.406082][T18720] FAULT_INJECTION: forcing a failure. [ 1449.406082][T18720] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1449.422759][T18720] CPU: 1 PID: 18720 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1449.431458][T18720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1449.441519][T18720] Call Trace: [ 1449.444822][T18720] dump_stack+0x197/0x210 [ 1449.449177][T18720] should_fail.cold+0xa/0x15 [ 1449.453778][T18720] ? fault_create_debugfs_attr+0x180/0x180 [ 1449.459600][T18720] ? ___might_sleep+0x163/0x2c0 [ 1449.464478][T18720] should_fail_alloc_page+0x50/0x60 [ 1449.469683][T18720] __alloc_pages_nodemask+0x1a1/0x910 [ 1449.475168][T18720] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1449.480909][T18720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1449.487156][T18720] ? find_next_bit+0x107/0x130 [ 1449.491947][T18720] pcpu_populate_chunk+0xf8/0x940 [ 1449.496986][T18720] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1449.502709][T18720] ? find_next_bit+0xc7/0x130 [ 1449.507388][T18720] pcpu_alloc+0xd5b/0x1380 [ 1449.511793][T18720] ? pcpu_alloc_area+0x820/0x820 [ 1449.516726][T18720] ? bpf_map_area_alloc+0x20/0x30 [ 1449.521751][T18720] __alloc_percpu_gfp+0x28/0x30 [ 1449.526605][T18720] htab_map_alloc+0xdb9/0x11c0 [ 1449.531397][T18720] ? htab_map_update_elem+0xca0/0xca0 [ 1449.536769][T18720] __do_sys_bpf+0x478/0x3610 [ 1449.541360][T18720] ? bpf_prog_load+0x1960/0x1960 [ 1449.546303][T18720] ? __kasan_check_write+0x14/0x20 [ 1449.551432][T18720] ? __mutex_unlock_slowpath+0xf0/0x6a0 08:16:48 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr\x8c\x01\x00', 0x7302}) [ 1449.556984][T18720] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1449.562294][T18720] ? wait_for_completion+0x440/0x440 [ 1449.567581][T18720] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1449.573859][T18720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1449.579331][T18720] ? do_syscall_64+0x26/0x790 [ 1449.584023][T18720] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.590106][T18720] ? do_syscall_64+0x26/0x790 [ 1449.594812][T18720] __x64_sys_bpf+0x73/0xb0 [ 1449.599243][T18720] do_syscall_64+0xfa/0x790 [ 1449.603771][T18720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.609670][T18720] RIP: 0033:0x45a919 [ 1449.613577][T18720] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.633179][T18720] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1449.641579][T18720] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1449.649551][T18720] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1449.657530][T18720] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1449.665519][T18720] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1449.673562][T18720] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf3\x00', 0x7302}) 08:16:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00G\x00', 0x7302}) 08:16:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00?\x00'}) 08:16:48 executing program 0 (fault-call:7 fault-nth:28): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1450.018632][T18743] FAULT_INJECTION: forcing a failure. [ 1450.018632][T18743] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1450.046518][T18743] CPU: 1 PID: 18743 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1450.055324][T18743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.065379][T18743] Call Trace: [ 1450.068676][T18743] dump_stack+0x197/0x210 [ 1450.073029][T18743] should_fail.cold+0xa/0x15 [ 1450.077644][T18743] ? fault_create_debugfs_attr+0x180/0x180 [ 1450.083469][T18743] ? ___might_sleep+0x163/0x2c0 [ 1450.088346][T18743] should_fail_alloc_page+0x50/0x60 [ 1450.093558][T18743] __alloc_pages_nodemask+0x1a1/0x910 [ 1450.098936][T18743] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1450.104665][T18743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1450.110915][T18743] ? find_next_bit+0x107/0x130 [ 1450.115686][T18743] pcpu_populate_chunk+0xf8/0x940 [ 1450.120696][T18743] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1450.126495][T18743] ? find_next_bit+0xc7/0x130 [ 1450.131171][T18743] pcpu_alloc+0xd5b/0x1380 [ 1450.135578][T18743] ? pcpu_alloc_area+0x820/0x820 [ 1450.140500][T18743] ? bpf_map_area_alloc+0x20/0x30 [ 1450.145529][T18743] __alloc_percpu_gfp+0x28/0x30 [ 1450.150386][T18743] htab_map_alloc+0xdb9/0x11c0 [ 1450.155157][T18743] ? htab_map_update_elem+0xca0/0xca0 [ 1450.160512][T18743] __do_sys_bpf+0x478/0x3610 [ 1450.165104][T18743] ? bpf_prog_load+0x1960/0x1960 [ 1450.170051][T18743] ? __kasan_check_write+0x14/0x20 [ 1450.175174][T18743] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1450.180713][T18743] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1450.185992][T18743] ? wait_for_completion+0x440/0x440 [ 1450.191299][T18743] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1450.197535][T18743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1450.202988][T18743] ? do_syscall_64+0x26/0x790 [ 1450.207680][T18743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.213843][T18743] ? do_syscall_64+0x26/0x790 [ 1450.218521][T18743] __x64_sys_bpf+0x73/0xb0 [ 1450.222922][T18743] do_syscall_64+0xfa/0x790 [ 1450.227427][T18743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.233323][T18743] RIP: 0033:0x45a919 [ 1450.237214][T18743] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1450.256900][T18743] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 08:16:49 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00c\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00@\x00'}) 08:16:49 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x02\x00', 0x7302}) [ 1450.265307][T18743] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1450.273279][T18743] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1450.281236][T18743] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1450.289214][T18743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1450.297188][T18743] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:49 executing program 0 (fault-call:7 fault-nth:29): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\xff\x00'}) 08:16:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\xa0\x00`\x00'}) 08:16:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf4\x00', 0x7302}) [ 1450.592390][T18763] FAULT_INJECTION: forcing a failure. [ 1450.592390][T18763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1450.649902][T18763] CPU: 0 PID: 18763 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1450.658720][T18763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.668867][T18763] Call Trace: [ 1450.672263][T18763] dump_stack+0x197/0x210 [ 1450.676585][T18763] should_fail.cold+0xa/0x15 [ 1450.681335][T18763] ? fault_create_debugfs_attr+0x180/0x180 [ 1450.687239][T18763] ? ___might_sleep+0x163/0x2c0 [ 1450.692087][T18763] should_fail_alloc_page+0x50/0x60 [ 1450.697272][T18763] __alloc_pages_nodemask+0x1a1/0x910 [ 1450.702647][T18763] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1450.708355][T18763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1450.714590][T18763] ? find_next_bit+0x107/0x130 [ 1450.719359][T18763] pcpu_populate_chunk+0xf8/0x940 [ 1450.724398][T18763] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1450.730113][T18763] ? find_next_bit+0xc7/0x130 [ 1450.734804][T18763] pcpu_alloc+0xd5b/0x1380 [ 1450.739221][T18763] ? pcpu_alloc_area+0x820/0x820 [ 1450.744165][T18763] ? bpf_map_area_alloc+0x20/0x30 [ 1450.749186][T18763] __alloc_percpu_gfp+0x28/0x30 [ 1450.754035][T18763] htab_map_alloc+0xdb9/0x11c0 [ 1450.758817][T18763] ? htab_map_update_elem+0xca0/0xca0 [ 1450.764195][T18763] __do_sys_bpf+0x478/0x3610 [ 1450.768799][T18763] ? bpf_prog_load+0x1960/0x1960 [ 1450.773811][T18763] ? __kasan_check_write+0x14/0x20 [ 1450.778914][T18763] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1450.784487][T18763] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1450.789776][T18763] ? wait_for_completion+0x440/0x440 [ 1450.795066][T18763] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1450.801314][T18763] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1450.806760][T18763] ? do_syscall_64+0x26/0x790 [ 1450.811433][T18763] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.817509][T18763] ? do_syscall_64+0x26/0x790 [ 1450.822196][T18763] __x64_sys_bpf+0x73/0xb0 [ 1450.826966][T18763] do_syscall_64+0xfa/0x790 [ 1450.831462][T18763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.837334][T18763] RIP: 0033:0x45a919 [ 1450.841210][T18763] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1450.860801][T18763] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1450.869209][T18763] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1450.877177][T18763] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1450.885152][T18763] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1450.893104][T18763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 08:16:49 executing program 0 (fault-call:7 fault-nth:30): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\xa0\x00\x80\x00'}) [ 1450.901167][T18763] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}) 08:16:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00H\x00', 0x7302}) 08:16:50 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x03\x00', 0x7302}) [ 1451.163649][T18780] FAULT_INJECTION: forcing a failure. [ 1451.163649][T18780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1451.253513][T18780] CPU: 1 PID: 18780 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1451.262226][T18780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.272292][T18780] Call Trace: [ 1451.275600][T18780] dump_stack+0x197/0x210 [ 1451.279991][T18780] should_fail.cold+0xa/0x15 [ 1451.284602][T18780] ? fault_create_debugfs_attr+0x180/0x180 [ 1451.290428][T18780] ? ___might_sleep+0x163/0x2c0 [ 1451.295305][T18780] should_fail_alloc_page+0x50/0x60 [ 1451.300511][T18780] __alloc_pages_nodemask+0x1a1/0x910 [ 1451.305901][T18780] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1451.311625][T18780] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1451.317850][T18780] ? find_next_bit+0x107/0x130 [ 1451.322605][T18780] pcpu_populate_chunk+0xf8/0x940 [ 1451.327699][T18780] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1451.333479][T18780] ? find_next_bit+0xc7/0x130 [ 1451.338295][T18780] pcpu_alloc+0xd5b/0x1380 [ 1451.342732][T18780] ? pcpu_alloc_area+0x820/0x820 [ 1451.347688][T18780] ? bpf_map_area_alloc+0x20/0x30 [ 1451.352774][T18780] __alloc_percpu_gfp+0x28/0x30 [ 1451.357631][T18780] htab_map_alloc+0xdb9/0x11c0 [ 1451.362407][T18780] ? htab_map_update_elem+0xca0/0xca0 [ 1451.367782][T18780] __do_sys_bpf+0x478/0x3610 [ 1451.372389][T18780] ? bpf_prog_load+0x1960/0x1960 [ 1451.377424][T18780] ? __kasan_check_write+0x14/0x20 [ 1451.382536][T18780] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1451.388071][T18780] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1451.393359][T18780] ? wait_for_completion+0x440/0x440 [ 1451.398647][T18780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1451.404908][T18780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1451.410363][T18780] ? do_syscall_64+0x26/0x790 [ 1451.415042][T18780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.421176][T18780] ? do_syscall_64+0x26/0x790 [ 1451.425862][T18780] __x64_sys_bpf+0x73/0xb0 [ 1451.430280][T18780] do_syscall_64+0xfa/0x790 [ 1451.434787][T18780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.440674][T18780] RIP: 0033:0x45a919 [ 1451.444568][T18780] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.464292][T18780] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1451.472849][T18780] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1451.480809][T18780] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1451.488762][T18780] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1451.496723][T18780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1451.504699][T18780] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:50 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00d\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x0f\xf5\x00', 0x7302}) 08:16:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) 08:16:50 executing program 0 (fault-call:7 fault-nth:31): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}) [ 1451.708892][T18801] FAULT_INJECTION: forcing a failure. [ 1451.708892][T18801] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1451.741055][T18801] CPU: 0 PID: 18801 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1451.749840][T18801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.759884][T18801] Call Trace: [ 1451.763174][T18801] dump_stack+0x197/0x210 [ 1451.767502][T18801] should_fail.cold+0xa/0x15 [ 1451.772100][T18801] ? fault_create_debugfs_attr+0x180/0x180 [ 1451.777919][T18801] ? ___might_sleep+0x163/0x2c0 [ 1451.782790][T18801] should_fail_alloc_page+0x50/0x60 [ 1451.788006][T18801] __alloc_pages_nodemask+0x1a1/0x910 [ 1451.793398][T18801] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1451.799143][T18801] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1451.805417][T18801] ? find_next_bit+0x107/0x130 [ 1451.805516][T18801] pcpu_populate_chunk+0xf8/0x940 [ 1451.805542][T18801] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1451.821046][T18801] ? find_next_bit+0xc7/0x130 [ 1451.821074][T18801] pcpu_alloc+0xd5b/0x1380 [ 1451.821100][T18801] ? pcpu_alloc_area+0x820/0x820 [ 1451.835122][T18801] ? bpf_map_area_alloc+0x20/0x30 [ 1451.840176][T18801] __alloc_percpu_gfp+0x28/0x30 [ 1451.845047][T18801] htab_map_alloc+0xdb9/0x11c0 [ 1451.849843][T18801] ? htab_map_update_elem+0xca0/0xca0 [ 1451.855237][T18801] __do_sys_bpf+0x478/0x3610 08:16:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00I\x00', 0x7302}) [ 1451.859846][T18801] ? bpf_prog_load+0x1960/0x1960 [ 1451.864810][T18801] ? __kasan_check_write+0x14/0x20 [ 1451.869937][T18801] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1451.875502][T18801] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1451.880807][T18801] ? wait_for_completion+0x440/0x440 [ 1451.886124][T18801] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1451.892454][T18801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1451.897912][T18801] ? do_syscall_64+0x26/0x790 [ 1451.902593][T18801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.908643][T18801] ? do_syscall_64+0x26/0x790 [ 1451.913351][T18801] __x64_sys_bpf+0x73/0xb0 [ 1451.917754][T18801] do_syscall_64+0xfa/0x790 [ 1451.922301][T18801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.928288][T18801] RIP: 0033:0x45a919 [ 1451.932250][T18801] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.951936][T18801] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1451.960345][T18801] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1451.968320][T18801] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1451.976277][T18801] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1451.984230][T18801] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1451.992185][T18801] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}) 08:16:51 executing program 0 (fault-call:7 fault-nth:32): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:51 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x04\x00', 0x7302}) 08:16:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf5\x00', 0x7302}) 08:16:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}) [ 1452.257722][T18824] FAULT_INJECTION: forcing a failure. [ 1452.257722][T18824] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1452.290410][T18824] CPU: 0 PID: 18824 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1452.299149][T18824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.309203][T18824] Call Trace: [ 1452.312483][T18824] dump_stack+0x197/0x210 [ 1452.316801][T18824] should_fail.cold+0xa/0x15 [ 1452.321389][T18824] ? fault_create_debugfs_attr+0x180/0x180 [ 1452.327179][T18824] ? ___might_sleep+0x163/0x2c0 [ 1452.332023][T18824] should_fail_alloc_page+0x50/0x60 [ 1452.337217][T18824] __alloc_pages_nodemask+0x1a1/0x910 [ 1452.342574][T18824] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1452.348296][T18824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1452.354536][T18824] ? find_next_bit+0x107/0x130 [ 1452.359286][T18824] pcpu_populate_chunk+0xf8/0x940 [ 1452.364296][T18824] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1452.370022][T18824] ? find_next_bit+0xc7/0x130 [ 1452.374868][T18824] pcpu_alloc+0xd5b/0x1380 [ 1452.379365][T18824] ? pcpu_alloc_area+0x820/0x820 [ 1452.384303][T18824] ? bpf_map_area_alloc+0x20/0x30 [ 1452.389333][T18824] __alloc_percpu_gfp+0x28/0x30 [ 1452.394182][T18824] htab_map_alloc+0xdb9/0x11c0 [ 1452.398959][T18824] ? htab_map_update_elem+0xca0/0xca0 [ 1452.404334][T18824] __do_sys_bpf+0x478/0x3610 [ 1452.408945][T18824] ? bpf_prog_load+0x1960/0x1960 [ 1452.413901][T18824] ? __kasan_check_write+0x14/0x20 [ 1452.419008][T18824] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1452.424536][T18824] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1452.429804][T18824] ? wait_for_completion+0x440/0x440 [ 1452.435088][T18824] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1452.441333][T18824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1452.446779][T18824] ? do_syscall_64+0x26/0x790 [ 1452.451439][T18824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.457499][T18824] ? do_syscall_64+0x26/0x790 [ 1452.462163][T18824] __x64_sys_bpf+0x73/0xb0 [ 1452.466566][T18824] do_syscall_64+0xfa/0x790 [ 1452.471056][T18824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.476929][T18824] RIP: 0033:0x45a919 [ 1452.480823][T18824] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1452.500414][T18824] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1452.508851][T18824] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1452.516804][T18824] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1452.524755][T18824] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1452.532722][T18824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1452.540676][T18824] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) 08:16:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00e\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:51 executing program 0 (fault-call:7 fault-nth:33): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 08:16:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 08:16:51 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00J\x00', 0x7302}) [ 1452.963059][T18845] FAULT_INJECTION: forcing a failure. [ 1452.963059][T18845] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1453.014519][T18845] CPU: 0 PID: 18845 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1453.023498][T18845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.033670][T18845] Call Trace: [ 1453.036977][T18845] dump_stack+0x197/0x210 [ 1453.041331][T18845] should_fail.cold+0xa/0x15 [ 1453.045941][T18845] ? fault_create_debugfs_attr+0x180/0x180 [ 1453.051754][T18845] ? ___might_sleep+0x163/0x2c0 [ 1453.056735][T18845] should_fail_alloc_page+0x50/0x60 [ 1453.061932][T18845] __alloc_pages_nodemask+0x1a1/0x910 [ 1453.067307][T18845] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1453.073044][T18845] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1453.080068][T18845] ? find_next_bit+0x107/0x130 [ 1453.084849][T18845] pcpu_populate_chunk+0xf8/0x940 [ 1453.089887][T18845] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1453.095604][T18845] ? find_next_bit+0xc7/0x130 [ 1453.100299][T18845] pcpu_alloc+0xd5b/0x1380 [ 1453.104729][T18845] ? pcpu_alloc_area+0x820/0x820 [ 1453.109677][T18845] ? bpf_map_area_alloc+0x20/0x30 [ 1453.114715][T18845] __alloc_percpu_gfp+0x28/0x30 [ 1453.119574][T18845] htab_map_alloc+0xdb9/0x11c0 [ 1453.124338][T18845] ? htab_map_update_elem+0xca0/0xca0 [ 1453.129723][T18845] __do_sys_bpf+0x478/0x3610 [ 1453.134339][T18845] ? bpf_prog_load+0x1960/0x1960 [ 1453.139291][T18845] ? __kasan_check_write+0x14/0x20 [ 1453.144435][T18845] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1453.149991][T18845] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1453.155280][T18845] ? wait_for_completion+0x440/0x440 [ 1453.160588][T18845] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1453.166843][T18845] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1453.172325][T18845] ? do_syscall_64+0x26/0x790 [ 1453.177015][T18845] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.183177][T18845] ? do_syscall_64+0x26/0x790 [ 1453.187854][T18845] __x64_sys_bpf+0x73/0xb0 [ 1453.192258][T18845] do_syscall_64+0xfa/0x790 [ 1453.196772][T18845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.202657][T18845] RIP: 0033:0x45a919 [ 1453.206635][T18845] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.226246][T18845] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1453.234677][T18845] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1453.242723][T18845] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1453.250816][T18845] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 08:16:52 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x05\x00', 0x7302}) [ 1453.258779][T18845] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1453.266743][T18845] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:52 executing program 0 (fault-call:7 fault-nth:34): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) 08:16:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf6\x00', 0x7302}) [ 1453.529549][T18863] FAULT_INJECTION: forcing a failure. [ 1453.529549][T18863] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1453.545309][T18863] CPU: 0 PID: 18863 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1453.554004][T18863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.564066][T18863] Call Trace: [ 1453.567365][T18863] dump_stack+0x197/0x210 [ 1453.571710][T18863] should_fail.cold+0xa/0x15 [ 1453.576306][T18863] ? fault_create_debugfs_attr+0x180/0x180 [ 1453.582219][T18863] ? ___might_sleep+0x163/0x2c0 [ 1453.587073][T18863] should_fail_alloc_page+0x50/0x60 [ 1453.587088][T18863] __alloc_pages_nodemask+0x1a1/0x910 [ 1453.587108][T18863] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1453.587132][T18863] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1453.587147][T18863] ? find_next_bit+0x107/0x130 [ 1453.587171][T18863] pcpu_populate_chunk+0xf8/0x940 [ 1453.587186][T18863] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1453.587198][T18863] ? find_next_bit+0xc7/0x130 [ 1453.587220][T18863] pcpu_alloc+0xd5b/0x1380 [ 1453.587246][T18863] ? pcpu_alloc_area+0x820/0x820 [ 1453.639213][T18863] ? bpf_map_area_alloc+0x20/0x30 [ 1453.644971][T18863] __alloc_percpu_gfp+0x28/0x30 [ 1453.649837][T18863] htab_map_alloc+0xdb9/0x11c0 [ 1453.654639][T18863] ? htab_map_update_elem+0xca0/0xca0 [ 1453.660089][T18863] __do_sys_bpf+0x478/0x3610 [ 1453.664694][T18863] ? bpf_prog_load+0x1960/0x1960 [ 1453.669647][T18863] ? __kasan_check_write+0x14/0x20 [ 1453.674772][T18863] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1453.680312][T18863] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1453.685595][T18863] ? wait_for_completion+0x440/0x440 [ 1453.690882][T18863] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1453.697132][T18863] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1453.702600][T18863] ? do_syscall_64+0x26/0x790 [ 1453.707294][T18863] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.713358][T18863] ? do_syscall_64+0x26/0x790 [ 1453.718032][T18863] __x64_sys_bpf+0x73/0xb0 [ 1453.722444][T18863] do_syscall_64+0xfa/0x790 [ 1453.726950][T18863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.732837][T18863] RIP: 0033:0x45a919 [ 1453.736728][T18863] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.756355][T18863] RSP: 002b:00007f30aab23c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1453.764773][T18863] RAX: ffffffffffffffda RBX: 00007f30aab23c90 RCX: 000000000045a919 [ 1453.772766][T18863] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1453.780734][T18863] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1453.788710][T18863] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab246d4 [ 1453.796679][T18863] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 08:16:52 executing program 0 (fault-call:7 fault-nth:35): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) [ 1453.981634][T18874] FAULT_INJECTION: forcing a failure. [ 1453.981634][T18874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1453.996658][T18874] CPU: 1 PID: 18874 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1454.005359][T18874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.015420][T18874] Call Trace: [ 1454.018712][T18874] dump_stack+0x197/0x210 [ 1454.018733][T18874] should_fail.cold+0xa/0x15 [ 1454.027625][T18874] ? fault_create_debugfs_attr+0x180/0x180 [ 1454.027640][T18874] ? ___might_sleep+0x163/0x2c0 [ 1454.027665][T18874] should_fail_alloc_page+0x50/0x60 [ 1454.027678][T18874] __alloc_pages_nodemask+0x1a1/0x910 [ 1454.027696][T18874] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1454.027721][T18874] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1454.060808][T18874] ? find_next_bit+0x107/0x130 [ 1454.065594][T18874] pcpu_populate_chunk+0xf8/0x940 [ 1454.070645][T18874] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1454.076374][T18874] ? find_next_bit+0xc7/0x130 [ 1454.081053][T18874] pcpu_alloc+0xd5b/0x1380 [ 1454.085481][T18874] ? pcpu_alloc_area+0x820/0x820 [ 1454.090424][T18874] ? bpf_map_area_alloc+0x20/0x30 [ 1454.095473][T18874] __alloc_percpu_gfp+0x28/0x30 [ 1454.100349][T18874] htab_map_alloc+0xdb9/0x11c0 [ 1454.105103][T18874] ? htab_map_update_elem+0xca0/0xca0 [ 1454.110452][T18874] __do_sys_bpf+0x478/0x3610 [ 1454.115033][T18874] ? bpf_prog_load+0x1960/0x1960 [ 1454.119952][T18874] ? __kasan_check_write+0x14/0x20 [ 1454.125045][T18874] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1454.130582][T18874] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1454.135848][T18874] ? wait_for_completion+0x440/0x440 [ 1454.141116][T18874] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1454.147353][T18874] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1454.152790][T18874] ? do_syscall_64+0x26/0x790 [ 1454.157446][T18874] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.163492][T18874] ? do_syscall_64+0x26/0x790 [ 1454.168168][T18874] __x64_sys_bpf+0x73/0xb0 [ 1454.173014][T18874] do_syscall_64+0xfa/0x790 [ 1454.177578][T18874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.183455][T18874] RIP: 0033:0x45a919 [ 1454.187336][T18874] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1454.206930][T18874] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1454.215321][T18874] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1454.223331][T18874] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 08:16:53 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00f\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00`\x00\xa0\x00'}) [ 1454.231292][T18874] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1454.239254][T18874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1454.247216][T18874] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:53 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\b\x00', 0x7302}) 08:16:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x80\x00\xa0\x00'}) 08:16:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00K\x00', 0x7302}) 08:16:53 executing program 0 (fault-call:7 fault-nth:36): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}) 08:16:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf7\x00', 0x7302}) 08:16:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00`'}) [ 1454.679872][T18907] FAULT_INJECTION: forcing a failure. [ 1454.679872][T18907] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1454.715408][T18907] CPU: 0 PID: 18907 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1454.724128][T18907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.734197][T18907] Call Trace: [ 1454.737502][T18907] dump_stack+0x197/0x210 [ 1454.741846][T18907] should_fail.cold+0xa/0x15 [ 1454.746445][T18907] ? fault_create_debugfs_attr+0x180/0x180 [ 1454.753296][T18907] ? ___might_sleep+0x163/0x2c0 [ 1454.758158][T18907] should_fail_alloc_page+0x50/0x60 [ 1454.763357][T18907] __alloc_pages_nodemask+0x1a1/0x910 [ 1454.769139][T18907] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1454.774879][T18907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1454.781134][T18907] ? find_next_bit+0x107/0x130 [ 1454.785902][T18907] pcpu_populate_chunk+0xf8/0x940 [ 1454.790927][T18907] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1454.796668][T18907] ? find_next_bit+0xc7/0x130 [ 1454.801450][T18907] pcpu_alloc+0xd5b/0x1380 [ 1454.805887][T18907] ? pcpu_alloc_area+0x820/0x820 [ 1454.810840][T18907] ? bpf_map_area_alloc+0x20/0x30 [ 1454.815889][T18907] __alloc_percpu_gfp+0x28/0x30 [ 1454.820753][T18907] htab_map_alloc+0xdb9/0x11c0 [ 1454.825545][T18907] ? htab_map_update_elem+0xca0/0xca0 [ 1454.830920][T18907] __do_sys_bpf+0x478/0x3610 [ 1454.835517][T18907] ? bpf_prog_load+0x1960/0x1960 [ 1454.840461][T18907] ? __kasan_check_write+0x14/0x20 [ 1454.845588][T18907] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1454.851131][T18907] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1454.856419][T18907] ? wait_for_completion+0x440/0x440 [ 1454.861720][T18907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1454.867970][T18907] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1454.873425][T18907] ? do_syscall_64+0x26/0x790 [ 1454.878095][T18907] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.884155][T18907] ? do_syscall_64+0x26/0x790 [ 1454.888817][T18907] __x64_sys_bpf+0x73/0xb0 [ 1454.893218][T18907] do_syscall_64+0xfa/0x790 [ 1454.897725][T18907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.903614][T18907] RIP: 0033:0x45a919 [ 1454.907507][T18907] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1454.927118][T18907] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1454.935543][T18907] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1454.943517][T18907] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1454.951473][T18907] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1454.959440][T18907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1454.967434][T18907] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:54 executing program 0 (fault-call:7 fault-nth:37): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\xff\xff\xff\xff\xa0\x00\x80'}) 08:16:54 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\t\x00', 0x7302}) [ 1455.187659][T18919] FAULT_INJECTION: forcing a failure. [ 1455.187659][T18919] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1455.201215][T18919] CPU: 1 PID: 18919 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1455.209876][T18919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1455.220522][T18919] Call Trace: [ 1455.223813][T18919] dump_stack+0x197/0x210 [ 1455.228167][T18919] should_fail.cold+0xa/0x15 [ 1455.232771][T18919] ? fault_create_debugfs_attr+0x180/0x180 [ 1455.238576][T18919] ? ___might_sleep+0x163/0x2c0 [ 1455.243425][T18919] should_fail_alloc_page+0x50/0x60 [ 1455.248625][T18919] __alloc_pages_nodemask+0x1a1/0x910 [ 1455.254052][T18919] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1455.259869][T18919] ? __sched_text_start+0x8/0x8 [ 1455.264719][T18919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1455.270950][T18919] ? find_next_bit+0x107/0x130 [ 1455.275718][T18919] pcpu_populate_chunk+0xf8/0x940 [ 1455.280728][T18919] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1455.286430][T18919] ? find_next_bit+0xc7/0x130 [ 1455.291119][T18919] pcpu_alloc+0xd5b/0x1380 [ 1455.295551][T18919] ? pcpu_alloc_area+0x820/0x820 [ 1455.300494][T18919] ? bpf_map_area_alloc+0x20/0x30 [ 1455.305544][T18919] __alloc_percpu_gfp+0x28/0x30 [ 1455.310397][T18919] htab_map_alloc+0xdb9/0x11c0 [ 1455.315159][T18919] ? htab_map_update_elem+0xca0/0xca0 [ 1455.320524][T18919] __do_sys_bpf+0x478/0x3610 [ 1455.325122][T18919] ? bpf_prog_load+0x1960/0x1960 [ 1455.330043][T18919] ? __kasan_check_write+0x14/0x20 [ 1455.335147][T18919] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1455.340699][T18919] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1455.346011][T18919] ? wait_for_completion+0x440/0x440 [ 1455.351296][T18919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1455.357561][T18919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1455.363013][T18919] ? do_syscall_64+0x26/0x790 [ 1455.367693][T18919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1455.373741][T18919] ? do_syscall_64+0x26/0x790 [ 1455.378415][T18919] __x64_sys_bpf+0x73/0xb0 [ 1455.382877][T18919] do_syscall_64+0xfa/0x790 [ 1455.387369][T18919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1455.393275][T18919] RIP: 0033:0x45a919 [ 1455.397156][T18919] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1455.416742][T18919] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1455.425139][T18919] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1455.433096][T18919] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1455.441061][T18919] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1455.449033][T18919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1455.457003][T18919] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:54 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00g\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:54 executing program 0 (fault-call:7 fault-nth:38): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00L\x00', 0x7302}) 08:16:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) 08:16:54 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\f\x00', 0x7302}) 08:16:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) [ 1455.999983][T18939] FAULT_INJECTION: forcing a failure. [ 1455.999983][T18939] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1456.013834][T18939] CPU: 0 PID: 18939 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1456.022576][T18939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.032631][T18939] Call Trace: [ 1456.035928][T18939] dump_stack+0x197/0x210 [ 1456.040281][T18939] should_fail.cold+0xa/0x15 [ 1456.044891][T18939] ? fault_create_debugfs_attr+0x180/0x180 [ 1456.050698][T18939] ? ___might_sleep+0x163/0x2c0 [ 1456.055558][T18939] should_fail_alloc_page+0x50/0x60 [ 1456.060751][T18939] __alloc_pages_nodemask+0x1a1/0x910 [ 1456.066126][T18939] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1456.071959][T18939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1456.078190][T18939] ? find_next_bit+0x107/0x130 [ 1456.082969][T18939] pcpu_populate_chunk+0xf8/0x940 [ 1456.087998][T18939] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1456.093708][T18939] ? find_next_bit+0xc7/0x130 [ 1456.098452][T18939] pcpu_alloc+0xd5b/0x1380 [ 1456.102873][T18939] ? pcpu_alloc_area+0x820/0x820 [ 1456.107807][T18939] ? bpf_map_area_alloc+0x20/0x30 [ 1456.112830][T18939] __alloc_percpu_gfp+0x28/0x30 [ 1456.117804][T18939] htab_map_alloc+0xdb9/0x11c0 [ 1456.122573][T18939] ? htab_map_update_elem+0xca0/0xca0 [ 1456.127930][T18939] __do_sys_bpf+0x478/0x3610 [ 1456.132509][T18939] ? bpf_prog_load+0x1960/0x1960 [ 1456.137443][T18939] ? __kasan_check_write+0x14/0x20 [ 1456.142598][T18939] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1456.148172][T18939] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1456.153455][T18939] ? wait_for_completion+0x440/0x440 [ 1456.158746][T18939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1456.165011][T18939] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1456.170479][T18939] ? do_syscall_64+0x26/0x790 [ 1456.175162][T18939] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.181243][T18939] ? do_syscall_64+0x26/0x790 [ 1456.185922][T18939] __x64_sys_bpf+0x73/0xb0 [ 1456.190339][T18939] do_syscall_64+0xfa/0x790 [ 1456.194847][T18939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.200744][T18939] RIP: 0033:0x45a919 [ 1456.204637][T18939] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.224257][T18939] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1456.232672][T18939] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1456.240682][T18939] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1456.248656][T18939] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1456.256642][T18939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1456.264638][T18939] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:55 executing program 0 (fault-call:7 fault-nth:39): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf8\x00', 0x7302}) 08:16:55 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\r\x00', 0x7302}) 08:16:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) [ 1456.542586][T18955] FAULT_INJECTION: forcing a failure. [ 1456.542586][T18955] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1456.572059][T18955] CPU: 0 PID: 18955 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1456.580778][T18955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.590852][T18955] Call Trace: [ 1456.594151][T18955] dump_stack+0x197/0x210 [ 1456.598485][T18955] should_fail.cold+0xa/0x15 [ 1456.603086][T18955] ? fault_create_debugfs_attr+0x180/0x180 [ 1456.608904][T18955] ? ___might_sleep+0x163/0x2c0 [ 1456.613785][T18955] should_fail_alloc_page+0x50/0x60 [ 1456.619000][T18955] __alloc_pages_nodemask+0x1a1/0x910 [ 1456.624374][T18955] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1456.630107][T18955] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1456.636356][T18955] ? find_next_bit+0x107/0x130 [ 1456.641124][T18955] pcpu_populate_chunk+0xf8/0x940 [ 1456.646146][T18955] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1456.651863][T18955] ? find_next_bit+0xc7/0x130 [ 1456.656548][T18955] pcpu_alloc+0xd5b/0x1380 [ 1456.660968][T18955] ? pcpu_alloc_area+0x820/0x820 [ 1456.666117][T18955] ? bpf_map_area_alloc+0x20/0x30 [ 1456.671158][T18955] __alloc_percpu_gfp+0x28/0x30 [ 1456.676036][T18955] htab_map_alloc+0xdb9/0x11c0 [ 1456.680842][T18955] ? htab_map_update_elem+0xca0/0xca0 [ 1456.686345][T18955] __do_sys_bpf+0x478/0x3610 [ 1456.690948][T18955] ? bpf_prog_load+0x1960/0x1960 [ 1456.695884][T18955] ? __kasan_check_write+0x14/0x20 [ 1456.701091][T18955] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1456.706644][T18955] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1456.711938][T18955] ? wait_for_completion+0x440/0x440 [ 1456.717248][T18955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1456.723518][T18955] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1456.728975][T18955] ? do_syscall_64+0x26/0x790 [ 1456.733646][T18955] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.739727][T18955] ? do_syscall_64+0x26/0x790 [ 1456.744406][T18955] __x64_sys_bpf+0x73/0xb0 [ 1456.748821][T18955] do_syscall_64+0xfa/0x790 [ 1456.753310][T18955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.759201][T18955] RIP: 0033:0x45a919 [ 1456.763132][T18955] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.782742][T18955] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 08:16:55 executing program 0 (fault-call:7 fault-nth:40): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1456.791165][T18955] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1456.799127][T18955] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1456.807085][T18955] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1456.815058][T18955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1456.823038][T18955] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1456.969535][T18966] FAULT_INJECTION: forcing a failure. [ 1456.969535][T18966] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1456.982977][T18966] CPU: 1 PID: 18966 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1456.991639][T18966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.001679][T18966] Call Trace: [ 1457.004966][T18966] dump_stack+0x197/0x210 [ 1457.009303][T18966] should_fail.cold+0xa/0x15 [ 1457.013919][T18966] ? fault_create_debugfs_attr+0x180/0x180 [ 1457.019743][T18966] ? ___might_sleep+0x163/0x2c0 [ 1457.024614][T18966] should_fail_alloc_page+0x50/0x60 [ 1457.029830][T18966] __alloc_pages_nodemask+0x1a1/0x910 [ 1457.035233][T18966] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1457.040970][T18966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1457.047223][T18966] ? find_next_bit+0x107/0x130 [ 1457.051991][T18966] pcpu_populate_chunk+0xf8/0x940 [ 1457.057122][T18966] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1457.062847][T18966] ? find_next_bit+0xc7/0x130 [ 1457.067523][T18966] pcpu_alloc+0xd5b/0x1380 [ 1457.072029][T18966] ? pcpu_alloc_area+0x820/0x820 [ 1457.076977][T18966] ? lock_is_held_type+0x91/0x320 [ 1457.082011][T18966] __alloc_percpu_gfp+0x28/0x30 [ 1457.086868][T18966] htab_map_alloc+0xdb9/0x11c0 [ 1457.091643][T18966] ? htab_map_update_elem+0xca0/0xca0 [ 1457.097016][T18966] __do_sys_bpf+0x478/0x3610 [ 1457.101628][T18966] ? bpf_prog_load+0x1960/0x1960 [ 1457.106641][T18966] ? __kasan_check_write+0x14/0x20 [ 1457.111739][T18966] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1457.117270][T18966] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1457.122568][T18966] ? wait_for_completion+0x440/0x440 [ 1457.128292][T18966] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1457.134811][T18966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1457.140289][T18966] ? do_syscall_64+0x26/0x790 [ 1457.144991][T18966] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1457.151405][T18966] ? do_syscall_64+0x26/0x790 [ 1457.156279][T18966] __x64_sys_bpf+0x73/0xb0 [ 1457.160702][T18966] do_syscall_64+0xfa/0x790 [ 1457.165255][T18966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1457.171340][T18966] RIP: 0033:0x45a919 [ 1457.175250][T18966] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1457.195994][T18966] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1457.207436][T18966] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1457.216185][T18966] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1457.224428][T18966] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1457.232603][T18966] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1457.240608][T18966] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) 08:16:56 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00h\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00M\x00', 0x7302}) 08:16:56 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x0f\x00', 0x7302}) 08:16:56 executing program 0 (fault-call:7 fault-nth:41): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) 08:16:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xf9\x00', 0x7302}) 08:16:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) [ 1457.892125][T18989] FAULT_INJECTION: forcing a failure. [ 1457.892125][T18989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1457.905965][T18989] CPU: 1 PID: 18989 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1457.914674][T18989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.924738][T18989] Call Trace: [ 1457.928044][T18989] dump_stack+0x197/0x210 [ 1457.932393][T18989] should_fail.cold+0xa/0x15 [ 1457.937007][T18989] ? fault_create_debugfs_attr+0x180/0x180 [ 1457.942831][T18989] ? ___might_sleep+0x163/0x2c0 [ 1457.947705][T18989] should_fail_alloc_page+0x50/0x60 [ 1457.952924][T18989] __alloc_pages_nodemask+0x1a1/0x910 [ 1457.958752][T18989] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1457.964584][T18989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1457.973579][T18989] ? find_next_bit+0x107/0x130 [ 1457.978375][T18989] pcpu_populate_chunk+0xf8/0x940 [ 1457.983642][T18989] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1457.989419][T18989] ? find_next_bit+0xc7/0x130 [ 1457.994099][T18989] pcpu_alloc+0xd5b/0x1380 [ 1457.998542][T18989] ? pcpu_alloc_area+0x820/0x820 [ 1458.003487][T18989] ? bpf_map_area_alloc+0x20/0x30 [ 1458.008682][T18989] __alloc_percpu_gfp+0x28/0x30 [ 1458.013967][T18989] htab_map_alloc+0xdb9/0x11c0 [ 1458.018753][T18989] ? htab_map_update_elem+0xca0/0xca0 [ 1458.024666][T18989] __do_sys_bpf+0x478/0x3610 [ 1458.029368][T18989] ? bpf_prog_load+0x1960/0x1960 [ 1458.039353][T18989] ? __kasan_check_write+0x14/0x20 [ 1458.044868][T18989] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1458.050437][T18989] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1458.055759][T18989] ? wait_for_completion+0x440/0x440 [ 1458.061079][T18989] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1458.067335][T18989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1458.072804][T18989] ? do_syscall_64+0x26/0x790 [ 1458.077486][T18989] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1458.083820][T18989] ? do_syscall_64+0x26/0x790 [ 1458.089930][T18989] __x64_sys_bpf+0x73/0xb0 [ 1458.094361][T18989] do_syscall_64+0xfa/0x790 [ 1458.098868][T18989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1458.104754][T18989] RIP: 0033:0x45a919 [ 1458.108647][T18989] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1458.128397][T18989] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1458.136809][T18989] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1458.144871][T18989] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1458.152852][T18989] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1458.160827][T18989] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1458.168882][T18989] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:57 executing program 0 (fault-call:7 fault-nth:42): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) 08:16:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) [ 1458.412095][T19003] FAULT_INJECTION: forcing a failure. [ 1458.412095][T19003] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1458.429588][T19003] CPU: 0 PID: 19003 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1458.438292][T19003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.448363][T19003] Call Trace: [ 1458.451672][T19003] dump_stack+0x197/0x210 [ 1458.456040][T19003] should_fail.cold+0xa/0x15 [ 1458.460650][T19003] ? fault_create_debugfs_attr+0x180/0x180 [ 1458.466467][T19003] ? ___might_sleep+0x163/0x2c0 [ 1458.471355][T19003] should_fail_alloc_page+0x50/0x60 [ 1458.476564][T19003] __alloc_pages_nodemask+0x1a1/0x910 [ 1458.481958][T19003] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1458.487705][T19003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1458.493960][T19003] ? find_next_bit+0x107/0x130 [ 1458.498742][T19003] pcpu_populate_chunk+0xf8/0x940 [ 1458.503782][T19003] ? __sanitizer_cov_trace_cmp8+0x18/0x20 08:16:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) 08:16:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) [ 1458.509515][T19003] ? find_next_bit+0xc7/0x130 [ 1458.514214][T19003] pcpu_alloc+0xd5b/0x1380 [ 1458.518662][T19003] ? pcpu_alloc_area+0x820/0x820 [ 1458.523612][T19003] ? bpf_map_area_alloc+0x20/0x30 [ 1458.528660][T19003] __alloc_percpu_gfp+0x28/0x30 [ 1458.533525][T19003] htab_map_alloc+0xdb9/0x11c0 [ 1458.538311][T19003] ? htab_map_update_elem+0xca0/0xca0 [ 1458.543693][T19003] __do_sys_bpf+0x478/0x3610 [ 1458.548281][T19003] ? bpf_prog_load+0x1960/0x1960 [ 1458.554451][T19003] ? __kasan_check_write+0x14/0x20 [ 1458.560365][T19003] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1458.565926][T19003] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1458.572868][T19003] ? wait_for_completion+0x440/0x440 [ 1458.578475][T19003] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1458.584723][T19003] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1458.590245][T19003] ? do_syscall_64+0x26/0x790 [ 1458.594923][T19003] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1458.601086][T19003] ? do_syscall_64+0x26/0x790 [ 1458.605771][T19003] __x64_sys_bpf+0x73/0xb0 [ 1458.610215][T19003] do_syscall_64+0xfa/0x790 [ 1458.614725][T19003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1458.620605][T19003] RIP: 0033:0x45a919 [ 1458.624484][T19003] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1458.644155][T19003] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1458.652809][T19003] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1458.660764][T19003] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1458.668727][T19003] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1458.676683][T19003] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1458.684648][T19003] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:58 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00i\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) 08:16:58 executing program 0 (fault-call:7 fault-nth:43): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:58 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x10\x00', 0x7302}) 08:16:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xfa\x00', 0x7302}) 08:16:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00N\x00', 0x7302}) 08:16:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00'}) [ 1459.214171][T19037] FAULT_INJECTION: forcing a failure. [ 1459.214171][T19037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1459.250936][T19037] CPU: 1 PID: 19037 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1459.259677][T19037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1459.269818][T19037] Call Trace: [ 1459.273100][T19037] dump_stack+0x197/0x210 [ 1459.277420][T19037] should_fail.cold+0xa/0x15 [ 1459.282007][T19037] ? fault_create_debugfs_attr+0x180/0x180 [ 1459.287796][T19037] ? ___might_sleep+0x163/0x2c0 [ 1459.292638][T19037] should_fail_alloc_page+0x50/0x60 [ 1459.297822][T19037] __alloc_pages_nodemask+0x1a1/0x910 [ 1459.303183][T19037] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1459.308894][T19037] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1459.315143][T19037] ? find_next_bit+0x107/0x130 [ 1459.320042][T19037] pcpu_populate_chunk+0xf8/0x940 [ 1459.325075][T19037] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1459.330819][T19037] ? find_next_bit+0xc7/0x130 [ 1459.335509][T19037] pcpu_alloc+0xd5b/0x1380 [ 1459.339931][T19037] ? pcpu_alloc_area+0x820/0x820 [ 1459.344872][T19037] ? bpf_map_area_alloc+0x20/0x30 [ 1459.350005][T19037] __alloc_percpu_gfp+0x28/0x30 [ 1459.354852][T19037] htab_map_alloc+0xdb9/0x11c0 [ 1459.359709][T19037] ? htab_map_update_elem+0xca0/0xca0 [ 1459.365181][T19037] __do_sys_bpf+0x478/0x3610 [ 1459.369796][T19037] ? bpf_prog_load+0x1960/0x1960 [ 1459.374732][T19037] ? __kasan_check_write+0x14/0x20 [ 1459.379844][T19037] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1459.385402][T19037] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1459.390773][T19037] ? wait_for_completion+0x440/0x440 [ 1459.396459][T19037] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1459.402704][T19037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1459.408146][T19037] ? do_syscall_64+0x26/0x790 [ 1459.412862][T19037] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1459.418924][T19037] ? do_syscall_64+0x26/0x790 [ 1459.423647][T19037] __x64_sys_bpf+0x73/0xb0 [ 1459.428056][T19037] do_syscall_64+0xfa/0x790 [ 1459.432560][T19037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1459.438449][T19037] RIP: 0033:0x45a919 [ 1459.442327][T19037] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1459.462014][T19037] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1459.470412][T19037] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1459.478373][T19037] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1459.486348][T19037] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1459.494660][T19037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1459.502624][T19037] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00`\x00\xa0\xff\xff\xff'}) 08:16:58 executing program 0 (fault-call:7 fault-nth:44): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x80\x00\xa0\xff\xff\xff'}) 08:16:58 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x14\x00', 0x7302}) 08:16:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xfb\x00', 0x7302}) [ 1459.769053][T19053] FAULT_INJECTION: forcing a failure. [ 1459.769053][T19053] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1459.828163][T19053] CPU: 1 PID: 19053 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1459.836874][T19053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1459.846924][T19053] Call Trace: [ 1459.850221][T19053] dump_stack+0x197/0x210 [ 1459.854556][T19053] should_fail.cold+0xa/0x15 [ 1459.859153][T19053] ? fault_create_debugfs_attr+0x180/0x180 [ 1459.864971][T19053] ? ___might_sleep+0x163/0x2c0 [ 1459.869842][T19053] should_fail_alloc_page+0x50/0x60 [ 1459.875049][T19053] __alloc_pages_nodemask+0x1a1/0x910 [ 1459.880430][T19053] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1459.886169][T19053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1459.892409][T19053] ? find_next_bit+0x107/0x130 [ 1459.897167][T19053] pcpu_populate_chunk+0xf8/0x940 [ 1459.902189][T19053] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1459.907909][T19053] ? find_next_bit+0xc7/0x130 [ 1459.912587][T19053] pcpu_alloc+0xd5b/0x1380 [ 1459.916995][T19053] ? pcpu_alloc_area+0x820/0x820 [ 1459.921931][T19053] ? bpf_map_area_alloc+0x20/0x30 [ 1459.926974][T19053] __alloc_percpu_gfp+0x28/0x30 [ 1459.931836][T19053] htab_map_alloc+0xdb9/0x11c0 [ 1459.936766][T19053] ? htab_map_update_elem+0xca0/0xca0 [ 1459.942151][T19053] __do_sys_bpf+0x478/0x3610 [ 1459.946781][T19053] ? bpf_prog_load+0x1960/0x1960 [ 1459.951917][T19053] ? __kasan_check_write+0x14/0x20 [ 1459.957031][T19053] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1459.962563][T19053] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1459.967854][T19053] ? wait_for_completion+0x440/0x440 [ 1459.973162][T19053] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1459.979408][T19053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1459.984865][T19053] ? do_syscall_64+0x26/0x790 [ 1459.989551][T19053] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1459.995641][T19053] ? do_syscall_64+0x26/0x790 [ 1460.000320][T19053] __x64_sys_bpf+0x73/0xb0 [ 1460.004739][T19053] do_syscall_64+0xfa/0x790 [ 1460.009260][T19053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.015158][T19053] RIP: 0033:0x45a919 [ 1460.019050][T19053] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.038639][T19053] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1460.049838][T19053] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1460.057808][T19053] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1460.065883][T19053] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1460.073932][T19053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1460.081908][T19053] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:59 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00j\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:16:59 executing program 0 (fault-call:7 fault-nth:45): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:16:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00O\x00', 0x7302}) 08:16:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x02\x00'}) [ 1460.493466][T19075] FAULT_INJECTION: forcing a failure. [ 1460.493466][T19075] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1460.506975][T19075] CPU: 1 PID: 19075 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1460.515660][T19075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.525716][T19075] Call Trace: [ 1460.529017][T19075] dump_stack+0x197/0x210 [ 1460.533362][T19075] should_fail.cold+0xa/0x15 [ 1460.537969][T19075] ? fault_create_debugfs_attr+0x180/0x180 08:16:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x03\x00'}) [ 1460.543784][T19075] ? ___might_sleep+0x163/0x2c0 [ 1460.548656][T19075] should_fail_alloc_page+0x50/0x60 [ 1460.548672][T19075] __alloc_pages_nodemask+0x1a1/0x910 [ 1460.548692][T19075] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1460.564961][T19075] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1460.564979][T19075] ? find_next_bit+0x107/0x130 [ 1460.565001][T19075] pcpu_populate_chunk+0xf8/0x940 [ 1460.565017][T19075] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1460.565032][T19075] ? find_next_bit+0xc7/0x130 08:16:59 executing program 0 (fault-call:7 fault-nth:46): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1460.565056][T19075] pcpu_alloc+0xd5b/0x1380 [ 1460.565085][T19075] ? pcpu_alloc_area+0x820/0x820 [ 1460.565100][T19075] ? bpf_map_area_alloc+0x20/0x30 [ 1460.565128][T19075] __alloc_percpu_gfp+0x28/0x30 [ 1460.565146][T19075] htab_map_alloc+0xdb9/0x11c0 [ 1460.565178][T19075] ? htab_map_update_elem+0xca0/0xca0 [ 1460.565197][T19075] __do_sys_bpf+0x478/0x3610 [ 1460.565219][T19075] ? bpf_prog_load+0x1960/0x1960 [ 1460.565235][T19075] ? __kasan_check_write+0x14/0x20 [ 1460.565253][T19075] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1460.565269][T19075] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1460.565284][T19075] ? wait_for_completion+0x440/0x440 [ 1460.565309][T19075] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1460.587033][T19075] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1460.587051][T19075] ? do_syscall_64+0x26/0x790 [ 1460.587071][T19075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.587087][T19075] ? do_syscall_64+0x26/0x790 [ 1460.587112][T19075] __x64_sys_bpf+0x73/0xb0 [ 1460.587131][T19075] do_syscall_64+0xfa/0x790 [ 1460.587154][T19075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.587167][T19075] RIP: 0033:0x45a919 [ 1460.587183][T19075] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.587191][T19075] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1460.587206][T19075] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1460.587216][T19075] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1460.587225][T19075] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1460.587234][T19075] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1460.587243][T19075] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:16:59 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0%\x00', 0x7302}) [ 1460.834713][T19087] FAULT_INJECTION: forcing a failure. [ 1460.834713][T19087] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1460.871802][T19087] CPU: 0 PID: 19087 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1460.880529][T19087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.880536][T19087] Call Trace: [ 1460.880558][T19087] dump_stack+0x197/0x210 [ 1460.880581][T19087] should_fail.cold+0xa/0x15 [ 1460.880601][T19087] ? fault_create_debugfs_attr+0x180/0x180 [ 1460.880617][T19087] ? ___might_sleep+0x163/0x2c0 [ 1460.880642][T19087] should_fail_alloc_page+0x50/0x60 [ 1460.908796][T19087] __alloc_pages_nodemask+0x1a1/0x910 [ 1460.908817][T19087] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1460.908839][T19087] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1460.908858][T19087] ? find_next_bit+0x107/0x130 [ 1460.918898][T19087] pcpu_populate_chunk+0xf8/0x940 [ 1460.929990][T19087] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1460.930010][T19087] ? find_next_bit+0xc7/0x130 [ 1460.930037][T19087] pcpu_alloc+0xd5b/0x1380 [ 1460.930065][T19087] ? pcpu_alloc_area+0x820/0x820 [ 1460.930085][T19087] ? bpf_map_area_alloc+0x20/0x30 [ 1460.965926][T19087] __alloc_percpu_gfp+0x28/0x30 [ 1460.965947][T19087] htab_map_alloc+0xdb9/0x11c0 08:17:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x04\x00'}) [ 1460.965976][T19087] ? htab_map_update_elem+0xca0/0xca0 [ 1460.965997][T19087] __do_sys_bpf+0x478/0x3610 [ 1460.966018][T19087] ? bpf_prog_load+0x1960/0x1960 [ 1460.966039][T19087] ? __kasan_check_write+0x14/0x20 [ 1460.980656][T19087] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1460.980676][T19087] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1460.980696][T19087] ? wait_for_completion+0x440/0x440 [ 1460.980719][T19087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1460.980749][T19087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1461.000707][T19087] ? do_syscall_64+0x26/0x790 [ 1461.000729][T19087] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.000747][T19087] ? do_syscall_64+0x26/0x790 [ 1461.000772][T19087] __x64_sys_bpf+0x73/0xb0 [ 1461.000816][T19087] do_syscall_64+0xfa/0x790 [ 1461.011654][T19087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.011668][T19087] RIP: 0033:0x45a919 [ 1461.011686][T19087] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:17:00 executing program 0 (fault-call:7 fault-nth:47): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1461.011695][T19087] RSP: 002b:00007f30aab23c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1461.011711][T19087] RAX: ffffffffffffffda RBX: 00007f30aab23c90 RCX: 000000000045a919 [ 1461.011721][T19087] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1461.011728][T19087] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1461.011742][T19087] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab246d4 [ 1461.123304][T19087] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1461.258143][T19097] FAULT_INJECTION: forcing a failure. [ 1461.258143][T19097] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1461.271746][T19097] CPU: 0 PID: 19097 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1461.280431][T19097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.290480][T19097] Call Trace: [ 1461.293767][T19097] dump_stack+0x197/0x210 [ 1461.298093][T19097] should_fail.cold+0xa/0x15 [ 1461.302690][T19097] ? fault_create_debugfs_attr+0x180/0x180 [ 1461.308511][T19097] ? ___might_sleep+0x163/0x2c0 [ 1461.313377][T19097] should_fail_alloc_page+0x50/0x60 [ 1461.318743][T19097] __alloc_pages_nodemask+0x1a1/0x910 [ 1461.324120][T19097] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1461.330190][T19097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1461.336430][T19097] ? find_next_bit+0x107/0x130 [ 1461.341217][T19097] pcpu_populate_chunk+0xf8/0x940 [ 1461.346257][T19097] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1461.352066][T19097] ? find_next_bit+0xc7/0x130 [ 1461.356764][T19097] pcpu_alloc+0xd5b/0x1380 [ 1461.361188][T19097] ? pcpu_alloc_area+0x820/0x820 [ 1461.366205][T19097] ? bpf_map_area_alloc+0x20/0x30 [ 1461.371240][T19097] __alloc_percpu_gfp+0x28/0x30 [ 1461.376100][T19097] htab_map_alloc+0xdb9/0x11c0 [ 1461.380902][T19097] ? htab_map_update_elem+0xca0/0xca0 [ 1461.386290][T19097] __do_sys_bpf+0x478/0x3610 [ 1461.390888][T19097] ? bpf_prog_load+0x1960/0x1960 [ 1461.395812][T19097] ? __kasan_check_write+0x14/0x20 [ 1461.400923][T19097] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1461.406458][T19097] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1461.411744][T19097] ? wait_for_completion+0x440/0x440 [ 1461.417066][T19097] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1461.423302][T19097] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1461.428773][T19097] ? do_syscall_64+0x26/0x790 [ 1461.433457][T19097] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.439545][T19097] ? do_syscall_64+0x26/0x790 [ 1461.444228][T19097] __x64_sys_bpf+0x73/0xb0 [ 1461.448644][T19097] do_syscall_64+0xfa/0x790 [ 1461.453172][T19097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.459071][T19097] RIP: 0033:0x45a919 [ 1461.462949][T19097] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.482553][T19097] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1461.490962][T19097] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1461.498945][T19097] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1461.506916][T19097] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1461.514877][T19097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1461.522831][T19097] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:00 executing program 0 (fault-call:7 fault-nth:48): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x05\x00'}) 08:17:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xfc\x00', 0x7302}) [ 1461.753676][T19108] FAULT_INJECTION: forcing a failure. [ 1461.753676][T19108] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.778826][T19108] CPU: 1 PID: 19108 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1461.787653][T19108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.797849][T19108] Call Trace: [ 1461.801148][T19108] dump_stack+0x197/0x210 [ 1461.805616][T19108] should_fail.cold+0xa/0x15 [ 1461.810231][T19108] ? fault_create_debugfs_attr+0x180/0x180 [ 1461.816054][T19108] ? ___might_sleep+0x163/0x2c0 [ 1461.821683][T19108] __should_failslab+0x121/0x190 [ 1461.826613][T19108] should_failslab+0x9/0x14 [ 1461.831329][T19108] kmem_cache_alloc_node_trace+0x274/0x750 [ 1461.837146][T19108] ? do_raw_spin_unlock+0x178/0x270 [ 1461.842367][T19108] __kmalloc_node+0x3d/0x70 [ 1461.846891][T19108] __vmalloc_node_range+0x1db/0x810 [ 1461.852617][T19108] __vmalloc+0x44/0x50 [ 1461.856703][T19108] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1461.861451][T19108] pcpu_mem_zalloc+0x8a/0xf0 [ 1461.866112][T19108] pcpu_create_chunk+0xe0/0x7f0 [ 1461.870953][T19108] pcpu_alloc+0x10f3/0x1380 [ 1461.875464][T19108] ? pcpu_alloc_area+0x820/0x820 [ 1461.880401][T19108] ? bpf_map_area_alloc+0x20/0x30 [ 1461.885418][T19108] __alloc_percpu_gfp+0x28/0x30 [ 1461.890271][T19108] htab_map_alloc+0xdb9/0x11c0 [ 1461.895150][T19108] ? htab_map_update_elem+0xca0/0xca0 [ 1461.900567][T19108] __do_sys_bpf+0x478/0x3610 [ 1461.905152][T19108] ? bpf_prog_load+0x1960/0x1960 [ 1461.910073][T19108] ? __kasan_check_write+0x14/0x20 [ 1461.915184][T19108] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1461.920854][T19108] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1461.926136][T19108] ? wait_for_completion+0x440/0x440 [ 1461.931413][T19108] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1461.937700][T19108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1461.943198][T19108] ? do_syscall_64+0x26/0x790 [ 1461.947867][T19108] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.953943][T19108] ? do_syscall_64+0x26/0x790 [ 1461.958787][T19108] __x64_sys_bpf+0x73/0xb0 [ 1461.963192][T19108] do_syscall_64+0xfa/0x790 [ 1461.967691][T19108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.973571][T19108] RIP: 0033:0x45a919 [ 1461.977464][T19108] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.997055][T19108] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1462.005470][T19108] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1462.013452][T19108] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1462.021417][T19108] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1462.029380][T19108] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1462.037336][T19108] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:01 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00k\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:17:01 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0/\x00', 0x7302}) 08:17:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x06\x00'}) 08:17:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00P\x00', 0x7302}) 08:17:01 executing program 0 (fault-call:7 fault-nth:49): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1462.424590][T19131] FAULT_INJECTION: forcing a failure. [ 1462.424590][T19131] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1462.441111][T19131] CPU: 1 PID: 19131 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1462.449828][T19131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.459888][T19131] Call Trace: [ 1462.463180][T19131] dump_stack+0x197/0x210 [ 1462.467504][T19131] should_fail.cold+0xa/0x15 [ 1462.472107][T19131] ? fault_create_debugfs_attr+0x180/0x180 [ 1462.477928][T19131] ? ___might_sleep+0x163/0x2c0 [ 1462.482786][T19131] should_fail_alloc_page+0x50/0x60 [ 1462.487970][T19131] __alloc_pages_nodemask+0x1a1/0x910 [ 1462.493354][T19131] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1462.498929][T19131] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1462.504661][T19131] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1462.510909][T19131] alloc_pages_current+0x107/0x210 [ 1462.516133][T19131] ? ___might_sleep+0x163/0x2c0 [ 1462.521011][T19131] __vmalloc_node_range+0x4f8/0x810 [ 1462.526245][T19131] __vmalloc+0x44/0x50 [ 1462.530343][T19131] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1462.535208][T19131] pcpu_mem_zalloc+0x8a/0xf0 [ 1462.539802][T19131] pcpu_create_chunk+0x12d/0x7f0 [ 1462.544751][T19131] pcpu_alloc+0x10f3/0x1380 [ 1462.549268][T19131] ? pcpu_alloc_area+0x820/0x820 [ 1462.554208][T19131] ? bpf_map_area_alloc+0x20/0x30 [ 1462.559269][T19131] __alloc_percpu_gfp+0x28/0x30 [ 1462.564154][T19131] htab_map_alloc+0xdb9/0x11c0 [ 1462.569400][T19131] ? htab_map_update_elem+0xca0/0xca0 [ 1462.574801][T19131] __do_sys_bpf+0x478/0x3610 [ 1462.579414][T19131] ? bpf_prog_load+0x1960/0x1960 [ 1462.584372][T19131] ? __kasan_check_write+0x14/0x20 [ 1462.589499][T19131] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1462.595066][T19131] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1462.600369][T19131] ? wait_for_completion+0x440/0x440 [ 1462.605688][T19131] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1462.611944][T19131] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1462.617407][T19131] ? do_syscall_64+0x26/0x790 [ 1462.622085][T19131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1462.628156][T19131] ? do_syscall_64+0x26/0x790 [ 1462.632840][T19131] __x64_sys_bpf+0x73/0xb0 [ 1462.637250][T19131] do_syscall_64+0xfa/0x790 [ 1462.641745][T19131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1462.647648][T19131] RIP: 0033:0x45a919 [ 1462.651548][T19131] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1462.671317][T19131] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1462.679821][T19131] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1462.688595][T19131] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1462.696567][T19131] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1462.705055][T19131] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1462.713029][T19131] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:01 executing program 0 (fault-call:7 fault-nth:50): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\a\x00'}) 08:17:01 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0:\x00', 0x7302}) [ 1462.911505][T19138] FAULT_INJECTION: forcing a failure. [ 1462.911505][T19138] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:17:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\b\x00'}) 08:17:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xfd\x00', 0x7302}) [ 1463.044629][T19138] CPU: 1 PID: 19138 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1463.054143][T19138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.064211][T19138] Call Trace: [ 1463.067519][T19138] dump_stack+0x197/0x210 [ 1463.071868][T19138] should_fail.cold+0xa/0x15 [ 1463.076463][T19138] ? fault_create_debugfs_attr+0x180/0x180 [ 1463.082261][T19138] ? ___might_sleep+0x163/0x2c0 [ 1463.087122][T19138] should_fail_alloc_page+0x50/0x60 [ 1463.092320][T19138] __alloc_pages_nodemask+0x1a1/0x910 [ 1463.097691][T19138] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1463.103322][T19138] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1463.109070][T19138] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1463.115335][T19138] alloc_pages_current+0x107/0x210 [ 1463.120577][T19138] ? ___might_sleep+0x163/0x2c0 [ 1463.125465][T19138] __vmalloc_node_range+0x4f8/0x810 [ 1463.130873][T19138] __vmalloc+0x44/0x50 [ 1463.135048][T19138] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1463.139829][T19138] pcpu_mem_zalloc+0x8a/0xf0 [ 1463.144418][T19138] pcpu_create_chunk+0x12d/0x7f0 [ 1463.149372][T19138] pcpu_alloc+0x10f3/0x1380 [ 1463.153881][T19138] ? pcpu_alloc_area+0x820/0x820 [ 1463.158817][T19138] ? bpf_map_area_alloc+0x20/0x30 [ 1463.163902][T19138] __alloc_percpu_gfp+0x28/0x30 [ 1463.168768][T19138] htab_map_alloc+0xdb9/0x11c0 [ 1463.173569][T19138] ? htab_map_update_elem+0xca0/0xca0 [ 1463.178956][T19138] __do_sys_bpf+0x478/0x3610 [ 1463.183553][T19138] ? bpf_prog_load+0x1960/0x1960 [ 1463.188513][T19138] ? __kasan_check_write+0x14/0x20 [ 1463.193647][T19138] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1463.199203][T19138] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1463.204599][T19138] ? wait_for_completion+0x440/0x440 [ 1463.209913][T19138] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1463.216191][T19138] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1463.221664][T19138] ? do_syscall_64+0x26/0x790 [ 1463.226357][T19138] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.232425][T19138] ? do_syscall_64+0x26/0x790 [ 1463.237114][T19138] __x64_sys_bpf+0x73/0xb0 [ 1463.241659][T19138] do_syscall_64+0xfa/0x790 [ 1463.246156][T19138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.252030][T19138] RIP: 0033:0x45a919 [ 1463.255973][T19138] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.275757][T19138] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1463.284183][T19138] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 08:17:02 executing program 0 (fault-call:7 fault-nth:51): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1463.292154][T19138] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1463.300113][T19138] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1463.308075][T19138] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1463.316044][T19138] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1463.448128][T19157] FAULT_INJECTION: forcing a failure. [ 1463.448128][T19157] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1463.461837][T19157] CPU: 0 PID: 19157 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1463.470531][T19157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.480718][T19157] Call Trace: [ 1463.484082][T19157] dump_stack+0x197/0x210 [ 1463.488422][T19157] should_fail.cold+0xa/0x15 [ 1463.493017][T19157] ? fault_create_debugfs_attr+0x180/0x180 [ 1463.498818][T19157] ? ___might_sleep+0x163/0x2c0 [ 1463.503681][T19157] should_fail_alloc_page+0x50/0x60 [ 1463.508893][T19157] __alloc_pages_nodemask+0x1a1/0x910 [ 1463.514263][T19157] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1463.519801][T19157] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1463.525555][T19157] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1463.531812][T19157] alloc_pages_current+0x107/0x210 [ 1463.536926][T19157] ? ___might_sleep+0x163/0x2c0 [ 1463.541785][T19157] __vmalloc_node_range+0x4f8/0x810 [ 1463.547017][T19157] __vmalloc+0x44/0x50 [ 1463.551081][T19157] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1463.555844][T19157] pcpu_mem_zalloc+0x8a/0xf0 [ 1463.560436][T19157] pcpu_create_chunk+0x12d/0x7f0 [ 1463.565404][T19157] pcpu_alloc+0x10f3/0x1380 [ 1463.570182][T19157] ? pcpu_alloc_area+0x820/0x820 [ 1463.575122][T19157] ? bpf_map_area_alloc+0x20/0x30 [ 1463.580163][T19157] __alloc_percpu_gfp+0x28/0x30 [ 1463.585016][T19157] htab_map_alloc+0xdb9/0x11c0 [ 1463.589896][T19157] ? htab_map_update_elem+0xca0/0xca0 [ 1463.595283][T19157] __do_sys_bpf+0x478/0x3610 [ 1463.599869][T19157] ? bpf_prog_load+0x1960/0x1960 [ 1463.604813][T19157] ? __kasan_check_write+0x14/0x20 [ 1463.609936][T19157] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1463.615491][T19157] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1463.620804][T19157] ? wait_for_completion+0x440/0x440 [ 1463.626107][T19157] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1463.632492][T19157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1463.637945][T19157] ? do_syscall_64+0x26/0x790 [ 1463.642761][T19157] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.648828][T19157] ? do_syscall_64+0x26/0x790 [ 1463.653653][T19157] __x64_sys_bpf+0x73/0xb0 [ 1463.658085][T19157] do_syscall_64+0xfa/0x790 [ 1463.662778][T19157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.668673][T19157] RIP: 0033:0x45a919 [ 1463.672559][T19157] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.692418][T19157] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1463.700829][T19157] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1463.709867][T19157] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1463.717850][T19157] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1463.725933][T19157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1463.734025][T19157] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x10\x00'}) 08:17:03 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00l\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:17:03 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0c\x00', 0x7302}) 08:17:03 executing program 0 (fault-call:7 fault-nth:52): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00Q\x00', 0x7302}) 08:17:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x03\x00'}) 08:17:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\xff\xff\xfd\xfd\x00', 0x7302}) 08:17:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x05\x00'}) [ 1464.269973][T19181] FAULT_INJECTION: forcing a failure. [ 1464.269973][T19181] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1464.294646][T19181] CPU: 0 PID: 19181 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1464.303913][T19181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.314071][T19181] Call Trace: [ 1464.317391][T19181] dump_stack+0x197/0x210 [ 1464.322086][T19181] should_fail.cold+0xa/0x15 [ 1464.326909][T19181] ? fault_create_debugfs_attr+0x180/0x180 [ 1464.333008][T19181] ? ___might_sleep+0x163/0x2c0 [ 1464.337903][T19181] should_fail_alloc_page+0x50/0x60 [ 1464.343223][T19181] __alloc_pages_nodemask+0x1a1/0x910 [ 1464.348927][T19181] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1464.354675][T19181] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1464.360977][T19181] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1464.367512][T19181] alloc_pages_current+0x107/0x210 [ 1464.372745][T19181] ? ___might_sleep+0x163/0x2c0 [ 1464.377980][T19181] __vmalloc_node_range+0x4f8/0x810 [ 1464.383371][T19181] __vmalloc+0x44/0x50 [ 1464.387645][T19181] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1464.392702][T19181] pcpu_mem_zalloc+0x8a/0xf0 [ 1464.397665][T19181] pcpu_create_chunk+0x12d/0x7f0 [ 1464.403001][T19181] pcpu_alloc+0x10f3/0x1380 [ 1464.407795][T19181] ? pcpu_alloc_area+0x820/0x820 [ 1464.412837][T19181] ? bpf_map_area_alloc+0x20/0x30 [ 1464.418338][T19181] __alloc_percpu_gfp+0x28/0x30 [ 1464.423350][T19181] htab_map_alloc+0xdb9/0x11c0 [ 1464.428314][T19181] ? htab_map_update_elem+0xca0/0xca0 [ 1464.433690][T19181] __do_sys_bpf+0x478/0x3610 [ 1464.438288][T19181] ? bpf_prog_load+0x1960/0x1960 [ 1464.443369][T19181] ? __kasan_check_write+0x14/0x20 [ 1464.448806][T19181] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1464.454368][T19181] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1464.459905][T19181] ? wait_for_completion+0x440/0x440 [ 1464.465211][T19181] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1464.471713][T19181] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1464.477281][T19181] ? do_syscall_64+0x26/0x790 [ 1464.482225][T19181] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1464.488420][T19181] ? do_syscall_64+0x26/0x790 [ 1464.493255][T19181] __x64_sys_bpf+0x73/0xb0 [ 1464.497694][T19181] do_syscall_64+0xfa/0x790 [ 1464.502456][T19181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1464.508557][T19181] RIP: 0033:0x45a919 [ 1464.512646][T19181] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1464.532861][T19181] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1464.541559][T19181] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1464.549811][T19181] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1464.557794][T19181] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1464.566076][T19181] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1464.574059][T19181] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:03 executing program 0 (fault-call:7 fault-nth:53): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) [ 1464.770966][T19192] FAULT_INJECTION: forcing a failure. [ 1464.770966][T19192] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1464.785598][T19192] CPU: 0 PID: 19192 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1464.794455][T19192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.804518][T19192] Call Trace: [ 1464.807803][T19192] dump_stack+0x197/0x210 [ 1464.812224][T19192] should_fail.cold+0xa/0x15 [ 1464.816910][T19192] ? fault_create_debugfs_attr+0x180/0x180 [ 1464.822825][T19192] ? ___might_sleep+0x163/0x2c0 [ 1464.827808][T19192] should_fail_alloc_page+0x50/0x60 [ 1464.833346][T19192] __alloc_pages_nodemask+0x1a1/0x910 [ 1464.838718][T19192] ? find_held_lock+0x35/0x130 [ 1464.843488][T19192] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1464.849414][T19192] ? lock_downgrade+0x920/0x920 [ 1464.854446][T19192] ? rwlock_bug.part.0+0x90/0x90 [ 1464.859597][T19192] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1464.866181][T19192] alloc_pages_current+0x107/0x210 [ 1464.871693][T19192] __get_free_pages+0xc/0x40 [ 1464.876302][T19192] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1464.882069][T19192] apply_to_page_range+0x445/0x700 [ 1464.887490][T19192] ? memset+0x40/0x40 [ 1464.891897][T19192] kasan_populate_vmalloc+0x68/0x90 [ 1464.897237][T19192] __vmalloc_node_range+0x47e/0x810 [ 1464.902465][T19192] __vmalloc+0x44/0x50 [ 1464.906606][T19192] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1464.911462][T19192] pcpu_mem_zalloc+0x8a/0xf0 [ 1464.916053][T19192] pcpu_create_chunk+0x12d/0x7f0 [ 1464.921107][T19192] pcpu_alloc+0x10f3/0x1380 [ 1464.925962][T19192] ? pcpu_alloc_area+0x820/0x820 [ 1464.930972][T19192] ? bpf_map_area_alloc+0x20/0x30 [ 1464.936016][T19192] __alloc_percpu_gfp+0x28/0x30 [ 1464.940963][T19192] htab_map_alloc+0xdb9/0x11c0 [ 1464.946224][T19192] ? htab_map_update_elem+0xca0/0xca0 [ 1464.951623][T19192] __do_sys_bpf+0x478/0x3610 [ 1464.956450][T19192] ? bpf_prog_load+0x1960/0x1960 [ 1464.961388][T19192] ? __kasan_check_write+0x14/0x20 [ 1464.966489][T19192] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1464.972117][T19192] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1464.977534][T19192] ? wait_for_completion+0x440/0x440 [ 1464.983405][T19192] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1464.990382][T19192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1464.995990][T19192] ? do_syscall_64+0x26/0x790 [ 1465.000672][T19192] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1465.007050][T19192] ? do_syscall_64+0x26/0x790 [ 1465.011991][T19192] __x64_sys_bpf+0x73/0xb0 [ 1465.016443][T19192] do_syscall_64+0xfa/0x790 [ 1465.021194][T19192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1465.027455][T19192] RIP: 0033:0x45a919 [ 1465.031372][T19192] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1465.051461][T19192] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1465.061425][T19192] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 08:17:04 executing program 0 (fault-call:7 fault-nth:54): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1465.069408][T19192] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1465.077381][T19192] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1465.085974][T19192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1465.094334][T19192] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 08:17:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xfe\x00', 0x7302}) [ 1465.300019][T19201] FAULT_INJECTION: forcing a failure. [ 1465.300019][T19201] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.349377][T19201] CPU: 1 PID: 19201 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1465.358519][T19201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.368593][T19201] Call Trace: [ 1465.372022][T19201] dump_stack+0x197/0x210 [ 1465.376540][T19201] should_fail.cold+0xa/0x15 [ 1465.381156][T19201] ? fault_create_debugfs_attr+0x180/0x180 [ 1465.387070][T19201] ? ___might_sleep+0x163/0x2c0 [ 1465.392012][T19201] __should_failslab+0x121/0x190 [ 1465.396959][T19201] should_failslab+0x9/0x14 [ 1465.401473][T19201] kmem_cache_alloc_node_trace+0x274/0x750 [ 1465.407530][T19201] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1465.413572][T19201] ? apply_to_page_range+0x562/0x700 [ 1465.418881][T19201] __get_vm_area_node+0x12b/0x4f0 [ 1465.423928][T19201] __vmalloc_node_range+0xd4/0x810 [ 1465.429129][T19201] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1465.434116][T19201] __vmalloc+0x44/0x50 [ 1465.438199][T19201] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1465.442999][T19201] pcpu_mem_zalloc+0x8a/0xf0 [ 1465.447869][T19201] pcpu_create_chunk+0x196/0x7f0 [ 1465.452882][T19201] pcpu_alloc+0x10f3/0x1380 [ 1465.457411][T19201] ? pcpu_alloc_area+0x820/0x820 [ 1465.462434][T19201] ? bpf_map_area_alloc+0x20/0x30 [ 1465.467459][T19201] __alloc_percpu_gfp+0x28/0x30 [ 1465.472305][T19201] htab_map_alloc+0xdb9/0x11c0 [ 1465.477125][T19201] ? htab_map_update_elem+0xca0/0xca0 [ 1465.482514][T19201] __do_sys_bpf+0x478/0x3610 [ 1465.487250][T19201] ? bpf_prog_load+0x1960/0x1960 [ 1465.492183][T19201] ? __kasan_check_write+0x14/0x20 [ 1465.497313][T19201] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1465.502948][T19201] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1465.508629][T19201] ? wait_for_completion+0x440/0x440 [ 1465.513918][T19201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1465.520191][T19201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1465.525664][T19201] ? do_syscall_64+0x26/0x790 [ 1465.530434][T19201] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1465.536517][T19201] ? do_syscall_64+0x26/0x790 [ 1465.541400][T19201] __x64_sys_bpf+0x73/0xb0 [ 1465.545832][T19201] do_syscall_64+0xfa/0x790 [ 1465.550424][T19201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1465.556611][T19201] RIP: 0033:0x45a919 [ 1465.560526][T19201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1465.580838][T19201] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1465.589264][T19201] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1465.597575][T19201] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1465.605558][T19201] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1465.613525][T19201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1465.621562][T19201] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:04 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00m\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:17:04 executing program 0 (fault-call:7 fault-nth:55): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00?\x00'}) 08:17:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00R\x00', 0x7302}) 08:17:04 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x18\x01\x00', 0x7302}) [ 1466.002058][T19227] FAULT_INJECTION: forcing a failure. [ 1466.002058][T19227] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.049465][T19227] CPU: 1 PID: 19227 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1466.058299][T19227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.068486][T19227] Call Trace: [ 1466.071809][T19227] dump_stack+0x197/0x210 [ 1466.076317][T19227] should_fail.cold+0xa/0x15 [ 1466.081030][T19227] ? fault_create_debugfs_attr+0x180/0x180 [ 1466.086871][T19227] ? ___might_sleep+0x163/0x2c0 [ 1466.091777][T19227] __should_failslab+0x121/0x190 08:17:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00@\x00'}) [ 1466.096757][T19227] should_failslab+0x9/0x14 [ 1466.101286][T19227] kmem_cache_alloc_node+0x268/0x740 [ 1466.106597][T19227] ? ___might_sleep+0x163/0x2c0 [ 1466.111491][T19227] alloc_vmap_area+0x147/0x2030 [ 1466.116385][T19227] ? __get_vm_area_node+0x12b/0x4f0 [ 1466.121599][T19227] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1466.127297][T19227] ? purge_vmap_area_lazy+0x40/0x40 [ 1466.132719][T19227] ? apply_to_page_range+0x562/0x700 [ 1466.138041][T19227] __get_vm_area_node+0x179/0x4f0 [ 1466.143388][T19227] __vmalloc_node_range+0xd4/0x810 [ 1466.148704][T19227] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1466.153475][T19227] __vmalloc+0x44/0x50 [ 1466.157557][T19227] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1466.162338][T19227] pcpu_mem_zalloc+0x8a/0xf0 [ 1466.166942][T19227] pcpu_create_chunk+0x196/0x7f0 [ 1466.172061][T19227] pcpu_alloc+0x10f3/0x1380 [ 1466.176773][T19227] ? pcpu_alloc_area+0x820/0x820 [ 1466.181728][T19227] __alloc_percpu_gfp+0x28/0x30 [ 1466.186686][T19227] htab_map_alloc+0xdb9/0x11c0 [ 1466.191469][T19227] ? htab_map_update_elem+0xca0/0xca0 [ 1466.196856][T19227] __do_sys_bpf+0x478/0x3610 [ 1466.201479][T19227] ? bpf_prog_load+0x1960/0x1960 [ 1466.206693][T19227] ? __kasan_check_write+0x14/0x20 [ 1466.212077][T19227] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1466.217727][T19227] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1466.223072][T19227] ? wait_for_completion+0x440/0x440 [ 1466.228516][T19227] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1466.235594][T19227] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1466.241079][T19227] ? do_syscall_64+0x26/0x790 [ 1466.245888][T19227] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.251964][T19227] ? do_syscall_64+0x26/0x790 [ 1466.256749][T19227] __x64_sys_bpf+0x73/0xb0 [ 1466.261347][T19227] do_syscall_64+0xfa/0x790 [ 1466.265893][T19227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.271923][T19227] RIP: 0033:0x45a919 [ 1466.276036][T19227] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.295661][T19227] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1466.304086][T19227] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1466.312382][T19227] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1466.320468][T19227] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1466.328561][T19227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1466.336756][T19227] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:05 executing program 0 (fault-call:7 fault-nth:56): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\xff\x00'}) [ 1466.529927][T19238] FAULT_INJECTION: forcing a failure. [ 1466.529927][T19238] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1466.547995][T19238] CPU: 0 PID: 19238 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1466.556731][T19238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.566801][T19238] Call Trace: [ 1466.570119][T19238] dump_stack+0x197/0x210 [ 1466.574478][T19238] should_fail.cold+0xa/0x15 [ 1466.579098][T19238] ? fault_create_debugfs_attr+0x180/0x180 [ 1466.585179][T19238] ? ___might_sleep+0x163/0x2c0 [ 1466.590065][T19238] should_fail_alloc_page+0x50/0x60 [ 1466.596232][T19238] __alloc_pages_nodemask+0x1a1/0x910 [ 1466.601736][T19238] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1466.607332][T19238] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1466.613082][T19238] ? kasan_unpoison_shadow+0x35/0x50 [ 1466.618530][T19238] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1466.624920][T19238] alloc_pages_current+0x107/0x210 [ 1466.630063][T19238] __vmalloc_node_range+0x4f8/0x810 [ 1466.635385][T19238] __vmalloc+0x44/0x50 [ 1466.639485][T19238] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1466.644279][T19238] pcpu_mem_zalloc+0x8a/0xf0 [ 1466.648894][T19238] pcpu_create_chunk+0x196/0x7f0 [ 1466.653860][T19238] pcpu_alloc+0x10f3/0x1380 [ 1466.658407][T19238] ? pcpu_alloc_area+0x820/0x820 [ 1466.663505][T19238] ? bpf_map_area_alloc+0x20/0x30 [ 1466.668562][T19238] __alloc_percpu_gfp+0x28/0x30 [ 1466.673434][T19238] htab_map_alloc+0xdb9/0x11c0 08:17:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\xa0\x00`\x00'}) 08:17:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\xa0\x00\x80\x00'}) 08:17:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}) [ 1466.678232][T19238] ? htab_map_update_elem+0xca0/0xca0 [ 1466.683745][T19238] __do_sys_bpf+0x478/0x3610 [ 1466.688366][T19238] ? bpf_prog_load+0x1960/0x1960 [ 1466.693499][T19238] ? __kasan_check_write+0x14/0x20 [ 1466.698637][T19238] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1466.704208][T19238] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1466.709520][T19238] ? wait_for_completion+0x440/0x440 [ 1466.714837][T19238] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1466.721228][T19238] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1466.726792][T19238] ? do_syscall_64+0x26/0x790 [ 1466.731491][T19238] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.737614][T19238] ? do_syscall_64+0x26/0x790 [ 1466.742374][T19238] __x64_sys_bpf+0x73/0xb0 [ 1466.746903][T19238] do_syscall_64+0xfa/0x790 [ 1466.751612][T19238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.757520][T19238] RIP: 0033:0x45a919 [ 1466.761546][T19238] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.782115][T19238] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1466.790875][T19238] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1466.799324][T19238] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1466.807754][T19238] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1466.816045][T19238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1466.824032][T19238] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\xff\xff\xff\xfe\x00', 0x7302}) 08:17:06 executing program 0 (fault-call:7 fault-nth:57): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) 08:17:06 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00\x03\x00', 0x7302}) 08:17:06 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00n\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:17:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00S\x00', 0x7302}) 08:17:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x02\x93\xff\x00', 0x7302}) 08:17:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}) [ 1467.410613][T19265] FAULT_INJECTION: forcing a failure. [ 1467.410613][T19265] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.443384][T19265] CPU: 0 PID: 19265 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1467.452118][T19265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.462588][T19265] Call Trace: [ 1467.465954][T19265] dump_stack+0x197/0x210 [ 1467.465975][T19265] should_fail.cold+0xa/0x15 [ 1467.465993][T19265] ? fault_create_debugfs_attr+0x180/0x180 [ 1467.466011][T19265] ? ___might_sleep+0x163/0x2c0 [ 1467.466033][T19265] __should_failslab+0x121/0x190 [ 1467.466052][T19265] should_failslab+0x9/0x14 [ 1467.466064][T19265] kmem_cache_alloc_node_trace+0x274/0x750 [ 1467.466089][T19265] ? do_raw_spin_unlock+0x178/0x270 [ 1467.507146][T19265] __kmalloc_node+0x3d/0x70 [ 1467.511682][T19265] __vmalloc_node_range+0x1db/0x810 [ 1467.516932][T19265] __vmalloc+0x44/0x50 [ 1467.521255][T19265] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1467.526051][T19265] pcpu_mem_zalloc+0x8a/0xf0 [ 1467.530757][T19265] pcpu_create_chunk+0x196/0x7f0 [ 1467.535815][T19265] pcpu_alloc+0x10f3/0x1380 [ 1467.540569][T19265] ? pcpu_alloc_area+0x820/0x820 [ 1467.545620][T19265] ? bpf_map_area_alloc+0x20/0x30 [ 1467.550686][T19265] __alloc_percpu_gfp+0x28/0x30 [ 1467.555832][T19265] htab_map_alloc+0xdb9/0x11c0 [ 1467.560740][T19265] ? htab_map_update_elem+0xca0/0xca0 [ 1467.566295][T19265] __do_sys_bpf+0x478/0x3610 [ 1467.570916][T19265] ? bpf_prog_load+0x1960/0x1960 [ 1467.575887][T19265] ? __kasan_check_write+0x14/0x20 [ 1467.581277][T19265] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1467.586956][T19265] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1467.592255][T19265] ? wait_for_completion+0x440/0x440 [ 1467.597729][T19265] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1467.604159][T19265] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1467.609651][T19265] ? do_syscall_64+0x26/0x790 [ 1467.614739][T19265] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1467.621315][T19265] ? do_syscall_64+0x26/0x790 [ 1467.626018][T19265] __x64_sys_bpf+0x73/0xb0 [ 1467.630466][T19265] do_syscall_64+0xfa/0x790 [ 1467.635010][T19265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1467.641497][T19265] RIP: 0033:0x45a919 [ 1467.645407][T19265] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1467.665173][T19265] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1467.673923][T19265] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1467.682046][T19265] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1467.690509][T19265] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1467.698761][T19265] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1467.706762][T19265] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}) 08:17:06 executing program 0 (fault-call:7 fault-nth:58): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:06 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0$\x03\x00', 0x7302}) 08:17:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}) [ 1467.930117][T19287] FAULT_INJECTION: forcing a failure. [ 1467.930117][T19287] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1467.985411][T19287] CPU: 1 PID: 19287 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1467.994638][T19287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.994645][T19287] Call Trace: [ 1467.994666][T19287] dump_stack+0x197/0x210 [ 1467.994685][T19287] should_fail.cold+0xa/0x15 [ 1467.994702][T19287] ? fault_create_debugfs_attr+0x180/0x180 [ 1467.994719][T19287] ? ___might_sleep+0x163/0x2c0 [ 1467.994747][T19287] should_fail_alloc_page+0x50/0x60 [ 1467.994761][T19287] __alloc_pages_nodemask+0x1a1/0x910 [ 1467.994777][T19287] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1467.994799][T19287] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1468.017217][T19287] ? kasan_unpoison_shadow+0x35/0x50 [ 1468.017243][T19287] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1468.061943][T19287] alloc_pages_current+0x107/0x210 [ 1468.067079][T19287] __vmalloc_node_range+0x4f8/0x810 [ 1468.072296][T19287] __vmalloc+0x44/0x50 [ 1468.076376][T19287] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1468.081356][T19287] pcpu_mem_zalloc+0x8a/0xf0 [ 1468.085947][T19287] pcpu_create_chunk+0x196/0x7f0 [ 1468.090969][T19287] pcpu_alloc+0x10f3/0x1380 [ 1468.095482][T19287] ? pcpu_alloc_area+0x820/0x820 [ 1468.100759][T19287] ? bpf_map_area_alloc+0x20/0x30 [ 1468.105845][T19287] __alloc_percpu_gfp+0x28/0x30 [ 1468.110694][T19287] htab_map_alloc+0xdb9/0x11c0 [ 1468.115479][T19287] ? htab_map_update_elem+0xca0/0xca0 [ 1468.120864][T19287] __do_sys_bpf+0x478/0x3610 [ 1468.125456][T19287] ? bpf_prog_load+0x1960/0x1960 [ 1468.130612][T19287] ? __kasan_check_write+0x14/0x20 [ 1468.135896][T19287] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1468.141528][T19287] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1468.147054][T19287] ? wait_for_completion+0x440/0x440 [ 1468.152351][T19287] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1468.158776][T19287] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1468.164285][T19287] ? do_syscall_64+0x26/0x790 [ 1468.169049][T19287] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.175116][T19287] ? do_syscall_64+0x26/0x790 [ 1468.179899][T19287] __x64_sys_bpf+0x73/0xb0 [ 1468.184399][T19287] do_syscall_64+0xfa/0x790 [ 1468.188919][T19287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.195115][T19287] RIP: 0033:0x45a919 [ 1468.199119][T19287] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1468.218841][T19287] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1468.227253][T19287] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 08:17:07 executing program 0 (fault-call:7 fault-nth:59): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1468.235227][T19287] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1468.243199][T19287] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1468.251172][T19287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1468.259141][T19287] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1468.390623][T19300] FAULT_INJECTION: forcing a failure. [ 1468.390623][T19300] name failslab, interval 1, probability 0, space 0, times 0 [ 1468.403805][T19300] CPU: 1 PID: 19300 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1468.412575][T19300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1468.422641][T19300] Call Trace: [ 1468.426150][T19300] dump_stack+0x197/0x210 [ 1468.430686][T19300] should_fail.cold+0xa/0x15 [ 1468.435405][T19300] ? fault_create_debugfs_attr+0x180/0x180 [ 1468.441534][T19300] ? ___might_sleep+0x163/0x2c0 [ 1468.446739][T19300] __should_failslab+0x121/0x190 [ 1468.451684][T19300] should_failslab+0x9/0x14 [ 1468.456275][T19300] __kmalloc+0x2e0/0x770 [ 1468.460516][T19300] ? memset+0x40/0x40 [ 1468.464543][T19300] ? pcpu_get_vm_areas+0x3d5/0x3ee0 [ 1468.469753][T19300] pcpu_get_vm_areas+0x3d5/0x3ee0 [ 1468.474780][T19300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1468.481043][T19300] ? __vmalloc_node_range+0x4d7/0x810 [ 1468.486670][T19300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1468.493017][T19300] pcpu_create_chunk+0x24e/0x7f0 [ 1468.498129][T19300] pcpu_alloc+0x10f3/0x1380 [ 1468.502682][T19300] ? pcpu_alloc_area+0x820/0x820 [ 1468.507621][T19300] ? bpf_map_area_alloc+0x20/0x30 [ 1468.512655][T19300] __alloc_percpu_gfp+0x28/0x30 [ 1468.517636][T19300] htab_map_alloc+0xdb9/0x11c0 [ 1468.522507][T19300] ? htab_map_update_elem+0xca0/0xca0 [ 1468.527879][T19300] __do_sys_bpf+0x478/0x3610 [ 1468.532489][T19300] ? bpf_prog_load+0x1960/0x1960 [ 1468.537427][T19300] ? __kasan_check_write+0x14/0x20 [ 1468.542536][T19300] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1468.548308][T19300] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1468.553600][T19300] ? wait_for_completion+0x440/0x440 [ 1468.559010][T19300] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1468.565370][T19300] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1468.572609][T19300] ? do_syscall_64+0x26/0x790 [ 1468.577290][T19300] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.583360][T19300] ? do_syscall_64+0x26/0x790 [ 1468.588280][T19300] __x64_sys_bpf+0x73/0xb0 [ 1468.592809][T19300] do_syscall_64+0xfa/0x790 [ 1468.597539][T19300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.603446][T19300] RIP: 0033:0x45a919 [ 1468.607340][T19300] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1468.627248][T19300] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1468.635794][T19300] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1468.643787][T19300] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1468.651777][T19300] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1468.659985][T19300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1468.669037][T19300] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00o\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:17:07 executing program 0 (fault-call:7 fault-nth:60): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x03\xff\xff\x00', 0x7302}) 08:17:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) 08:17:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00T\x00', 0x7302}) [ 1468.960671][T19316] FAULT_INJECTION: forcing a failure. [ 1468.960671][T19316] name failslab, interval 1, probability 0, space 0, times 0 [ 1468.975684][T19316] CPU: 1 PID: 19316 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1468.984407][T19316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1468.994748][T19316] Call Trace: [ 1468.998085][T19316] dump_stack+0x197/0x210 [ 1469.002546][T19316] should_fail.cold+0xa/0x15 [ 1469.007429][T19316] ? fault_create_debugfs_attr+0x180/0x180 [ 1469.013562][T19316] ? ___might_sleep+0x163/0x2c0 [ 1469.019064][T19316] __should_failslab+0x121/0x190 [ 1469.024458][T19316] should_failslab+0x9/0x14 [ 1469.029375][T19316] __kmalloc+0x2e0/0x770 [ 1469.033939][T19316] ? memset+0x40/0x40 [ 1469.038103][T19316] ? pcpu_get_vm_areas+0x3d5/0x3ee0 [ 1469.043627][T19316] pcpu_get_vm_areas+0x3d5/0x3ee0 [ 1469.049158][T19316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.055419][T19316] ? __vmalloc_node_range+0x4d7/0x810 [ 1469.061462][T19316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1469.068040][T19316] pcpu_create_chunk+0x24e/0x7f0 [ 1469.073175][T19316] pcpu_alloc+0x10f3/0x1380 [ 1469.077830][T19316] ? pcpu_alloc_area+0x820/0x820 [ 1469.083221][T19316] ? bpf_map_area_alloc+0x20/0x30 [ 1469.088508][T19316] __alloc_percpu_gfp+0x28/0x30 [ 1469.093447][T19316] htab_map_alloc+0xdb9/0x11c0 [ 1469.098777][T19316] ? htab_map_update_elem+0xca0/0xca0 [ 1469.104462][T19316] __do_sys_bpf+0x478/0x3610 [ 1469.109142][T19316] ? bpf_prog_load+0x1960/0x1960 [ 1469.116847][T19316] ? __kasan_check_write+0x14/0x20 [ 1469.122238][T19316] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1469.128082][T19316] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1469.134095][T19316] ? wait_for_completion+0x440/0x440 [ 1469.140031][T19316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1469.146446][T19316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1469.152002][T19316] ? do_syscall_64+0x26/0x790 [ 1469.158650][T19316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.167322][T19316] ? do_syscall_64+0x26/0x790 [ 1469.172424][T19316] __x64_sys_bpf+0x73/0xb0 [ 1469.179494][T19316] do_syscall_64+0xfa/0x790 [ 1469.185151][T19316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.191129][T19316] RIP: 0033:0x45a919 [ 1469.195208][T19316] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1469.220918][T19316] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1469.230765][T19316] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1469.240132][T19316] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1469.249032][T19316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:17:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 1469.258314][T19316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1469.266465][T19316] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 08:17:08 executing program 0 (fault-call:7 fault-nth:61): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) [ 1469.490103][T19329] FAULT_INJECTION: forcing a failure. [ 1469.490103][T19329] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.508713][T19329] CPU: 0 PID: 19329 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1469.517775][T19329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1469.527979][T19329] Call Trace: [ 1469.531403][T19329] dump_stack+0x197/0x210 [ 1469.535739][T19329] should_fail.cold+0xa/0x15 [ 1469.540329][T19329] ? fault_create_debugfs_attr+0x180/0x180 [ 1469.546496][T19329] ? ___might_sleep+0x163/0x2c0 [ 1469.551449][T19329] __should_failslab+0x121/0x190 [ 1469.556805][T19329] should_failslab+0x9/0x14 [ 1469.561315][T19329] kmem_cache_alloc+0x2aa/0x710 [ 1469.566180][T19329] ? memset+0x40/0x40 [ 1469.570184][T19329] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1469.575404][T19329] pcpu_get_vm_areas+0x49e/0x3ee0 [ 1469.580561][T19329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.586830][T19329] ? __vmalloc_node_range+0x4d7/0x810 [ 1469.592481][T19329] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1469.599348][T19329] pcpu_create_chunk+0x24e/0x7f0 [ 1469.604292][T19329] pcpu_alloc+0x10f3/0x1380 [ 1469.608812][T19329] ? pcpu_alloc_area+0x820/0x820 [ 1469.613756][T19329] ? bpf_map_area_alloc+0x20/0x30 [ 1469.618895][T19329] __alloc_percpu_gfp+0x28/0x30 [ 1469.623787][T19329] htab_map_alloc+0xdb9/0x11c0 [ 1469.628576][T19329] ? htab_map_update_elem+0xca0/0xca0 [ 1469.634032][T19329] __do_sys_bpf+0x478/0x3610 [ 1469.638810][T19329] ? bpf_prog_load+0x1960/0x1960 [ 1469.643892][T19329] ? __kasan_check_write+0x14/0x20 [ 1469.649016][T19329] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1469.654568][T19329] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1469.659935][T19329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.666180][T19329] ? debug_smp_processor_id+0x33/0x18a [ 1469.671642][T19329] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1469.677797][T19329] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1469.683263][T19329] ? do_syscall_64+0x26/0x790 [ 1469.687967][T19329] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.694034][T19329] ? do_syscall_64+0x26/0x790 [ 1469.698706][T19329] __x64_sys_bpf+0x73/0xb0 [ 1469.703116][T19329] do_syscall_64+0xfa/0x790 [ 1469.707631][T19329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.713521][T19329] RIP: 0033:0x45a919 [ 1469.717418][T19329] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1469.737011][T19329] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1469.745510][T19329] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1469.753536][T19329] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1469.761696][T19329] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1469.769666][T19329] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1469.777636][T19329] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:08 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr06\x03\x00', 0x7302}) 08:17:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 08:17:08 executing program 0 (fault-call:7 fault-nth:62): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 1470.020267][T19347] FAULT_INJECTION: forcing a failure. [ 1470.020267][T19347] name failslab, interval 1, probability 0, space 0, times 0 [ 1470.048551][T19347] CPU: 1 PID: 19347 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1470.057274][T19347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.067334][T19347] Call Trace: [ 1470.070638][T19347] dump_stack+0x197/0x210 [ 1470.074987][T19347] should_fail.cold+0xa/0x15 [ 1470.079596][T19347] ? fault_create_debugfs_attr+0x180/0x180 [ 1470.085417][T19347] ? ___might_sleep+0x163/0x2c0 [ 1470.090419][T19347] __should_failslab+0x121/0x190 [ 1470.095436][T19347] should_failslab+0x9/0x14 [ 1470.099945][T19347] kmem_cache_alloc+0x2aa/0x710 [ 1470.104785][T19347] ? memset+0x40/0x40 [ 1470.108799][T19347] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1470.113984][T19347] pcpu_get_vm_areas+0x49e/0x3ee0 [ 1470.119010][T19347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.125237][T19347] ? __vmalloc_node_range+0x4d7/0x810 [ 1470.130623][T19347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1470.136851][T19347] pcpu_create_chunk+0x24e/0x7f0 [ 1470.141798][T19347] pcpu_alloc+0x10f3/0x1380 [ 1470.146326][T19347] ? pcpu_alloc_area+0x820/0x820 [ 1470.151286][T19347] ? bpf_map_area_alloc+0x20/0x30 [ 1470.156305][T19347] __alloc_percpu_gfp+0x28/0x30 [ 1470.161147][T19347] htab_map_alloc+0xdb9/0x11c0 [ 1470.165919][T19347] ? htab_map_update_elem+0xca0/0xca0 [ 1470.171292][T19347] __do_sys_bpf+0x478/0x3610 [ 1470.175879][T19347] ? bpf_prog_load+0x1960/0x1960 [ 1470.180809][T19347] ? __kasan_check_write+0x14/0x20 [ 1470.185906][T19347] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1470.191438][T19347] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1470.196724][T19347] ? wait_for_completion+0x440/0x440 [ 1470.202013][T19347] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1470.208263][T19347] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1470.213722][T19347] ? do_syscall_64+0x26/0x790 [ 1470.218401][T19347] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.224632][T19347] ? do_syscall_64+0x26/0x790 [ 1470.229374][T19347] __x64_sys_bpf+0x73/0xb0 [ 1470.233903][T19347] do_syscall_64+0xfa/0x790 [ 1470.238439][T19347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.244326][T19347] RIP: 0033:0x45a919 [ 1470.248212][T19347] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1470.267902][T19347] RSP: 002b:00007f30aab44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1470.276326][T19347] RAX: ffffffffffffffda RBX: 00007f30aab44c90 RCX: 000000000045a919 [ 1470.284310][T19347] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1470.292328][T19347] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1470.300465][T19347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab456d4 [ 1470.308519][T19347] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 08:17:09 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x00p\x00', 0x7302}) socket$kcm(0x2, 0x0, 0x0) 08:17:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 08:17:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00U\x00', 0x7302}) 08:17:09 executing program 0 (fault-call:7 fault-nth:63): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 08:17:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\xfd\xfd\xff\xff\x00', 0x7302}) 08:17:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x00\x00\x00\x00`\x00\xa0\x00'}) [ 1470.632792][T19359] FAULT_INJECTION: forcing a failure. [ 1470.632792][T19359] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1470.649473][T19359] CPU: 1 PID: 19359 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1470.658386][T19359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.670793][T19359] Call Trace: [ 1470.674104][T19359] dump_stack+0x197/0x210 [ 1470.678453][T19359] should_fail.cold+0xa/0x15 [ 1470.683079][T19359] ? fault_create_debugfs_attr+0x180/0x180 [ 1470.689241][T19359] ? ___might_sleep+0x163/0x2c0 [ 1470.694104][T19359] should_fail_alloc_page+0x50/0x60 [ 1470.699416][T19359] __alloc_pages_nodemask+0x1a1/0x910 [ 1470.705006][T19359] ? find_held_lock+0x35/0x130 [ 1470.710545][T19359] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1470.716260][T19359] ? lock_downgrade+0x920/0x920 [ 1470.721440][T19359] ? rwlock_bug.part.0+0x90/0x90 [ 1470.727287][T19359] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1470.734323][T19359] alloc_pages_current+0x107/0x210 [ 1470.740316][T19359] __get_free_pages+0xc/0x40 [ 1470.744909][T19359] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1470.750833][T19359] apply_to_page_range+0x445/0x700 [ 1470.756045][T19359] ? memset+0x40/0x40 [ 1470.760034][T19359] kasan_populate_vmalloc+0x68/0x90 [ 1470.765241][T19359] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 1470.772075][T19359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.778348][T19359] pcpu_create_chunk+0x24e/0x7f0 [ 1470.783559][T19359] pcpu_alloc+0x10f3/0x1380 [ 1470.788085][T19359] ? pcpu_alloc_area+0x820/0x820 [ 1470.793403][T19359] ? bpf_map_area_alloc+0x20/0x30 [ 1470.798449][T19359] __alloc_percpu_gfp+0x28/0x30 [ 1470.803316][T19359] htab_map_alloc+0xdb9/0x11c0 [ 1470.808075][T19359] ? htab_map_update_elem+0xca0/0xca0 [ 1470.813441][T19359] __do_sys_bpf+0x478/0x3610 [ 1470.818970][T19359] ? bpf_prog_load+0x1960/0x1960 [ 1470.823921][T19359] ? __kasan_check_write+0x14/0x20 [ 1470.829041][T19359] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1470.834604][T19359] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1470.839911][T19359] ? wait_for_completion+0x440/0x440 [ 1470.845201][T19359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1470.851481][T19359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1470.856955][T19359] ? do_syscall_64+0x26/0x790 [ 1470.861641][T19359] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.867794][T19359] ? do_syscall_64+0x26/0x790 [ 1470.872461][T19359] __x64_sys_bpf+0x73/0xb0 [ 1470.876868][T19359] do_syscall_64+0xfa/0x790 [ 1470.881371][T19359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.887256][T19359] RIP: 0033:0x45a919 [ 1470.891235][T19359] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1470.910836][T19359] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1470.919249][T19359] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1470.927304][T19359] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1470.935268][T19359] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1470.943228][T19359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1470.951189][T19359] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1470.962915][T19359] ================================================================== [ 1470.971453][T19359] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 1470.971478][T19359] Write of size 30848 at addr ffffe8fffee00000 by task syz-executor.0/19359 [ 1470.971490][T19359] [ 1470.990062][T19359] CPU: 1 PID: 19359 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1470.998738][T19359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1471.008805][T19359] Call Trace: [ 1471.012200][T19359] dump_stack+0x197/0x210 [ 1471.016717][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.016741][T19359] print_address_description.constprop.0.cold+0x5/0x30b [ 1471.016756][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.016771][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.016788][T19359] __kasan_report.cold+0x1b/0x41 [ 1471.016804][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.016822][T19359] kasan_report+0x12/0x20 [ 1471.016839][T19359] check_memory_region+0x134/0x1a0 [ 1471.016856][T19359] memset+0x24/0x40 [ 1471.016873][T19359] pcpu_alloc+0x589/0x1380 [ 1471.016901][T19359] ? pcpu_alloc_area+0x820/0x820 [ 1471.016919][T19359] ? bpf_map_area_alloc+0x20/0x30 [ 1471.016944][T19359] __alloc_percpu_gfp+0x28/0x30 [ 1471.025021][T19362] kobject: 'nr0' (00000000c071bca1): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1471.029788][T19359] htab_map_alloc+0xdb9/0x11c0 [ 1471.029822][T19359] ? htab_map_update_elem+0xca0/0xca0 [ 1471.029842][T19359] __do_sys_bpf+0x478/0x3610 [ 1471.029865][T19359] ? bpf_prog_load+0x1960/0x1960 [ 1471.029882][T19359] ? __kasan_check_write+0x14/0x20 [ 1471.029898][T19359] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1471.029918][T19359] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1471.044290][T19362] kobject: 'queues' (000000006bfaa752): kobject_add_internal: parent: 'nr0', set: '' [ 1471.049162][T19359] ? wait_for_completion+0x440/0x440 [ 1471.049191][T19359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1471.049226][T19359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1471.049244][T19359] ? do_syscall_64+0x26/0x790 [ 1471.049262][T19359] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1471.049278][T19359] ? do_syscall_64+0x26/0x790 [ 1471.049300][T19359] __x64_sys_bpf+0x73/0xb0 [ 1471.057850][T19362] kobject: 'queues' (000000006bfaa752): kobject_uevent_env [ 1471.059995][T19359] do_syscall_64+0xfa/0x790 [ 1471.060022][T19359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1471.060035][T19359] RIP: 0033:0x45a919 [ 1471.060053][T19359] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1471.060062][T19359] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1471.060077][T19359] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1471.060086][T19359] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1471.060095][T19359] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1471.060104][T19359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1471.060114][T19359] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1471.060152][T19359] [ 1471.065341][T19362] kobject: 'queues' (000000006bfaa752): kobject_uevent_env: filter function caused the event to drop! [ 1471.068906][T19359] [ 1471.068912][T19359] Memory state around the buggy address: [ 1471.068944][T19359] BUG: unable to handle page fault for address: fffff91fffdbffe0 [ 1471.068952][T19359] #PF: supervisor read access in kernel mode [ 1471.068959][T19359] #PF: error_code(0x0000) - not-present page [ 1471.068964][T19359] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD 9f484067 PTE 0 [ 1471.068989][T19359] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1471.069007][T19359] CPU: 1 PID: 19359 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1471.074272][T19362] kobject: 'rx-0' (00000000dff47e8a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1471.078942][T19359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1471.078962][T19359] RIP: 0010:memcpy_erms+0x6/0x10 [ 1471.078976][T19359] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 1471.078983][T19359] RSP: 0018:ffffc9000ccef990 EFLAGS: 00010082 [ 1471.078994][T19359] RAX: ffffc9000ccef99c RBX: fffff91fffdbffe0 RCX: 0000000000000010 [ 1471.079002][T19359] RDX: 0000000000000010 RSI: fffff91fffdbffe0 RDI: ffffc9000ccef99c [ 1471.079011][T19359] RBP: ffffc9000ccef9f0 R08: ffff8880a0592380 R09: fffff5200199df38 [ 1471.079019][T19359] R10: fffff5200199df37 R11: ffffc9000ccef9be R12: fffff91fffdc0000 [ 1471.079027][T19359] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 1471.079039][T19359] FS: 00007f30aab66700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1471.079047][T19359] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1471.079055][T19359] CR2: fffff91fffdbffe0 CR3: 0000000090a16000 CR4: 00000000001406e0 [ 1471.079066][T19359] DR0: 0000000020000380 DR1: 0000000000000000 DR2: 0000000000000000 [ 1471.079084][T19359] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1471.087359][T19362] kobject: 'rx-0' (00000000dff47e8a): kobject_uevent_env [ 1471.093540][T19359] Call Trace: [ 1471.093560][T19359] ? print_shadow_for_address+0x91/0x117 [ 1471.093573][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.093585][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.093600][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.093614][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.093628][T19359] __kasan_report.cold+0x30/0x41 [ 1471.093643][T19359] ? pcpu_alloc+0x589/0x1380 [ 1471.093662][T19359] kasan_report+0x12/0x20 [ 1471.100127][T19362] kobject: 'rx-0' (00000000dff47e8a): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1471.103800][T19359] check_memory_region+0x134/0x1a0 [ 1471.103813][T19359] memset+0x24/0x40 [ 1471.103828][T19359] pcpu_alloc+0x589/0x1380 [ 1471.103848][T19359] ? pcpu_alloc_area+0x820/0x820 [ 1471.103864][T19359] ? bpf_map_area_alloc+0x20/0x30 [ 1471.103883][T19359] __alloc_percpu_gfp+0x28/0x30 [ 1471.103906][T19359] htab_map_alloc+0xdb9/0x11c0 [ 1471.109586][T19362] kobject: 'tx-0' (000000003ad7c7ee): kobject_add_internal: parent: 'queues', set: 'queues' [ 1471.113440][T19359] ? htab_map_update_elem+0xca0/0xca0 [ 1471.113457][T19359] __do_sys_bpf+0x478/0x3610 [ 1471.113474][T19359] ? bpf_prog_load+0x1960/0x1960 [ 1471.113489][T19359] ? __kasan_check_write+0x14/0x20 [ 1471.113504][T19359] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1471.113519][T19359] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1471.113539][T19359] ? wait_for_completion+0x440/0x440 [ 1471.120830][T19362] kobject: 'tx-0' (000000003ad7c7ee): kobject_uevent_env [ 1471.124452][T19359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1471.124476][T19359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1471.124492][T19359] ? do_syscall_64+0x26/0x790 [ 1471.124509][T19359] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1471.124522][T19359] ? do_syscall_64+0x26/0x790 [ 1471.124540][T19359] __x64_sys_bpf+0x73/0xb0 [ 1471.124556][T19359] do_syscall_64+0xfa/0x790 [ 1471.124576][T19359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1471.124586][T19359] RIP: 0033:0x45a919 [ 1471.124606][T19359] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1471.130920][T19362] kobject: 'tx-0' (000000003ad7c7ee): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1471.139836][T19359] RSP: 002b:00007f30aab65c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1471.139850][T19359] RAX: ffffffffffffffda RBX: 00007f30aab65c90 RCX: 000000000045a919 [ 1471.139856][T19359] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1471.139864][T19359] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1471.139871][T19359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30aab666d4 [ 1471.139879][T19359] R13: 00000000004c0efb R14: 00000000004d4b50 R15: 0000000000000006 [ 1471.139906][T19359] Modules linked in: [ 1471.139916][T19359] CR2: fffff91fffdbffe0 [ 1471.139931][T19359] ---[ end trace 317f7d27a740d9dc ]--- [ 1471.139951][T19359] RIP: 0010:memcpy_erms+0x6/0x10 [ 1471.139965][T19359] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 1471.139981][T19359] RSP: 0018:ffffc9000ccef990 EFLAGS: 00010082 [ 1471.153542][T19362] kobject: 'batman_adv' (000000001f03a72f): kobject_add_internal: parent: 'nr0', set: '' [ 1471.156954][T19359] RAX: ffffc9000ccef99c RBX: fffff91fffdbffe0 RCX: 0000000000000010 [ 1471.156963][T19359] RDX: 0000000000000010 RSI: fffff91fffdbffe0 RDI: ffffc9000ccef99c [ 1471.156970][T19359] RBP: ffffc9000ccef9f0 R08: ffff8880a0592380 R09: fffff5200199df38 [ 1471.156978][T19359] R10: fffff5200199df37 R11: ffffc9000ccef9be R12: fffff91fffdc0000 [ 1471.156986][T19359] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 1471.156998][T19359] FS: 00007f30aab66700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1471.157008][T19359] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1471.157016][T19359] CR2: fffff91fffdbffe0 CR3: 0000000090a16000 CR4: 00000000001406e0 [ 1471.157026][T19359] DR0: 0000000020000380 DR1: 0000000000000000 DR2: 0000000000000000 [ 1471.157034][T19359] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1471.157042][T19359] Kernel panic - not syncing: Fatal exception [ 1471.163491][T19359] Kernel Offset: disabled [ 1471.874172][T19359] Rebooting in 86400 seconds..