x40e3}}, @mark={{0x14, 0x1, 0x24, 0x40}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}], 0xa8}, 0x880) 13:57:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 341.127525][T26184] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 341.172033][T26185] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x348) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000140)) socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x9, 0x40, 0x9, 0x19, 0x0, 0x0, 0x35, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x27, 0x6, @perf_config_ext={0x7, 0x4}, 0x20, 0x3f, 0x4d, 0x8, 0x0, 0x5, 0x54}, r0, 0x3, 0xffffffffffffffff, 0x1) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000180)="f8f9e95bcae69f394508d191dc50a3e3bb8ea471a36cee203aec13a4292b14158d5798ddc236bfa1b6240a167347cc128bff9923365888b28cf0a5c0f4d316cf30be9789ccd507f44ee864a1dfbfdf9be1eb136d0fa4c4ecd7f50943f50ca7ae6d867acbc8831b7f20cfa64d5fca544739dc36661426d083d5f9b5e7ef36f92e776355af137fe17a6d81d7e6d963074d51cd214596413e4178b6ae22435d803d3b49f90008525eb28d074a29611a004f07", 0xb1}, {&(0x7f0000000240)="6c6d6a2e40ff011cee8077620bbef209c2ae7b913138a5c351094d74b544e55fa3780b7f5fe3d8bb343020e78ef2aef6d5ee3da0aae1ce518e40bb2387a342c0c376c8ce183a12b8272437f9b27596400dc3e9398be03c020f9c0ebba9b888a64cbf6ca30aad63f0d69662e91eb01e21f830c4cef1aa45f7eb4df11b54daf9bf253122c31706df477889362cd68cc9bc0a509947ae6215e76a204c8db87b464b8a917c7e52822aa213421f2e5b2d3ea77e8a2e9d6d3f9d3a1763aeab6c7464741708c9641c3103760a46831afb23130b7f42f38b2c750e3e208bb28a2534bda8cc79fa303d1e3edc1059590a14f842fa1fead9065b225309c1fda20e28ee37b12cd5d5f7ca3accfd1ba5320b19adfa9a1a593aaf3359940b2fc9b49363293374ae2d4dcf3818b6224703c221b6d3dd935159cd309224158f12190ad76a5b09cc751613f1417c339ca76189955471bd5b853d53532941dca12ad6b9632fa4006035b91afb9199638d8c20cf3d976b20acd74527eefea0679afe29bb3ff751f8de911737cb6bc81ab2574c7ca727340d74560800b18dd467c7b5903bcaf340557ec52eea9c0ae833ccff10d24487a2d7103229cbc287231407f2b725dbbdff9ee2136caa688981e4c7652c793b03055126aad7a98088274777bdd6580f199446496308f47f7bd1350312365be248bdbd8a7dd36d4918a2bf1d9beff53bf52765529ee3d6b1fc6565481568ab0f94a3b9ff354855f6c671872bc770ec6ce850140fc0ebdc0fa8e840834229f82cf6b8d846f390a8ba5110fe8f864e5113eed71973d4909a45e7414658ec92564621645b121fd4c8a1f88ca694b6a8b1919b6a3a29c9ef6b93522a5ecb22a138c52222adc20eb14b4b34375db496d99485817dcac425e3c486d2d65b9ccb1f114932a647cecdcfb8e2ad3a19a9f31270044b6af4d0ea1fd618eca08c8eebec89ed4089816241af68757d46eb43690ecc7bfd104923d09ecdd56fea13ea9d54a0438cdb209712d83a9b13cf78d0155747ce16fdc47658cc9ac186676ec000f4022e9be351519afc50a2e291b8a0235ec4145e8f08481cfa52c0cc4344d360bb1e506834cee3ddcd8043f19aa07dacc3141884f818d108ffac7227cae891714b8be88ffb5b9352b4760985b727610ff4b31d60b461a5c0eec0e5d88fec0ee9df59650c31d1385dae97f6673b4a07558ea17f34581688e8f5cc93dbc489c239e9b4cb3f96045483039e9fede7368e94d6359bee55965cf05b808463ea59a4b858fb4b585e101c1df21457aae7666db5d5f67ca43b73bde4e1c0fa5fe0d6c10b7ca7c47608c5790e3e72ff59c842b764a550b99240eab71c5caafa0fe0d47763384b63e61ebc2168f78dcc75d78512145893989484bab2af4aa4a6632d81d01c91fe6e0224721b7e587e2896ee2f23503bbef66ff161178084995a8a165eb8b1f6a34bb735a03a72e7bcdae3e04b368a8596db500716e24f87360ac5d66105a926ff181dd51fc3a9b27f35996f41a567ca5aa57dd645be9c4634f2dabbba39976ad7fcdb1e3fdf782d38d98798ad87fddf1b4e8d7184701b3460935bcd836070019e3522ee584bd03deb930562f0513326559c1b53a6c53f601347882e6b78b78d022c54c79b8aec9816d194627adff30a6ce92271d2e5adb838fc98f14052000b1c17e0004d9291ad82b98605758c69bc0e432fb0328f6979d2c42ab89464599c6a72db3f02f96868a8de316d956a51f8bdcde0b1e2e1042d7d5fa2d173503125a2c53edb528781672c51e07dd674e38c964ad8f6f55d3a55706bc8227c1a10d929ff80f153a3c6e8fa17a17559c7c77d71a05b005971d93fbd2cc5f7cbe98b2bc922b6719e29ba8a2349da3ea6765df0f41616e24c77904474069d082f41996af9f688ce28dfbbede81684925bde985c7e358ce4675bd9cbed041dcc6b0d421b2f83835b55613d9c78512dfb4a30248519222e3ac0614a7db0135dedf4619cbe0ee59876e7f879b66998feaf8f7b6d6bab63e0b66c5b79ad7eee61817063bf4d70781bf4aa2f9444ae9f37e3f996e1a18a5070f68936875e405e7e0fc8af761d874dd93404b5920819bfac6046283b8e3859c7729bf255e9ec0bc98a124ec34c43162cf1ce00d418852846083e282628a14601b198376942618b31b63fe1f18b510c539e70039bac55ca340ad9e1c06093bb3f6aa870ff71e20af775edbd0012e058be1822c268660b32034a09df421fc35da771244d735e3187765b0ec3085c5ff63a88fdcbd00e6d0af4cc2c7f7c586068e7e9e6a9645548732ce34b0dd43ba7356b2c1fd94296a5d1e56902f693d9f6808a9a3da5e973a73d278f01f456249d37f84dfd6913c9b24a829e925b2cf7638bbcdd35833eada94353b9e827e5446786822095e589b18705870e086e43da9bfdeaa064c664f4d8096cba44699780d7ad3ec9425a7473f146c16e60fbd5cbbaa2a17ff94415a550a1ed17d9fdb63eba8d2163fd888b6bbb806e436a065830366688fed77bb80c141e19875b3f34424082474f442ae4ecfce891a643a99e00ce81bc862eda7c6d718082c86f337d2bd26efb426311d8a75014778de03eb6bde0c00aa1fa26f0e6c6ae03779a3b04e4e40239f9f8a6b59fb011054dd0f1509ea638ed2fe53720417a352c71e73d59a657e1593b8dad925f6ce9e986aa128a46dc0336c59df819ffc36ac8b0528e225cfcadf229c3f8300dbd817bce065ee54a3ab31945c58dae87d04f52b1e02cc525eeec5ae5bcf07127c42dd6af978083647af36ae97b6fb177b5a5d1f31c4b8a735e1f583f01a262dc460605b7ea69efb1a205e8ff2a8cd724864e33b5d0fdb9e3b05219887773fb7f3d4e507d93466861a19b438dbf7635095a1d02dfa72a53c8a8515a322e6bc066ac4c02121d3de1bf92b179d085cb88254a7af75a55b9c7254ea8b5c13bc0e3962c1ee0c9f1aac1b6849ae19635b8fbc4b3199f8adba38af9d40cb2d8a1ce3f750e0cb7429fc064a62be6b3d23162e8162be1c8452fc27da1abfad75e3280e4760caf400652a79dec61974c02ac8c1e7569645fd743ab256b9f9b1b5887065f2532c6b5d28f94ade5baa31e16763657619433dd8a910fba4441753c1710969c1b92c41c7f315d84268dd5d5408e2146b99bf11022bc6cbc2a9ae62089c3bd0556499b0ed4e9af2481f3e9b996e5eb16091a6e9507ac418d8ce89b53e6693d56896e09edc511fdf41d6e6c2f4e0cb621a4c2910739a4788ad0e724bbd8734927bc0fe12c0a4dea05efc693f2bff8926098701907467cb4bdb86cd17abb2af93f796b0ce958552b8481c8ef27af06516633371a35b9c6a7e87c43a5fddf1ec124b745215d099034d3c0605c0a895359db549428931382d303a4287235f7fc154ee4ffbd880beecdc24b2268800539afee56f68f77b039d0d2705b5cdaaf1484346e89e1f13f15f969052ca93c167f77ec25d4363d4f0e947892e7f39d17bc2bd607729a81ad7ce1ae617d2fa4214f31d71751bf3503bc8b03db07e71163ee2080b3a38577bb3447b3982ed1abbe82dcbdc9c1114b60630b0c212fe6127d8f15f8d38a953c9c65918bc84002e0197417c526d9c1bacdf2d722e209c951ec3f7ddde5d199409fba27dd05c3510e364724c0dd61e1d44856d85d640e1ed3f3615b6fa69e75d0f1b06b6660be55d0a448021ec6c89ec1ba550f0e35d4e1789f2201d0a4818897c8002f088a178733bd5554cb7ed447000534e3fd7c12ba8f39f413c087a0963ab15063939555a243bbc3853b985ff717dec5b6f310f4d829bcc61c451b74d758695afb86570b3df30f681049e788286bcce3a0f33d11de82dee4bfedfb328b79dd10723aa4789bc5ce79a54202e93adfb06ff983595b558dd6a233a7e4c692c587ab5a78657353eabdef0c95ea17035cbb6659b252334a2a33c4e101ef9076e4dbf510f1c6c44dfd89b3e7768d076720cdab20d6cd3d7c19f1af113258ebf540ec2a76feb0b8df0ae00e853778d7e2bbfd0c765278ebe4dbd1f44d7a097870b6bef87b59514dc8b5b8df77658914347c7c333df84ffb113b39e29f8c8dcfb664d3b74a2c7da2032f845543a5933589c13b418afff0aed25fa6067d11da5f00524ef03ad3c310047987cb55ac30a0a7ddb7660d1cff67d05d6eb503ffa6a5494f6d094a38bb001b87300d2c4f7d35aa911e114277cafd091c12d18dc78f09e632fc01b66154991c67d638bf138123c69efbb113166317ae93c2e4c78a42bf7146ce7d3145a5c1db5ac78690899e733e42ff587ecad3c24d03ff42237b1ecc084272b5cf5edefc7060aaabb107d625cdc6f26f6ea2d9b96165bab58aeee92788159caf598253fce29e68238728831720f9fd782d520598ca42f8008e38dbfd4f9df044bf0e804a97a25daeb1163c1bc4d019c9049c88385f4545ced74bf01e51d0e20dbe063951dc2ab051a8c6654f8a8356aada2d3546f3f06e023329772d76297b631f90c342bc09a7cac75b73bc3449a8264e9ee2e2e3f8dbe33afb4ba671998d22cc6ddb553874a671d3c9c8456703a57c187f0c9c78bba931ded0d005cd72914e19cc8f5130c672669c0b9cd70aeb66e0fe33730e28565ce9f846b4185e77ee5f44a96c055b6957481f60ea39d7500b847042397eeb9721e3cbabfd75cba79cfbded6d611b55d6c0f8b0b034738d52612a90d70bd7f4e456998ad39619fabd765aa121a757f2fdf5ff88dd8240738859532b2dda88ab8409ccb6bef16dda8a457f093c55982873204967950de590a0449f61242cb75ca673fb0a1a6b2009fc629bbca60d635e9f92c456452583e1e7c03e38c43b56bcddac18300b15b8f76aecda88ae61550d3fef439ab0059e97335f2b5987ba71d8efdf545d0d3e373f24124809febaa979cd75348c3108023edcccb1a1b68ed91725745fd61987eaa3abbf0a895210fccfc11ecd772065ac709b41c4d0a7b61b1d7ccef77766b9d2958dba0b3c1437888b021b19628e75cf515ddfc7c44113c63ca1e5a47c6053389445956bc2c4355051ba54d3249e1a706eab8df72a8d3df2dc72ef9d71a14e97934d7dd73fda78d255586047d1ad1ff009b5ceb7b0e29c8084213a7ea3a4c4a6ad5b6b6dbd874b903513fd02569de2d58dc002322c455135d82c95580b5455921ccc0d4a8d50fb22b1f75194686c77479f20e34cc9484c13cef9e841b2e8cda6ddbced58537892553d3f061ea0717d2558cefdb1fae22b05748d48d2d14a94ff7d9b8f40036e2124a7b3caf0b81ec98b48cbb46c009d84bf0dc6aae9e38e2615005fb8bd1536d451741c3ff0b63b0220101e5951ddedc15003bfe44154f9f7d83436cd4ac104c386b58a2934aea339fe6d27f293f96a3277063935cade2cf58f58338aa69579949b1093bf223100b6c362ec071d5c8c8bb10ae4d841e034eae1a9738d2ac02fa04a5a02eca0574f21fd5df15d510e70cd0e3813f7f4b31323077effaa195e81384325f8a3307d473249a765a26f914565f5124350b7b23deaad5f4d8dff9f8d60a70c992556184fc7d2f47de6ae119928e0170880ec780e766205058b946e60904f11b4f9611f3539312f271008863e014de9370bbcdd91df47bfae4df6fe508a537894d6a067df3035afb23ae07430157ddb1baec50b234ec377ab6771120df0d34ea09b013f0902180cd09df181509d812f2024700bdbe4099b0ce8e1f03f32de9fe2f38ef16a989f0b935226c28b76ac6694de7641ecda69128f6ffc92a403bc348b6db20", 0x1000}, {&(0x7f0000001240)="46c24e53c5d2442abc084f3854bb8eb5a7f11e6907f7d895b8219b24f6255d16b8cfb386dc2763abdc728fa54170111c77b080c896545f94800533d5a8328d284554eb77e5a624774e50b9d2f90d07fc68f3cc17523c6a5b7bf67267545ccae5958ed34a88ccd703d29ec36a70766e75b10624526888a6b7e388750529987fe8017d3cd4c770af124605c239d05e3dbd69c8a94cd9fd1ce4661e649525ac0776d17b1d06a4c4f8652801dfcd1f4bd714cf1bcfcb8416f62c7752cb00721727aedf45ae820b96e21bfdd36e24df9fcafdfc4ea28e17a13b5dac0353ed4e188f14cd888cee3d42b34b76bd8c5d4d9865a062a8", 0xf2}, {&(0x7f0000001340)="4f3b01e50318596951b681334d6fb708a17631172ef75514021fb3f8414e20a733175c6c7f085b9b04de90b68c863c48e30cd9d0b765b17496a2e15924a45f962960cf047e06da90750ff8eef6d9bf5f3a7bd0f81461e1b7", 0x58}, {&(0x7f00000013c0)="ac7eff55ce7ff0d6818a43dde2047a3e2b2964a2e01bf87b09c87b916aa30be57cce60804d82d17da40169c8de62954355c7db353974588a392207c1375cc9f7d7fc1ed1bcdaf5e172d138ca0e4482d734c4efa3612f5c6d099b29e0b90356dc6aa95b16fe7acf682fba5640511bc8065cae85b0e417a4f79dff6192815a7d47ff37fe", 0x83}, {&(0x7f0000001480)="9ad4374c697f173233ddf06e4f2bf1f7b51af11cbf", 0x15}], 0x6, 0x0, 0x0, 0xe00}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 13:57:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x348) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000140)) socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 0: sendmsg$sock(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)=@nl=@kern={0x10, 0x0, 0x0, 0x200080}, 0x80, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@mark={{0x0, 0x1, 0x24, 0x2}}, @txtime={{0x2a, 0x1, 0x3d, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x0, 0x1, 0x3d, 0x8001}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff8}}], 0x78}, 0x10) r0 = socket$kcm(0x2b, 0x1, 0x0) unlink(&(0x7f0000000240)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000380)="7358e8f38787b3645d3cee2cbd823c49c4a060c250782a51abcebcafe04fef919cff4461d08d6e10040484bfcc6113931b78f83f70162ce72c5e9b770171aeb786db4fa69280670356610859aa12e8598feb670780322bf60e371f48e96d04cd96efac056a01edf14eb0277f48308c4b18428368b7d3ce7509863652556d1430a2bc5ed84794a0df0d6c21486965bacbbf4166b55322a370bb03284c03e641e8b63a62911508ab87d33de6f4f81b7be20cc8a15afa9ab212c4957f612c2460963d1c58857be5b761356be823", 0xcc}, {&(0x7f0000000180)="e142b6878e33daca42f4e363a6b8b119601c35f37066241ecc1121bdfe7a4b54329fd6e6b18f3bf9e8095cf0ddee928f3f4e8130bd8bffd5edc323822eb27dc369c7469dd1de5c4adcf6387d8aec5a0794fe3dfa08db04171abab76cfa9ddc39b31274e7f30cecae4d1b49a9a9604d6334f95129046abe85f2ef44b9e0ef41f7c95ec618609c6a80", 0x88}, {&(0x7f0000000100)="7e28ec45a02f6a173afa2eb884916107953bea0b53fa70808e214484b0", 0x1d}], 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="2000000000000000710000000180040089e43a8d51c435da0b1e950f09660000"], 0x20}, 0x4) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000540), 0x1, 0x0, 0xffffffffffffffa8, 0xe00}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={r2, 0x13, 0x1, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) sendmsg$kcm(r1, &(0x7f0000002b40)={&(0x7f0000000540)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000002980)=[{&(0x7f00000005c0)="b917d187a584292feba08b75f30bc65a4bca4f70f36d01c237bd9861e20811ec28f2f00d6a2147b99fe750cede94474a3caa288e64cfcada8a73590a2f601eb6758ad99cf0f9b4e25faeb394b5e2f7ae96f2632147d6087fc544417dcfefa819f962213d3e83ebe2088ff1e790ee591ddfedf47725fb706e73c68e3964813b3ddd145dc452c007453f6e5896c4535d474a9b908ff63169ed61c66ca2cfdd7aee002e6028c7f837f53077fdbe6e2600ba5935cbe14bbf2bdbdf28d4ac88f231f8a6db63ade954b0e8d6cba36d0b603d311a1cf92093289960e9a8447bf915a248df04db2b6967bffc0bf1", 0xea}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="ca3fa49845f95ca93640eb99197e4d1bd747106508ad2e903c7ef94f998ba09bc1482b653e0ed0e0"}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000002700)="1f97fce42b88004ba9752bf2b6c15d5f9713cd4c78087b19b8cc25c08637ce6bb7c069cb09742009e32caca6a2b411b7efcff134de2bd68aae3c690d2dbc36b049ae26f1d5d1550c919ef0e636891e82213e01065310a5d2785ce1319b81e94eb39ee0b166618c487571e75046e6b672803f8969383e65f654d7ef274bc97fa66ab78910edd613b1ff0033c73a567f5bba670bf782f51bc58f3879fa9b598ed713ab6b5b740b968a6ecb61ec21365cb797e9a5ed33dc4b7b474c2f0943b79102af54912620a4056221a56594470d509155fbf00b9a7e27d0d5a2df50", 0x3f7}, {&(0x7f0000002800)="e528c8147475f7d71ac4fb8082782250e3eaad4835319a48b7e3b55655e01f9b306372b02b8162b8c6a9096eae15ee2456f14ded9af36e47f164b4fc24faa662bce90cc1435c28e06f11", 0x4a}, {&(0x7f0000002a40)="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", 0xf9}], 0x7}, 0x12) 13:57:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x348) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000140)) socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:57:46 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x800) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x348) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000140)) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 342.211913][T26256] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x348) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:57:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x7}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\xfc', 0x248800) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2b, 0x1, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10a) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0)=r2, 0x4) r3 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x4, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000080)=0x4) 13:57:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) [ 342.527143][T26285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:46 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:57:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 13:57:46 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) 13:57:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 342.900268][T26308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 13:57:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 13:57:47 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000006c0)=[{&(0x7f0000000040)="a2974e97be1e2963e599be4684f01a8667ff281cb8a670285a705702935e93690f9cfd0d03e7f1c1c4f1144398b1798816869cce2e0915417e1c2a2041e57c8f750a2421c896e67580213937560cfcbb252653e1f3c18029dbdc2396cfd9ab0c699c5fb398d583be96"}, {&(0x7f0000000100)="57bf69309492dc9483e75a415cfec4fd00bcce0a"}, {&(0x7f0000000180)="7491492525dd5ce5199b04bdcce3e48ab8886bbfd34817a48dc360c22c733aa691308068040ef7a936a9b738cfb3376f9fc4c46beb4e3d835337ee2670ce00ef65bda5ca807df1c9c9397c50899d9926157a548abcd6d51e04b4f23348ccc819518a33ca617f8b9d064295b69268ce1959a0b28f0f39b9a8d78a54a2f91ab7747f36596fc814e459cd78ce4069da56101bbb5c3e66c16db41d761b095480f3d205367355ecadefdaa15d3e705ef858efc8c6c6093df1119b55837e9e97448c7fb98e0983c5ba42fe2d34e90c675ea4dcc447a4bba18780d25ee98bc9321eabee1c00e4aab1500b4213973dea06646e95afb471b211"}, {&(0x7f0000000280)="8ed38014e8ef7226cd20649d3b7a586ca6fea5337ffda5d2b9f2de9f636fca34a7325b84b9d14ff52153044f335667f9fa8d4d4151f468dc2587d5830898c07ae9b5b2caaa220b90f63ad8b6d93a4b00140bde787cd9c4cb668cba95f8b858029a16aa2e93f4f693fff80354e8cb29c95cc6a02f98c09f48f1c53c292d3dff3b393456514573f8d72af920d28f125a30a1618ac73ec697d8d6766c196297a4df721feb468535bc7f0c442d493854ef0d477f225c6d221b4dc6a3bcfa87a733763b6dd48bc6025f5ecf7890c5229965e88736e685"}, {&(0x7f0000000380)="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", 0x27}, {&(0x7f0000000480)="941cb8fe8207a0ffdc423c73dbd8dfa0d9f77ae504be216f569578899b40042d050fc8f7f720d7c90eef643d7258589223044cff1b175dbaf4fb496b14e289a051922a425fa0e324889de733ebdde34db7ee45cf5e5afb605e57d2ad9797e2944d67e50e3f0b7ada9f5706ec177d613556cf4032cd8d847d36528d9506bd3ebe1a8303d0e6ad1c10852b86a852bd07d3d163ccc1797bd1956b44a448a70459e5101f882b3a4e154f3d8945a5f9238c48626da00220baec2d04fa6a44dafedac10caf8cb94ef536d9f89ecfeb98bc1648100dd9d374a53e466dcdaab9460803d35a0a1c89511139a5f056fb83c31e0469dab25bca"}, {&(0x7f0000000580)="b549d7d0ba636a4b2bc77f2d3213229a5b7a4e7e6e0f236adbec6c47b21f5597b3590ce39dfda217a637b2cef0521e20b91335079874e1c639e9851c0d2541582cb81c37e35fcec67bae70caf0bc159e04ed6a36b740a0a88cffb062a2d324c37c8971251e1971ff664967999429b9cb370b6e23d248e946e2418903c87f47acb62066ae55f029ae927c1f7603a4d992a6254427fec0aeb6e11f961c9a761a251ea23498c5f55be8765e12b8a2f71f96293ae4f230c3dc"}, {&(0x7f0000000640)="d7bad8048d6e9a"}, {&(0x7f0000000680)="f9d410ce6d6d945683d64de5fba702c23d7c34aa"}], 0x1, 0x0, 0x0, 0xe00}, 0xa040010) 13:57:47 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 343.158458][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 13:57:47 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 13:57:47 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x6, 0x3e}, 0xc) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={0x0, r2, 0x16}, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$kcm(r4, &(0x7f0000001c80)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x3, @multicast2}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000440)="75909978d80599d3ae91adf85e448cb5b150a3fc1eea30be8e642bf4e268f4cb80b858fba3932b298403ee709bf322719f5e62bb9bbae849998b4f16f4dfc02615fc88d0c8f3a07bdefa0eaadd648c3da0373a4eaaa78fd58033a620d6fc7eb5fff7701c39afbb1f62f584536105b350cd4f0dbefd15d996987cb48385cd91e9c2fc0d71fa81740cd580d24877f3f23e95e980eb8d71eb41cc3282a955ec79edaea490d99b751111d4cd6bc5a87fd5fdf498260dab144748d638186d5de798fc231a3d7eba819c65cc4a7674738437ef62078de20b", 0xd5}, {&(0x7f0000000540)="89b1d9dff5323492844b940de961ba6f6a094163d38a2d44c8bb1b6e8cd4990b5386f6941ef16e8dd89b1bba03f23be836d3fd0dbba5fc361745d3db2ab0494c4d53c069909a75edd8cac6f5543fbda2f3c9e2cc3539b825d1a627a097c7bc01b4428dba2a70e029f050ddc4866b520b1994554ee8d0d321c206d802e755d255f3186f09444197e3e521528e39fbb0ebcfebb0fc884f3bdd9413de7a95fca324ac3ab7608f59efbd654887dfcb0e0ce95faccbc0259b1ce5a9abd71d6c50af44aa11ead21195e4c19f80f7b3889f176d06f964225f7b9a507154d6945202767c0834015239d6d294890ee0b00ac7e6b4bf884f", 0xf3}, {&(0x7f0000000640)="59aeb26aec7c79b3fae5f7fec28af66b455fb15c3debbc234198b7f8a7d0b314178ea06c533205879a42f91d11e4576420a86bb4ccec4a876b78c90e4e0677165110fe9854ce79eee378aa1327e2ce2ca86991df28a29886717db260c4c7cc23d0cb90c9c2cca9efda86604ca15302955e11e090d4db1141b74a1a766f5ea0592dd741efad4e8e0b7c0f0fa897019115a549b25b7fb108812880e7a111cd4dd1f74833881e71786ab9", 0xa9}, {&(0x7f0000000700)="df93647d1bbc95ed0e810ec12628289baa5354b2cb8f1bc8042299b358a575aec3bf9fe6c231e1317ba0100ccc8e3fb9bcc7369dd385f8d9cea15b177497a0ad1a3b1edd309a48e17110430d21d9718c876358ec27a0e496cddec5e35d7f30740bd4bbf2931baac0dbe7feedbfd066ca473a7ee9aadb493148ca5ca8650dca39a1fdbd2c01c6323146efa816986f0f64e2ba642d62154192c2780091d042b1e27baced1012742a3c170e4f1653afc221889b67051c0a711ec133df337afb2e8b40baf900b5541725d6ac2d635e4490a1b075de2fd927ccfcfe60b0aa4d0bd1110a8e500ee705725da9b041c9f4b2e20db552a68e4cbd8e8536a961", 0xfb}, {&(0x7f0000000800)="d3a80aa268c3bfcf13fa7e73b0360cac0832c815cc1da2ec62bc8da649cac3db6bb656d5c334dcbce0f88d8a8decbe7139cafdab8f72088438ba3363f6e362c0a7aec20109ce80b8a74b68089c0c02448350a9a28a5abbc5ad265c070ce731ce1328ed17bd47aa8de86b7598ecd2cdbc2bfc353170", 0x75}, {&(0x7f0000000880)="c682dd4738ae3269e1519c58cf62aa4a5b40e5d06a73156c072f5c0178577c731a08c598f11f93a1a311b61c9037c2eb232142cc3fe7468fcb00d0dd", 0x3c}, {&(0x7f00000008c0)="c4df17b890c14afc4bae84ac7e06ad65cd67ae097d5721cb31f3d65cf3ce118e56c16b58db33c8a55762a18608d9ffd745dc99e849e81c2317191f1782a4a11ee69ec62b239f24429fc609ef837e4ff8dd9cb728cf2fd3cf7fd6986fd6c5388e4f98d6c628628bbd6df9a986caaa2b2f837d37989ee70115dd51da14f62ff00c1eab8d471b950afbce19d1cb8fc135bbbadfb76b3ce41e634961b87b0fd20017b441c5bce072564b524063e30e1fa51650b2bca86ac833105a6abd7b42c989", 0xbf}, {&(0x7f0000000980)="ec8e0f4c4477426beebbd4173309b96e4223ed54043c71229d18d3f6a2e8a3242ae240e7de0bb519226a7bdfa9f1c5558b1809a613f8042e2b740e09b7d7a682f1ff08b09d667704d6d58cd0e9626a85bafeb77d81", 0x55}], 0x8, &(0x7f0000000a80)=[{0x1010, 0x10d, 0x8, "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"}, {0xa8, 0x119, 0x4, "a22eac39a18f0cc7b46f40d26ee6efc09e1405edd436b336f3c7b7d50bec12b3a33fa511aa40340d85ef68f09dfa0e80db9a3ad0658236f4b13abc00e84e8f72ca525884a7441767bc2cae9f109dc258d92bef14d5c9e9bf79588ad2b2218b628fd9943fe39141e6fb99c0f2cba9b41a89498a7155b11b0a551c14feedab77fceb3dbf265221340651c97f8c5247752c066063f455370d"}, {0x50, 0x10f, 0xffff, "a5f0e284cc2c45f1f12a1b0eba0e815a3c619f7d7a9d6f334a9d748d7d36326ca511ce802e8254b76e2533ff1c000d4d48a3ca6189ca5b258bd569ca"}, {0xf0, 0x105, 0x7, "98461d47d4f8686b32dfb858914eaf34df6494ad26ed3dfa52696decccfee5d80328f6cab75e99ba419aa0a9274ab8fc4f1f3d7f5d210a77073b9d458b40db03a6007c2ec2c1ad074bbc59ff79b43e4696fbc37141b83a921bd1c46711df41b4705dac300d550df439d10afe23079a17e363b0de6c437b204f05fe146b7bc28ae1052b279dafc0b803c65c77589f85d06108b373806b7178534867634cfba780e83c348785070f8b674bbc14c5aa20620530c1cf574480863fb96c39c8e55ef19d1e90e2363b2679ec4c6891bbd732b5567ed1e84fcbe99f7a8a5b31"}], 0x11f8}, 0x1) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2d, 'pids'}, {0x4c, 'rdma'}, {0x15, 'cpu'}, {0x2d, 'io'}, {0x2d, 'rdma'}]}, 0x1b) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r1, &(0x7f0000008700)={&(0x7f0000006f00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000008580)=[{&(0x7f0000006f80)=""/166, 0xa6}, {&(0x7f0000007040)=""/215, 0xd7}, {&(0x7f0000007140)=""/100, 0x64}, {&(0x7f00000071c0)=""/4096, 0x1000}, {&(0x7f00000081c0)=""/250, 0xfa}, {&(0x7f00000082c0)=""/250, 0xfa}, {&(0x7f00000083c0)=""/137, 0x89}, {&(0x7f0000008480)=""/45, 0x2d}, {&(0x7f00000084c0)=""/109, 0x6d}, {&(0x7f0000008540)}], 0xa, &(0x7f0000008640)=""/141, 0x8d}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f00000087c0)={0x5, 0x2a, &(0x7f0000001cc0)=ANY=[@ANYBLOB="18210000284ecb5940d5c12820cdee58f34a7a5bbf1a6db4146903b3de1211a928a900aff334889ede00d0697fe859454c6c7f2aecf3a74c9ff84621bdf1ae34c7b4b73437f3900fdc18efe460b7442a3d15ce253df4b1ef2ab0738393688e7868bcdcb8e1cc9dcefef9083c802aa6b0c2db4c485c683f9b29a883b4f971777b721994b6e37e118d585969a36b22d9d1eae1a75560594e666a", @ANYBLOB="2362e06d1c799b1b39f6aa998cfe15856571761ddc5c197f5a32349cb202e9b3157fd1cba241343a15b2e64be56df697fed55d505a7a6e4ca87c2d126eedb45f60558fe1fc0735138d0e545d7e186746430487c072f27b7af1308988daea316cdd82565a0072e2d2023b7f8eddc200d2c99bf1074b2936e98c455fe48ac51234ed22a5f83ca07372990bebbb0957b6d196ce2ce28f253dda34c8a26e8941b61017395052005d15", @ANYBLOB="00000000080000001d6bf8ff01000000"], &(0x7f00000001c0)='GPL\x00', 0x3, 0xa0, &(0x7f0000000200)=""/160, 0x40f00, 0x1, [], r5, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008740)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000008780)={0x5, 0x4, 0x200, 0x5}, 0x10}, 0x78) 13:57:47 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:47 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 13:57:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 13:57:48 executing program 5: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 13:57:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 5: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) [ 344.603865][T26413] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 5: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d004000000000000006e5666af5b6f2e132794d490e3e25c234bd4533fb8136b6e33c2a33258b685673d591072317af6f5abc48599b5fff852a7fbbe8d3b5550ce43dbb0b6986bf11475d70ced9501f808c23035aa4d510d38bbe002c68fffae8b2690c780ce", 0x277}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:48 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) [ 344.962876][T26440] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 13:57:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 13:57:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) [ 345.301172][T26462] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 13:57:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 0: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d0", 0x65}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 346.455018][T26538] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 0: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) [ 346.598994][T26547] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 346.742446][T26556] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:50 executing program 0: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 346.991134][T26572] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:51 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 347.314473][T26591] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e28", 0x33}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:51 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 347.686764][T26619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 347.719357][T26621] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:51 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 13:57:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='.', 0x1}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e00200000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 348.015145][T26643] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:52 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 13:57:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='.', 0x1}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e00200000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='.', 0x1}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) [ 348.397605][T26666] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ff", 0x1a}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e00200000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:52 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ff", 0x1a}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e285ce3dca336bb56406aa1e4ab31f9da99a7f086b99434a49ff18eff2815bbf1860c8af126654abf8e1063a6ab745d72a592d0", 0x65}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 0: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ff", 0x1a}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 349.219339][T26719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 0: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x40, 0x3f, 0x7, 0x81, 0x0, 0x2000000, 0x41506, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xec3f, 0x2, @perf_config_ext={0x6, 0xfffffffffffeffff}, 0x44ae533c7863040d, 0x5, 0x1, 0x6, 0x4, 0x7fff, 0xa202}, r2, 0xc, 0xffffffffffffffff, 0x2) 13:57:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac4", 0x27}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 0: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac4", 0x27}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='memory.events\x00J\xd0\x8e\xa62\x02\x19\xda\xda\xeab\x02\xde\x9b\n\x80u\xb7\xa4|\xa9\xdd\xf4\x82\x96\xdf*\xd1\xc93S\xdc\xe5\xcc&\xaa\xd5\xd0\xae\x97\\=2\xfe\xc4\xefh?y\xc5C:\xc0\x8a\xaar\x9d\xc1\xe0\xc3#\x00\x84\x8c\x8bJ\x8d\x1c\x85&\xc5X\xad\n\xe2YS\x8b\xc9\xb2\x12\xd1\x06\x1d\xcef\xb8DI\x97\x03\x00\n\x177\xe3\x10\x18\x88\x19\xc5z)\x9e\x15\xfbZ\\\xc6w\xca8\xe4\x03\xb8c\xb0d\n\xc0\x84\xedo*v\xaeQ\x1a\xd5\xe1\xf7\x06\xf4+\xf9\x1e\xe0\xab\xbf\xcfI\xad\x12\xc7\xb5\x92\xa5i\x99\x84\xfcU\xff\x99\x14l0\x84\x8a\x16\v\x9a\xa2\xa3\x13.x2\xf1\xd8\x16\t\xc5<\x00\x00\x00v \xce1\xdc/\xe0\xd9\xbbf\xed\x9cy\x8d\x7f\n\x12g\x04W\x10#G\x8dMC\xb4\x83\xf0\x19/\xb9\xad\f\xf80m\xa6\xe4\xdf8\x06\xdfO\xed\xd6\xa2Z^j\x86uQ\\\x0f\r\xa3\xf2\xfa', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\xfc', 0x248800) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) close(r2) 13:57:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 349.823689][T26760] __nla_validate_parse: 4 callbacks suppressed [ 349.823698][T26760] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac4", 0x27}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b307e28", 0x33}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\xfc', 0x248800) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\xfc', 0x248800) r6 = openat$cgroup_ro(r5, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f00000001c0)=r6) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000001) r7 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x9) [ 350.105872][T26781] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 350.180185][T26786] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='.', 0x1}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 350.357520][T26798] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x800) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x953904263a019ea5, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x8eb, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000040), 0x1}, 0x8222, 0x5, 0xad9, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 13:57:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='.', 0x1}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) socketpair(0x3, 0x6, 0x3, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r1) 13:57:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 350.703971][T26825] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:57:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='.', 0x1}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b", 0x30}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ff", 0x1a}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 350.977367][T26846] FAULT_INJECTION: forcing a failure. [ 350.977367][T26846] name failslab, interval 1, probability 0, space 0, times 0 13:57:55 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x741) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0xf2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) [ 351.097232][T26846] CPU: 0 PID: 26846 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 351.106320][T26846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.116559][T26846] Call Trace: [ 351.120014][T26846] dump_stack+0x197/0x210 [ 351.124544][T26846] should_fail.cold+0xa/0x15 [ 351.129231][T26846] ? release_sock+0x156/0x1c0 [ 351.133939][T26846] ? fault_create_debugfs_attr+0x180/0x180 [ 351.139827][T26846] ? ___might_sleep+0x163/0x2c0 [ 351.144890][T26846] __should_failslab+0x121/0x190 [ 351.150168][T26846] should_failslab+0x9/0x14 [ 351.154783][T26846] kmem_cache_alloc_node+0x268/0x740 [ 351.160100][T26846] __alloc_skb+0xd5/0x5e0 [ 351.164443][T26846] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 351.170293][T26846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.176748][T26846] ? netlink_autobind.isra.0+0x223/0x300 [ 351.182404][T26846] netlink_sendmsg+0xa1b/0xea0 [ 351.187187][T26846] ? netlink_unicast+0x7d0/0x7d0 [ 351.192350][T26846] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 351.197904][T26846] ? apparmor_socket_sendmsg+0x2a/0x30 [ 351.203450][T26846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.209882][T26846] ? security_socket_sendmsg+0x8d/0xc0 [ 351.215354][T26846] ? netlink_unicast+0x7d0/0x7d0 [ 351.220289][T26846] sock_sendmsg+0xd7/0x130 [ 351.224702][T26846] ____sys_sendmsg+0x753/0x880 [ 351.229462][T26846] ? kernel_sendmsg+0x50/0x50 [ 351.234165][T26846] ? __fget+0x35d/0x550 [ 351.238365][T26846] ? find_held_lock+0x35/0x130 [ 351.243132][T26846] ___sys_sendmsg+0x100/0x170 [ 351.247807][T26846] ? sendmsg_copy_msghdr+0x70/0x70 [ 351.252928][T26846] ? __kasan_check_read+0x11/0x20 [ 351.257970][T26846] ? __fget+0x37f/0x550 [ 351.262261][T26846] ? ksys_dup3+0x3e0/0x3e0 [ 351.266785][T26846] ? __fget_light+0x1a9/0x230 [ 351.271479][T26846] ? __fdget+0x1b/0x20 [ 351.276000][T26846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 351.282510][T26846] __sys_sendmsg+0x105/0x1d0 [ 351.287108][T26846] ? __sys_sendmsg_sock+0xc0/0xc0 [ 351.292267][T26846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 351.297802][T26846] ? do_syscall_64+0x26/0x790 [ 351.302534][T26846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.308617][T26846] ? do_syscall_64+0x26/0x790 [ 351.313366][T26846] __x64_sys_sendmsg+0x78/0xb0 [ 351.318136][T26846] do_syscall_64+0xfa/0x790 [ 351.322637][T26846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.328533][T26846] RIP: 0033:0x45a909 [ 351.332450][T26846] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.352808][T26846] RSP: 002b:00007ff6b274dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 351.361404][T26846] RAX: ffffffffffffffda RBX: 00007ff6b274dc90 RCX: 000000000045a909 [ 351.369521][T26846] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 351.377500][T26846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 351.385691][T26846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6b274e6d4 13:57:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 351.393745][T26846] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:57:55 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ff", 0x1a}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 351.420354][T26853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:55 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:55 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ff", 0x1a}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:55 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:57:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac4", 0x27}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:55 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 351.858443][T26887] FAULT_INJECTION: forcing a failure. [ 351.858443][T26887] name failslab, interval 1, probability 0, space 0, times 0 [ 351.929627][T26887] CPU: 0 PID: 26887 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 351.938517][T26887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.948579][T26887] Call Trace: [ 351.948604][T26887] dump_stack+0x197/0x210 [ 351.948623][T26887] should_fail.cold+0xa/0x15 [ 351.948641][T26887] ? fault_create_debugfs_attr+0x180/0x180 [ 351.948659][T26887] ? ___might_sleep+0x163/0x2c0 [ 351.948678][T26887] __should_failslab+0x121/0x190 [ 351.948696][T26887] should_failslab+0x9/0x14 [ 351.948709][T26887] kmem_cache_alloc_node_trace+0x274/0x750 [ 351.948829][T26887] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 351.993232][T26887] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 351.999069][T26887] __kmalloc_node_track_caller+0x3d/0x70 [ 352.004883][T26887] __kmalloc_reserve.isra.0+0x40/0xf0 [ 352.010310][T26887] __alloc_skb+0x10b/0x5e0 [ 352.014748][T26887] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 352.020462][T26887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.027086][T26887] ? netlink_autobind.isra.0+0x223/0x300 [ 352.032981][T26887] netlink_sendmsg+0xa1b/0xea0 [ 352.037866][T26887] ? netlink_unicast+0x7d0/0x7d0 [ 352.043027][T26887] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 352.043046][T26887] ? apparmor_socket_sendmsg+0x2a/0x30 [ 352.054160][T26887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.054174][T26887] ? security_socket_sendmsg+0x8d/0xc0 [ 352.054191][T26887] ? netlink_unicast+0x7d0/0x7d0 [ 352.054206][T26887] sock_sendmsg+0xd7/0x130 [ 352.054222][T26887] ____sys_sendmsg+0x753/0x880 [ 352.054240][T26887] ? kernel_sendmsg+0x50/0x50 [ 352.054253][T26887] ? __fget+0x35d/0x550 [ 352.054266][T26887] ? find_held_lock+0x35/0x130 [ 352.054290][T26887] ___sys_sendmsg+0x100/0x170 [ 352.099351][T26887] ? sendmsg_copy_msghdr+0x70/0x70 [ 352.104725][T26887] ? __kasan_check_read+0x11/0x20 [ 352.110035][T26887] ? __fget+0x37f/0x550 [ 352.114210][T26887] ? ksys_dup3+0x3e0/0x3e0 [ 352.118645][T26887] ? __fget_light+0x1a9/0x230 [ 352.123558][T26887] ? __fdget+0x1b/0x20 [ 352.127869][T26887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.134247][T26887] __sys_sendmsg+0x105/0x1d0 [ 352.138839][T26887] ? __sys_sendmsg_sock+0xc0/0xc0 [ 352.138864][T26887] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 352.149582][T26887] ? do_syscall_64+0x26/0x790 [ 352.154522][T26887] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.160853][T26887] ? do_syscall_64+0x26/0x790 [ 352.165680][T26887] __x64_sys_sendmsg+0x78/0xb0 [ 352.170478][T26887] do_syscall_64+0xfa/0x790 [ 352.175012][T26887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.182882][T26887] RIP: 0033:0x45a909 [ 352.186770][T26887] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.206535][T26887] RSP: 002b:00007ff6b274dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 352.215151][T26887] RAX: ffffffffffffffda RBX: 00007ff6b274dc90 RCX: 000000000045a909 [ 352.223264][T26887] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 352.231278][T26887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 352.239283][T26887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6b274e6d4 [ 352.250559][T26887] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:57:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="c50cf8ff10000000950000000000000018000000ff03000000100000ff0f000018290000", @ANYRES32, @ANYBLOB="0000000081000000182a0000", @ANYRESOCT=r0, @ANYBLOB="0000000007000000efb00600f0ffffff8f30f8ff000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xaf, &(0x7f0000000100)=""/175, 0x41000, 0x2, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0xf, 0x81, 0x3}, 0x10}, 0x78) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000002c0)=r1) r2 = socket$kcm(0x2b, 0x1, 0x0) socketpair(0xa, 0xa, 0x5, &(0x7f0000000500)={0xffffffffffffffff}) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001600)={&(0x7f0000000540)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001640)={r4, r5}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) 13:57:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:56 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:57:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac4", 0x27}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:56 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac4", 0x27}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 352.422969][T26908] FAULT_INJECTION: forcing a failure. [ 352.422969][T26908] name failslab, interval 1, probability 0, space 0, times 0 [ 352.469658][T26908] CPU: 0 PID: 26908 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 352.478402][T26908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.488460][T26908] Call Trace: [ 352.491768][T26908] dump_stack+0x197/0x210 [ 352.496198][T26908] should_fail.cold+0xa/0x15 [ 352.500912][T26908] ? fault_create_debugfs_attr+0x180/0x180 [ 352.506952][T26908] __should_failslab+0x121/0x190 [ 352.511902][T26908] should_failslab+0x9/0x14 [ 352.516785][T26908] kmem_cache_alloc+0x47/0x710 [ 352.521578][T26908] ? lock_acquire+0x190/0x410 [ 352.526255][T26908] ? netlink_deliver_tap+0x146/0xbe0 [ 352.531552][T26908] skb_clone+0x154/0x3d0 [ 352.535800][T26908] netlink_deliver_tap+0x943/0xbe0 [ 352.541006][T26908] netlink_unicast+0x643/0x7d0 [ 352.545787][T26908] ? netlink_attachskb+0x870/0x870 [ 352.550906][T26908] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 352.556702][T26908] ? __check_object_size+0x3d/0x437 [ 352.561995][T26908] netlink_sendmsg+0x91c/0xea0 [ 352.566850][T26908] ? netlink_unicast+0x7d0/0x7d0 [ 352.571907][T26908] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 352.577542][T26908] ? apparmor_socket_sendmsg+0x2a/0x30 [ 352.583003][T26908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.589324][T26908] ? security_socket_sendmsg+0x8d/0xc0 [ 352.594792][T26908] ? netlink_unicast+0x7d0/0x7d0 [ 352.599816][T26908] sock_sendmsg+0xd7/0x130 [ 352.604387][T26908] ____sys_sendmsg+0x753/0x880 [ 352.609173][T26908] ? kernel_sendmsg+0x50/0x50 [ 352.613849][T26908] ? __fget+0x35d/0x550 [ 352.618000][T26908] ? find_held_lock+0x35/0x130 [ 352.622765][T26908] ___sys_sendmsg+0x100/0x170 [ 352.628960][T26908] ? sendmsg_copy_msghdr+0x70/0x70 [ 352.634205][T26908] ? __kasan_check_read+0x11/0x20 [ 352.639238][T26908] ? __fget+0x37f/0x550 [ 352.643569][T26908] ? ksys_dup3+0x3e0/0x3e0 [ 352.647994][T26908] ? __fget_light+0x1a9/0x230 [ 352.652673][T26908] ? __fdget+0x1b/0x20 [ 352.656742][T26908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.663214][T26908] __sys_sendmsg+0x105/0x1d0 [ 352.667904][T26908] ? __sys_sendmsg_sock+0xc0/0xc0 [ 352.672941][T26908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 352.678418][T26908] ? do_syscall_64+0x26/0x790 [ 352.683092][T26908] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.689549][T26908] ? do_syscall_64+0x26/0x790 [ 352.694233][T26908] __x64_sys_sendmsg+0x78/0xb0 [ 352.699172][T26908] do_syscall_64+0xfa/0x790 [ 352.703807][T26908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.709696][T26908] RIP: 0033:0x45a909 [ 352.713590][T26908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.733285][T26908] RSP: 002b:00007ff6b274dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 352.741853][T26908] RAX: ffffffffffffffda RBX: 00007ff6b274dc90 RCX: 000000000045a909 [ 352.750117][T26908] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 352.758085][T26908] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:57:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 352.766166][T26908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6b274e6d4 [ 352.774135][T26908] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:57:56 executing program 4 (fault-call:3 fault-nth:3): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed0", 0x2f}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 352.977341][T26928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 353.125102][T26935] FAULT_INJECTION: forcing a failure. [ 353.125102][T26935] name failslab, interval 1, probability 0, space 0, times 0 [ 353.141622][T26935] CPU: 0 PID: 26935 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 353.150334][T26935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.160501][T26935] Call Trace: [ 353.163821][T26935] dump_stack+0x197/0x210 [ 353.168343][T26935] should_fail.cold+0xa/0x15 [ 353.172961][T26935] ? fault_create_debugfs_attr+0x180/0x180 [ 353.178795][T26935] ? ___might_sleep+0x163/0x2c0 [ 353.183681][T26935] __should_failslab+0x121/0x190 [ 353.188844][T26935] should_failslab+0x9/0x14 [ 353.193363][T26935] __kmalloc+0x2e0/0x770 [ 353.193454][T26935] ? dev_set_alias+0x60/0x220 [ 353.193475][T26935] dev_set_alias+0x60/0x220 [ 353.202700][T26935] do_setlink+0x849/0x3720 [ 353.202767][T26935] ? __kernel_text_address+0xd/0x40 [ 353.202794][T26935] ? unwind_get_return_address+0x61/0xa0 [ 353.222865][T26935] ? rtnl_getlink+0xb40/0xb40 [ 353.227649][T26935] ? stack_trace_save+0xac/0xe0 [ 353.232709][T26935] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 353.238747][T26935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.245373][T26935] ? __nla_validate_parse+0x2d0/0x1ee0 [ 353.250842][T26935] ? mark_lock+0xc2/0x1220 [ 353.255432][T26935] ? nla_memcpy+0xb0/0xb0 [ 353.259759][T26935] ? __kasan_check_read+0x11/0x20 [ 353.264961][T26935] ? __nla_parse+0x43/0x60 [ 353.269551][T26935] rtnl_setlink+0x27a/0x3f0 [ 353.274055][T26935] ? do_setlink+0x3720/0x3720 [ 353.278759][T26935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 353.284997][T26935] ? do_setlink+0x3720/0x3720 [ 353.289678][T26935] rtnetlink_rcv_msg+0x45e/0xaf0 [ 353.294625][T26935] ? rtnl_bridge_getlink+0x910/0x910 [ 353.300150][T26935] ? netlink_deliver_tap+0x228/0xbe0 [ 353.305435][T26935] ? find_held_lock+0x35/0x130 [ 353.310204][T26935] netlink_rcv_skb+0x177/0x450 [ 353.314972][T26935] ? rtnl_bridge_getlink+0x910/0x910 [ 353.320493][T26935] ? netlink_ack+0xb50/0xb50 [ 353.325320][T26935] ? __kasan_check_read+0x11/0x20 [ 353.330521][T26935] ? netlink_deliver_tap+0x24a/0xbe0 [ 353.336101][T26935] rtnetlink_rcv+0x1d/0x30 [ 353.340737][T26935] netlink_unicast+0x58c/0x7d0 [ 353.345529][T26935] ? netlink_attachskb+0x870/0x870 [ 353.350704][T26935] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 353.357136][T26935] ? __check_object_size+0x3d/0x437 [ 353.362593][T26935] netlink_sendmsg+0x91c/0xea0 [ 353.367508][T26935] ? netlink_unicast+0x7d0/0x7d0 [ 353.372633][T26935] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 353.378332][T26935] ? apparmor_socket_sendmsg+0x2a/0x30 [ 353.383788][T26935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.390118][T26935] ? security_socket_sendmsg+0x8d/0xc0 [ 353.395888][T26935] ? netlink_unicast+0x7d0/0x7d0 [ 353.401025][T26935] sock_sendmsg+0xd7/0x130 [ 353.405722][T26935] ____sys_sendmsg+0x753/0x880 [ 353.410815][T26935] ? kernel_sendmsg+0x50/0x50 [ 353.415886][T26935] ? __fget+0x35d/0x550 [ 353.420039][T26935] ? find_held_lock+0x35/0x130 [ 353.424873][T26935] ___sys_sendmsg+0x100/0x170 [ 353.429566][T26935] ? sendmsg_copy_msghdr+0x70/0x70 [ 353.434675][T26935] ? __kasan_check_read+0x11/0x20 [ 353.439702][T26935] ? __fget+0x37f/0x550 [ 353.443858][T26935] ? ksys_dup3+0x3e0/0x3e0 [ 353.448267][T26935] ? __fget_light+0x1a9/0x230 [ 353.452992][T26935] ? __fdget+0x1b/0x20 [ 353.457174][T26935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 353.463424][T26935] __sys_sendmsg+0x105/0x1d0 [ 353.468025][T26935] ? __sys_sendmsg_sock+0xc0/0xc0 [ 353.473052][T26935] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 353.478506][T26935] ? do_syscall_64+0x26/0x790 [ 353.483174][T26935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.489260][T26935] ? do_syscall_64+0x26/0x790 [ 353.493962][T26935] __x64_sys_sendmsg+0x78/0xb0 [ 353.498727][T26935] do_syscall_64+0xfa/0x790 [ 353.503223][T26935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.509126][T26935] RIP: 0033:0x45a909 [ 353.513025][T26935] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.532815][T26935] RSP: 002b:00007ff6b274dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 353.541238][T26935] RAX: ffffffffffffffda RBX: 00007ff6b274dc90 RCX: 000000000045a909 [ 353.549207][T26935] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 353.557219][T26935] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 353.565188][T26935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6b274e6d4 [ 353.573367][T26935] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:57:57 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) 13:57:57 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 13:57:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:57 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:57:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:57 executing program 4 (fault-call:3 fault-nth:4): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 353.782427][T26949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 353.808604][T26948] FAULT_INJECTION: forcing a failure. [ 353.808604][T26948] name failslab, interval 1, probability 0, space 0, times 0 13:57:57 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) [ 353.840055][T26948] CPU: 1 PID: 26948 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 353.848786][T26948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.858852][T26948] Call Trace: [ 353.858879][T26948] dump_stack+0x197/0x210 [ 353.858900][T26948] should_fail.cold+0xa/0x15 [ 353.858918][T26948] ? fault_create_debugfs_attr+0x180/0x180 [ 353.858935][T26948] ? ___might_sleep+0x163/0x2c0 [ 353.858955][T26948] __should_failslab+0x121/0x190 [ 353.886751][T26948] should_failslab+0x9/0x14 [ 353.891287][T26948] kmem_cache_alloc_node+0x268/0x740 [ 353.896585][T26948] __alloc_skb+0xd5/0x5e0 [ 353.900909][T26948] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 353.900927][T26948] ? if_nlmsg_size+0x54a/0xa80 [ 353.900947][T26948] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 353.900966][T26948] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 353.900984][T26948] rtmsg_ifinfo+0x8d/0xa0 [ 353.926335][T26948] netdev_state_change+0x121/0x140 [ 353.931455][T26948] ? netdev_notify_peers+0xc0/0xc0 13:57:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed07b", 0x30}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 353.936584][T26948] ? dev_change_flags+0x112/0x170 [ 353.941771][T26948] do_setlink+0x166a/0x3720 [ 353.946300][T26948] ? __kasan_check_read+0x11/0x20 [ 353.951332][T26948] ? mark_lock+0xc2/0x1220 [ 353.955768][T26948] ? rtnl_getlink+0xb40/0xb40 [ 353.960452][T26948] ? __kasan_check_read+0x11/0x20 [ 353.965484][T26948] ? __lock_acquire+0x16f2/0x4a00 [ 353.970524][T26948] ? finish_task_switch+0x147/0x750 [ 353.975770][T26948] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 353.981671][T26948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.987915][T26948] ? __nla_validate_parse+0x2d0/0x1ee0 [ 353.993547][T26948] ? nla_memcpy+0xb0/0xb0 [ 353.993564][T26948] ? __kasan_check_read+0x11/0x20 [ 353.993577][T26948] ? __lock_acquire+0x16f2/0x4a00 [ 353.993593][T26948] ? __nla_parse+0x43/0x60 [ 353.993617][T26948] rtnl_setlink+0x27a/0x3f0 [ 354.016873][T26948] ? do_setlink+0x3720/0x3720 [ 354.021612][T26948] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 354.027867][T26948] ? do_setlink+0x3720/0x3720 [ 354.032555][T26948] rtnetlink_rcv_msg+0x45e/0xaf0 13:57:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 354.037507][T26948] ? rtnl_bridge_getlink+0x910/0x910 [ 354.042806][T26948] ? netlink_deliver_tap+0x228/0xbe0 [ 354.048118][T26948] ? find_held_lock+0x35/0x130 [ 354.052904][T26948] netlink_rcv_skb+0x177/0x450 [ 354.057678][T26948] ? rtnl_bridge_getlink+0x910/0x910 [ 354.062979][T26948] ? netlink_ack+0xb50/0xb50 [ 354.062995][T26948] ? __kasan_check_read+0x11/0x20 [ 354.063013][T26948] ? netlink_deliver_tap+0x24a/0xbe0 [ 354.063036][T26948] rtnetlink_rcv+0x1d/0x30 [ 354.072629][T26948] netlink_unicast+0x58c/0x7d0 [ 354.072651][T26948] ? netlink_attachskb+0x870/0x870 [ 354.072668][T26948] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 354.072686][T26948] ? __check_object_size+0x3d/0x437 [ 354.072708][T26948] netlink_sendmsg+0x91c/0xea0 [ 354.072736][T26948] ? netlink_unicast+0x7d0/0x7d0 [ 354.112887][T26948] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 354.118475][T26948] ? apparmor_socket_sendmsg+0x2a/0x30 [ 354.123948][T26948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.130201][T26948] ? security_socket_sendmsg+0x8d/0xc0 [ 354.135649][T26948] ? netlink_unicast+0x7d0/0x7d0 [ 354.140576][T26948] sock_sendmsg+0xd7/0x130 [ 354.145029][T26948] ____sys_sendmsg+0x753/0x880 [ 354.149794][T26948] ? kernel_sendmsg+0x50/0x50 [ 354.154474][T26948] ? __fget+0x35d/0x550 [ 354.158623][T26948] ? find_held_lock+0x35/0x130 [ 354.163391][T26948] ___sys_sendmsg+0x100/0x170 [ 354.168068][T26948] ? sendmsg_copy_msghdr+0x70/0x70 [ 354.173179][T26948] ? __kasan_check_read+0x11/0x20 [ 354.178209][T26948] ? __fget+0x37f/0x550 [ 354.182397][T26948] ? ksys_dup3+0x3e0/0x3e0 [ 354.186821][T26948] ? __fget_light+0x1a9/0x230 [ 354.191509][T26948] ? __fdget+0x1b/0x20 [ 354.195591][T26948] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 354.201944][T26948] __sys_sendmsg+0x105/0x1d0 [ 354.206604][T26948] ? __sys_sendmsg_sock+0xc0/0xc0 [ 354.212346][T26948] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 354.217805][T26948] ? do_syscall_64+0x26/0x790 [ 354.222538][T26948] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.228609][T26948] ? do_syscall_64+0x26/0x790 [ 354.233275][T26948] __x64_sys_sendmsg+0x78/0xb0 [ 354.238039][T26948] do_syscall_64+0xfa/0x790 [ 354.242532][T26948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.248415][T26948] RIP: 0033:0x45a909 [ 354.252314][T26948] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 354.271934][T26948] RSP: 002b:00007ff6b274dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 354.280332][T26948] RAX: ffffffffffffffda RBX: 00007ff6b274dc90 RCX: 000000000045a909 [ 354.288300][T26948] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 354.296264][T26948] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 354.304325][T26948] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6b274e6d4 [ 354.312289][T26948] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:57:58 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 354.335647][T26963] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:58 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 13:57:58 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:57:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:58 executing program 4 (fault-call:3 fault-nth:5): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:58 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 354.616639][T26986] FAULT_INJECTION: forcing a failure. [ 354.616639][T26986] name failslab, interval 1, probability 0, space 0, times 0 [ 354.670137][T26986] CPU: 1 PID: 26986 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 354.678873][T26986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.688941][T26986] Call Trace: [ 354.692253][T26986] dump_stack+0x197/0x210 [ 354.696613][T26986] should_fail.cold+0xa/0x15 [ 354.701222][T26986] ? fault_create_debugfs_attr+0x180/0x180 [ 354.707074][T26986] ? ___might_sleep+0x163/0x2c0 [ 354.711943][T26986] __should_failslab+0x121/0x190 [ 354.716892][T26986] should_failslab+0x9/0x14 [ 354.721391][T26986] kmem_cache_alloc_node_trace+0x274/0x750 [ 354.721410][T26986] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 354.721424][T26986] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 354.721444][T26986] __kmalloc_node_track_caller+0x3d/0x70 [ 354.721463][T26986] __kmalloc_reserve.isra.0+0x40/0xf0 [ 354.721481][T26986] __alloc_skb+0x10b/0x5e0 [ 354.755216][T26986] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 354.760781][T26986] ? if_nlmsg_size+0x54a/0xa80 [ 354.765575][T26986] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 354.771033][T26986] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 354.776564][T26986] rtmsg_ifinfo+0x8d/0xa0 [ 354.781008][T26986] netdev_state_change+0x121/0x140 [ 354.786225][T26986] ? netdev_notify_peers+0xc0/0xc0 [ 354.791356][T26986] ? dev_change_flags+0x112/0x170 [ 354.796396][T26986] do_setlink+0x166a/0x3720 [ 354.800951][T26986] ? __kernel_text_address+0xd/0x40 [ 354.806152][T26986] ? unwind_get_return_address+0x61/0xa0 [ 354.812087][T26986] ? rtnl_getlink+0xb40/0xb40 13:57:58 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:57:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 354.816783][T26986] ? stack_trace_save+0xac/0xe0 [ 354.821654][T26986] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 354.827566][T26986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.833884][T26986] ? __nla_validate_parse+0x2d0/0x1ee0 [ 354.839513][T26986] ? mark_lock+0xc2/0x1220 [ 354.843954][T26986] ? nla_memcpy+0xb0/0xb0 [ 354.848302][T26986] ? __kasan_check_read+0x11/0x20 [ 354.853338][T26986] ? __nla_parse+0x43/0x60 [ 354.857815][T26986] rtnl_setlink+0x27a/0x3f0 [ 354.862338][T26986] ? do_setlink+0x3720/0x3720 [ 354.867085][T26986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 354.873336][T26986] ? do_setlink+0x3720/0x3720 [ 354.878151][T26986] rtnetlink_rcv_msg+0x45e/0xaf0 [ 354.883203][T26986] ? rtnl_bridge_getlink+0x910/0x910 [ 354.888502][T26986] ? netlink_deliver_tap+0x228/0xbe0 [ 354.893898][T26986] ? find_held_lock+0x35/0x130 [ 354.898684][T26986] netlink_rcv_skb+0x177/0x450 [ 354.903458][T26986] ? rtnl_bridge_getlink+0x910/0x910 [ 354.908866][T26986] ? netlink_ack+0xb50/0xb50 [ 354.913475][T26986] ? __kasan_check_read+0x11/0x20 13:57:58 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 354.918524][T26986] ? netlink_deliver_tap+0x24a/0xbe0 [ 354.923843][T26986] rtnetlink_rcv+0x1d/0x30 [ 354.928370][T26986] netlink_unicast+0x58c/0x7d0 [ 354.933144][T26986] ? netlink_attachskb+0x870/0x870 [ 354.933162][T26986] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 354.933177][T26986] ? __check_object_size+0x3d/0x437 [ 354.933196][T26986] netlink_sendmsg+0x91c/0xea0 [ 354.933220][T26986] ? netlink_unicast+0x7d0/0x7d0 [ 354.958919][T26986] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 354.964486][T26986] ? apparmor_socket_sendmsg+0x2a/0x30 [ 354.969959][T26986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.976217][T26986] ? security_socket_sendmsg+0x8d/0xc0 [ 354.976237][T26986] ? netlink_unicast+0x7d0/0x7d0 [ 354.976256][T26986] sock_sendmsg+0xd7/0x130 [ 354.976274][T26986] ____sys_sendmsg+0x753/0x880 [ 354.976292][T26986] ? kernel_sendmsg+0x50/0x50 [ 354.976310][T26986] ? __fget+0x35d/0x550 [ 355.004934][T26986] ? find_held_lock+0x35/0x130 [ 355.009715][T26986] ___sys_sendmsg+0x100/0x170 [ 355.009738][T26986] ? sendmsg_copy_msghdr+0x70/0x70 [ 355.009755][T26986] ? __kasan_check_read+0x11/0x20 [ 355.009775][T26986] ? __fget+0x37f/0x550 [ 355.009798][T26986] ? ksys_dup3+0x3e0/0x3e0 [ 355.033141][T26986] ? __fget_light+0x1a9/0x230 [ 355.037837][T26986] ? __fdget+0x1b/0x20 [ 355.042032][T26986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 355.048292][T26986] __sys_sendmsg+0x105/0x1d0 [ 355.052896][T26986] ? __sys_sendmsg_sock+0xc0/0xc0 [ 355.057947][T26986] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 355.063419][T26986] ? do_syscall_64+0x26/0x790 13:57:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 355.068133][T26986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.074212][T26986] ? do_syscall_64+0x26/0x790 [ 355.078907][T26986] __x64_sys_sendmsg+0x78/0xb0 [ 355.083686][T26986] do_syscall_64+0xfa/0x790 [ 355.088206][T26986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.094108][T26986] RIP: 0033:0x45a909 [ 355.098006][T26986] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:57:59 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 355.117615][T26986] RSP: 002b:00007ff6b274dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 355.117631][T26986] RAX: ffffffffffffffda RBX: 00007ff6b274dc90 RCX: 000000000045a909 [ 355.117638][T26986] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 355.117645][T26986] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 355.117652][T26986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6b274e6d4 [ 355.117659][T26986] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:57:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04ed0", 0x2f}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 355.307968][T27013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:57:59 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @local}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000700)={'t\x00', @broadcast}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = gettid() r5 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x1f, 0x9, 0x2, 0x9, 0x0, 0xffffffffffffffff, 0x42000, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x400, 0xd7, 0xffffffff, 0x7, 0x7, 0x4, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='veth0\x00') r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f00000001c0)='veth0\x00') close(r6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2845f}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, r7, 0x0, 0x13, &(0x7f0000000180)='keyring}cgroupGPL(\x00'}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ff"]) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1000, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x11) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r9 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r9) 13:57:59 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:57:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:59 executing program 4 (fault-call:3 fault-nth:6): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:59 executing program 2: 13:57:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:57:59 executing program 2: 13:57:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:57:59 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 355.596263][T27029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 355.637865][T27028] FAULT_INJECTION: forcing a failure. [ 355.637865][T27028] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 355.651204][T27028] CPU: 0 PID: 27028 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 355.651215][T27028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.651221][T27028] Call Trace: [ 355.651245][T27028] dump_stack+0x197/0x210 [ 355.651267][T27028] should_fail.cold+0xa/0x15 [ 355.651285][T27028] ? fault_create_debugfs_attr+0x180/0x180 [ 355.651302][T27028] ? __kasan_check_read+0x11/0x20 [ 355.651315][T27028] ? __lock_acquire+0x16f2/0x4a00 [ 355.651339][T27028] ? rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 355.703721][T27028] should_fail_alloc_page+0x50/0x60 [ 355.708923][T27028] __alloc_pages_nodemask+0x1a1/0x910 [ 355.714308][T27028] ? fs_reclaim_release+0xf/0x30 [ 355.719242][T27028] ? __alloc_pages_slowpath+0x2920/0x2920 [ 355.724955][T27028] ? fs_reclaim_release+0xf/0x30 [ 355.729898][T27028] ? fault_create_debugfs_attr+0x180/0x180 [ 355.735698][T27028] cache_grow_begin+0x90/0xc60 [ 355.740451][T27028] ? __kmalloc_node_track_caller+0x3d/0x70 [ 355.746284][T27028] ? trace_hardirqs_off+0x62/0x240 [ 355.751384][T27028] kmem_cache_alloc_node_trace+0x689/0x750 [ 355.757175][T27028] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 355.763136][T27028] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 355.768928][T27028] __kmalloc_node_track_caller+0x3d/0x70 [ 355.774560][T27028] __kmalloc_reserve.isra.0+0x40/0xf0 [ 355.779942][T27028] __alloc_skb+0x10b/0x5e0 [ 355.784347][T27028] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 355.789882][T27028] ? if_nlmsg_size+0x54a/0xa80 [ 355.794636][T27028] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 355.799910][T27028] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 355.805355][T27028] rtmsg_ifinfo+0x8d/0xa0 [ 355.809668][T27028] netdev_state_change+0x121/0x140 [ 355.814763][T27028] ? netdev_notify_peers+0xc0/0xc0 [ 355.819870][T27028] ? dev_change_flags+0x112/0x170 [ 355.824883][T27028] do_setlink+0x166a/0x3720 [ 355.829369][T27028] ? __kasan_check_read+0x11/0x20 [ 355.834388][T27028] ? mark_lock+0xc2/0x1220 [ 355.838812][T27028] ? rtnl_getlink+0xb40/0xb40 [ 355.843472][T27028] ? __kasan_check_read+0x11/0x20 [ 355.848479][T27028] ? __lock_acquire+0x16f2/0x4a00 [ 355.853489][T27028] ? finish_task_switch+0x147/0x750 [ 355.858674][T27028] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 355.864551][T27028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.870774][T27028] ? __nla_validate_parse+0x2d0/0x1ee0 [ 355.876221][T27028] ? nla_memcpy+0xb0/0xb0 [ 355.880632][T27028] ? __kasan_check_read+0x11/0x20 [ 355.885641][T27028] ? __lock_acquire+0x16f2/0x4a00 [ 355.890663][T27028] ? __nla_parse+0x43/0x60 [ 355.895071][T27028] rtnl_setlink+0x27a/0x3f0 [ 355.899562][T27028] ? do_setlink+0x3720/0x3720 [ 355.904268][T27028] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 355.910494][T27028] ? do_setlink+0x3720/0x3720 [ 355.915156][T27028] rtnetlink_rcv_msg+0x45e/0xaf0 [ 355.920079][T27028] ? rtnl_bridge_getlink+0x910/0x910 [ 355.925350][T27028] ? netlink_deliver_tap+0x228/0xbe0 [ 355.930644][T27028] ? find_held_lock+0x35/0x130 [ 355.935397][T27028] netlink_rcv_skb+0x177/0x450 [ 355.940147][T27028] ? rtnl_bridge_getlink+0x910/0x910 [ 355.945416][T27028] ? netlink_ack+0xb50/0xb50 [ 355.949990][T27028] ? __kasan_check_read+0x11/0x20 [ 355.955001][T27028] ? netlink_deliver_tap+0x24a/0xbe0 [ 355.960282][T27028] rtnetlink_rcv+0x1d/0x30 [ 355.964682][T27028] netlink_unicast+0x58c/0x7d0 [ 355.969444][T27028] ? netlink_attachskb+0x870/0x870 [ 355.974542][T27028] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 355.980247][T27028] ? __check_object_size+0x3d/0x437 [ 355.985434][T27028] netlink_sendmsg+0x91c/0xea0 [ 355.990195][T27028] ? netlink_unicast+0x7d0/0x7d0 [ 355.995119][T27028] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 356.000650][T27028] ? apparmor_socket_sendmsg+0x2a/0x30 [ 356.006094][T27028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 356.012320][T27028] ? security_socket_sendmsg+0x8d/0xc0 [ 356.017764][T27028] ? netlink_unicast+0x7d0/0x7d0 [ 356.022687][T27028] sock_sendmsg+0xd7/0x130 [ 356.027088][T27028] ____sys_sendmsg+0x753/0x880 [ 356.031836][T27028] ? kernel_sendmsg+0x50/0x50 [ 356.036508][T27028] ? __fget+0x35d/0x550 [ 356.040662][T27028] ? find_held_lock+0x35/0x130 [ 356.045417][T27028] ___sys_sendmsg+0x100/0x170 [ 356.050083][T27028] ? sendmsg_copy_msghdr+0x70/0x70 [ 356.055175][T27028] ? __kasan_check_read+0x11/0x20 [ 356.060193][T27028] ? __fget+0x37f/0x550 [ 356.064336][T27028] ? ksys_dup3+0x3e0/0x3e0 [ 356.068749][T27028] ? __fget_light+0x1a9/0x230 [ 356.073584][T27028] ? __fdget+0x1b/0x20 [ 356.077723][T27028] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 356.083957][T27028] __sys_sendmsg+0x105/0x1d0 [ 356.088531][T27028] ? __sys_sendmsg_sock+0xc0/0xc0 [ 356.093548][T27028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 356.098989][T27028] ? do_syscall_64+0x26/0x790 [ 356.103680][T27028] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.109729][T27028] ? do_syscall_64+0x26/0x790 [ 356.114394][T27028] __x64_sys_sendmsg+0x78/0xb0 [ 356.119160][T27028] do_syscall_64+0xfa/0x790 [ 356.123652][T27028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.129526][T27028] RIP: 0033:0x45a909 [ 356.133412][T27028] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.153000][T27028] RSP: 002b:00007ff6b274dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 356.161393][T27028] RAX: ffffffffffffffda RBX: 00007ff6b274dc90 RCX: 000000000045a909 [ 356.169346][T27028] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 356.177331][T27028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:58:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:00 executing program 2: [ 356.185439][T27028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6b274e6d4 [ 356.193405][T27028] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:58:00 executing program 2: 13:58:01 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:01 executing program 2: 13:58:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'batadv0\x00', @dev={[], 0x16}}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 13:58:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:58:01 executing program 2: 13:58:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:58:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="0f000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 13:58:01 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:58:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xe00}, 0x0) 13:58:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="10000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 357.603292][T27085] device nr0 entered promiscuous mode 13:58:01 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x2611cbbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4007f8fdd6ca8376}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:58:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg(r1, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[{0x10}], 0x10}, 0x0) 13:58:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:02 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:02 executing program 5: socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0xa, 0x1, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="0000b1be000800a05b128b52d092a7a0a68f64d6768a5b1fda1937a3282560c253e3317687b3ec04507220294ddd6662892c41cf56cd4d9a840565fc6c0105cb9ce29e1b8251220b45d7f7d7e052d22a991e0d3583bb56d683d32ab8cf5e8a5f101c8d0008bfb03c74439b352eee16"], 0xfdef) 13:58:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="30000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:02 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) 13:58:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="c0000000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:02 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:02 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000100)) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x3f, 0x5, 0x0, 0x20, 0x8, 0x0, 0x2, 0x40, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x21469, 0x7, 0x8, 0x1, 0xc678, 0x2, 0x81}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f00000000c0)) recvmsg(r1, &(0x7f0000000440)={&(0x7f0000000140)=@ipx, 0x80, &(0x7f0000000300)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/223, 0xdf}, {&(0x7f00000002c0)=""/34, 0x22}, {&(0x7f0000001600)=""/4096, 0x1000}], 0x4, &(0x7f0000000340)=""/219, 0xdb}, 0x12000) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) [ 358.846082][T27147] device nr0 entered promiscuous mode 13:58:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 13:58:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="b3010000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:03 executing program 5: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:03 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="c00e0000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:03 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 13:58:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="e03f0300130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:03 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:03 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x70, 0x1, 0x6, 0x7, 0x1, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x26e7, 0x0, @perf_config_ext={0x7fff}, 0x100, 0x8, 0x2, 0x7, 0x7ff, 0x2, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4febde8f34a95e95) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7, r1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002980)=[{&(0x7f00000016c0)=""/46, 0x2e}, {&(0x7f0000001700)=""/169, 0xa9}, {&(0x7f00000017c0)=""/111, 0x6f}, {0x0}, {&(0x7f0000002840)=""/27, 0x1b}, {&(0x7f0000002880)=""/225, 0xe1}], 0x6, &(0x7f0000002a00)=""/48, 0x30}, 0x2000) bpf$MAP_CREATE(0x0, &(0x7f0000002a80)={0x0, 0x3a, 0x0, 0x9, 0x4, 0xffffffffffffffff, 0x1, [], r4, 0xffffffffffffffff, 0x4}, 0x3c) socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="87", 0x1}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x0, 0x3, 0x10, 0x1, 0x0, [], r7, r6}, 0x415) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x5, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3612ee43fe38d9a1, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x8001, 0x0, 0x0, 0x40f00, 0x2, [], r7, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x1, 0x9c6, 0x4}, 0x10, r8}, 0x78) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r8, 0x4) r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r11, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x3, 0x9, 0x80000000, 0xdc}, &(0x7f00000044c0)=0x1b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=0x4}}, 0x10) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='\b\x00', 0x1430c2, 0x0) write$cgroup_subtree(r13, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r14, 0x0, 0x0) write$cgroup_subtree(r14, &(0x7f0000000000)=ANY=[@ANYBLOB="3cd1c555f4b61a028704038157"], 0x1) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r15, 0x0, 0x0) write$cgroup_subtree(r15, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000f080)={&(0x7f000000de40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000380)=ANY=[@ANYRESOCT=r13], &(0x7f0000001a40)='syzkaller\x00', 0x80, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000001a80), 0x10}, 0x78) r18 = bpf$PROG_LOAD(0x5, &(0x7f00000047c0)={0x1, 0xd, &(0x7f0000004640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xae5, 0x0, 0x0, 0x0, 0x1}, [@func, @map={0x18, 0x1, 0x1, 0x0, r14}, @map={0x18, 0x0, 0x1, 0x0, r15}, @call={0x85, 0x0, 0x0, 0x66}, @jmp={0x5, 0x1, 0x5, 0x2, 0x6, 0x10, 0xfffffffffffffff0}, @exit, @map={0x18, 0x8}]}, &(0x7f0000004700)='GPL\x00', 0xfffffff8, 0x0, 0x0, 0x40f00, 0x2, [], r16, 0x2, r5, 0x8, &(0x7f0000004740)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004780)={0x5, 0xa, 0x6, 0xffffad2c}, 0x10, 0x0, r17}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x0, 0x0, &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, r9, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000043c0)={0x1, 0xe, 0x0, 0xd3de}, 0x10, r12, r18}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0xfff, 0x19, &(0x7f0000000240)=""/25, 0x0, 0x1, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xa, 0xe8, 0x200}, 0x10, r12}, 0x78) r19 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00#\x7f\x80P=r\xc4\x17I~\x85\xadq\xd6\xde@\xb3\xd5\x9f2R\xa3Z\xd3\x9b\xbd\xa1\xa3/\xc0\x91J\x01!8#\x04\x0f\xc3\xb7\x95\xdc\xaa\x91\xfb\xa1]PVH\xaa\x19\x04\x80\x94\'\xc7\fL\xac\xcf:\x92N\x94\xde\x87\xc4\x9b\x87\xd2\xcc{X\xedVr\xecP\xf9&^I\x9f}3U?\x1a\r\x9d', 0x200002, 0x0) r20 = openat$cgroup_ro(r19, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r20, 0x40305839, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1, 0xffffffff, 0x1, 0x2, 0x20, r3, 0x0, [], r4, r20, 0x2, 0x5}, 0x3c) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000080)=@xdp={0x2c, 0x0, r4, 0x33}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000100)="ee0c2a0d4384541fc861799c9aecc851a3207824c90b09bb0ad90d59ade6c3d7197e1d2e1dd63b5aeecc3e9fb5a57382237ff57f6fdb5d7ade8eeac3f1c26e3b6288412f0637802278fc3d297e2912621bd7a3298bb03ca8841c43b005578f86b7bd8941656d8982bbb103653e71c1e0d5bb678f64b57a4a82a24fc6495044b28761624038d9517202172fa63a74d11444b6f036490976ecfb7135ad4ca94fd64049cbb73e2c37fdaf0fb7b2d367f2235ca74c49f6d18fff8a2567d5", 0xbc}, {&(0x7f00000001c0)="85cf888378e1f7f7ed1b0e3d9fc19728a1421ed776", 0x15}, {&(0x7f0000000200)="b1108d187f724a3de7f1000ffab868c047b502d6b19faf8bca3049e4778bff3a358935552c85e46cc03fadc554dd8f47adb956b7e7f47d50d53c1c25b953f8b1d20cdb02a835ae68eee66a45d2dd212f956bf537ac8bb833546778fc5b7e61458bc5d3925cdd907718cce999d48065a6b0fc288a2eba415791b32a35369c6eaace9005386cdc40a9bf", 0x89}, {&(0x7f00000002c0)="d0986d6172ca1527b1308637db1090b344f0fae466196f9cc827957e92e767cdd94eba9a742c70d0bd327f63e8571c2587bcc877f6df4a9bfa2e171501981cdce942a648b8f9ebd20760400f05ec8ef066c918e1db3573da2760241a8a5ac488db8f8962788203a643bafcdf667ea9fbfdd2b637c55ac018af70430604e29535864dd3c306f2fd7b8d3e7a6389069abaed6eb490", 0x94}, {&(0x7f0000000380)="1808358a6f014c2ad55a8b419f38dcd61b0dc34cd3f82e48549f8380bdd9866864872633316501085b1c058df320b330262e954d670610562a3b6a7d665143c93fcc24f2fc0f74d418b6f46e12223fdb4c8f8c212221d22817680df0f3c42dd39acb6197fe459ede3779bbf08e722f09a2d359a5924ce05f555edba2286c4bd86fd598f35e50592dbed11b2c55d332570f516d9b18a111dce63db4ab3578031633c180a1bbc570994b2cbf3deaeff31d731a24407a31d93c4568997f4eccd53c9bd85ef0c6c7c276d055d3539b9d8d39d819992105ef", 0xd6}, {&(0x7f0000000480)="ec9109d3e51ad2c9ef93ffaf66c8e1e934d624283adc8967532342574bbbd2cb7f8fc4bfbe7828abc7368e51a3d3d151f81aa6b23f36bc89ec6f27adcca89873cb2b1a412a5d44ac88ded9d1a281b2c135967a", 0x53}, {&(0x7f0000000600)="c307261e4fd47384d97f0a678e3f04adccb09878d33459071f50e3a32bc41c541a7bdf7bafbc2c58594ca4b52ea49b579507d174f9e162cf977cf5f7559eac1ae5ba8e48b26c3a62c3978b716cc39a4e32b1d782c19378b72532337f0a3794628385fa8dcb48c6c856893c3360b71aa7c4b4ece2e4b3e48babb066a25b5b32a08e45ed03d7336ff0a6d0e89a690b7af52c89505bcd0061626d0cddd5fbf219e2fdedcc5e96cbd75876bbc04fb8b9b40d2901ffaf17b3ec56149aa2a72b7e0055eb8ffc6ff6e70683ed68a6fc4e1b08847884956b3943f06798bb0e25d87cb9aa4a2f0c0746943d31", 0xe8}, {&(0x7f0000000500)="11fc81e8b310e3e91189b20790317403558e93c32d03876685bd3f", 0x1b}, {&(0x7f0000000700)="b094ecce40c89a017377692553b608b960ccdd2a9531022859ef12db5c3af3c10dbf983452c9f26d22b069ebb109572eb3d7e55567817273a3cb1e47f210aa2336ff75b52e24147f6ce0c17a186e43bee09d18648c76cb74604724e9c7a3cee2609db0e65c7a5ea250a9ec89dabd9ae10c7dab4682f7f6f354400d04", 0x7c}], 0x9, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x178}, 0x800) close(r2) [ 359.793782][T27192] device nr0 entered promiscuous mode 13:58:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c0000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="6e010020130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:04 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:04 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:04 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xaa, 0x0, 0x8, 0x9, 0x0, 0x4, 0x80002, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x9, 0x4}, 0x20044, 0x9, 0x0, 0x0, 0x100000000, 0x4, 0x1}, 0xffffffffffffffff, 0x2, r3, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000080)='em0\x00') r5 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) close(r0) 13:58:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="00f0ff7f130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c0000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 360.565754][T27234] FAULT_INJECTION: forcing a failure. [ 360.565754][T27234] name failslab, interval 1, probability 0, space 0, times 0 [ 360.617887][T27234] CPU: 1 PID: 27234 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 360.626648][T27234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.636710][T27234] Call Trace: [ 360.640053][T27234] dump_stack+0x197/0x210 [ 360.644401][T27234] should_fail.cold+0xa/0x15 [ 360.649003][T27234] ? release_sock+0x156/0x1c0 [ 360.653691][T27234] ? fault_create_debugfs_attr+0x180/0x180 [ 360.659525][T27234] ? ___might_sleep+0x163/0x2c0 13:58:04 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="effdffff130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c0000", 0x17}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 360.664399][T27234] __should_failslab+0x121/0x190 [ 360.669350][T27234] should_failslab+0x9/0x14 [ 360.673857][T27234] kmem_cache_alloc_node+0x268/0x740 [ 360.679164][T27234] __alloc_skb+0xd5/0x5e0 [ 360.683505][T27234] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 360.689059][T27234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.695307][T27234] ? netlink_autobind.isra.0+0x223/0x300 [ 360.700951][T27234] netlink_sendmsg+0xa1b/0xea0 [ 360.705732][T27234] ? netlink_unicast+0x7d0/0x7d0 [ 360.710673][T27234] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 360.716234][T27234] ? apparmor_socket_sendmsg+0x2a/0x30 [ 360.721699][T27234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.727974][T27234] ? security_socket_sendmsg+0x8d/0xc0 [ 360.733440][T27234] ? netlink_unicast+0x7d0/0x7d0 [ 360.738387][T27234] sock_sendmsg+0xd7/0x130 [ 360.742810][T27234] ____sys_sendmsg+0x753/0x880 [ 360.747587][T27234] ? kernel_sendmsg+0x50/0x50 [ 360.752268][T27234] ? __fget+0x35d/0x550 [ 360.756426][T27234] ? find_held_lock+0x35/0x130 [ 360.761211][T27234] ___sys_sendmsg+0x100/0x170 13:58:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000000f0081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 360.765913][T27234] ? sendmsg_copy_msghdr+0x70/0x70 [ 360.771028][T27234] ? __kasan_check_read+0x11/0x20 [ 360.776060][T27234] ? __fget+0x37f/0x550 [ 360.780227][T27234] ? ksys_dup3+0x3e0/0x3e0 [ 360.784659][T27234] ? __fget_light+0x1a9/0x230 [ 360.789344][T27234] ? __fdget+0x1b/0x20 [ 360.793419][T27234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 360.799700][T27234] __sys_sendmsg+0x105/0x1d0 [ 360.804300][T27234] ? __sys_sendmsg_sock+0xc0/0xc0 [ 360.809370][T27234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.814835][T27234] ? do_syscall_64+0x26/0x790 [ 360.819516][T27234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.825851][T27234] ? do_syscall_64+0x26/0x790 [ 360.830537][T27234] __x64_sys_sendmsg+0x78/0xb0 [ 360.835334][T27234] do_syscall_64+0xfa/0x790 [ 360.839852][T27234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.845749][T27234] RIP: 0033:0x45a909 13:58:04 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 360.849658][T27234] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.869399][T27234] RSP: 002b:00007f52ff603c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.877827][T27234] RAX: ffffffffffffffda RBX: 00007f52ff603c90 RCX: 000000000045a909 [ 360.885807][T27234] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 360.893787][T27234] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 360.901771][T27234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52ff6046d4 [ 360.909766][T27234] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000004 [ 361.217017][T27254] device nr0 entered promiscuous mode 13:58:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:05 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e020000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:05 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r2, 0x12) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) 13:58:05 executing program 5 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e030000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 361.703489][T27274] FAULT_INJECTION: forcing a failure. [ 361.703489][T27274] name failslab, interval 1, probability 0, space 0, times 0 [ 361.753743][T27274] CPU: 1 PID: 27274 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 361.762467][T27274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.772518][T27274] Call Trace: [ 361.772544][T27274] dump_stack+0x197/0x210 [ 361.772568][T27274] should_fail.cold+0xa/0x15 [ 361.784738][T27274] ? fault_create_debugfs_attr+0x180/0x180 [ 361.784760][T27274] ? ___might_sleep+0x163/0x2c0 [ 361.784783][T27274] __should_failslab+0x121/0x190 [ 361.800345][T27274] should_failslab+0x9/0x14 [ 361.804857][T27274] kmem_cache_alloc_node_trace+0x274/0x750 [ 361.810672][T27274] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 361.810688][T27274] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 361.810709][T27274] __kmalloc_node_track_caller+0x3d/0x70 [ 361.810726][T27274] __kmalloc_reserve.isra.0+0x40/0xf0 [ 361.810745][T27274] __alloc_skb+0x10b/0x5e0 [ 361.822509][T27274] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 361.822531][T27274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 361.843436][T27274] ? netlink_autobind.isra.0+0x223/0x300 [ 361.843456][T27274] netlink_sendmsg+0xa1b/0xea0 [ 361.843480][T27274] ? netlink_unicast+0x7d0/0x7d0 [ 361.843497][T27274] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 361.843514][T27274] ? apparmor_socket_sendmsg+0x2a/0x30 [ 361.843534][T27274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 361.860127][T27274] ? security_socket_sendmsg+0x8d/0xc0 [ 361.860146][T27274] ? netlink_unicast+0x7d0/0x7d0 [ 361.860162][T27274] sock_sendmsg+0xd7/0x130 [ 361.860181][T27274] ____sys_sendmsg+0x753/0x880 [ 361.870645][T27274] ? kernel_sendmsg+0x50/0x50 [ 361.882313][T27274] ? __fget+0x35d/0x550 [ 361.892663][T27274] ? find_held_lock+0x35/0x130 [ 361.892690][T27274] ___sys_sendmsg+0x100/0x170 [ 361.892722][T27274] ? sendmsg_copy_msghdr+0x70/0x70 [ 361.901851][T27274] ? __kasan_check_read+0x11/0x20 [ 361.901871][T27274] ? __fget+0x37f/0x550 [ 361.901892][T27274] ? ksys_dup3+0x3e0/0x3e0 [ 361.901916][T27274] ? __fget_light+0x1a9/0x230 [ 361.901930][T27274] ? __fdget+0x1b/0x20 [ 361.901950][T27274] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 13:58:05 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) unlink(&(0x7f0000000000)='./file0\x00') 13:58:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 361.910764][T27274] __sys_sendmsg+0x105/0x1d0 [ 361.910782][T27274] ? __sys_sendmsg_sock+0xc0/0xc0 [ 361.910812][T27274] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 361.910827][T27274] ? do_syscall_64+0x26/0x790 [ 361.910840][T27274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.910857][T27274] ? do_syscall_64+0x26/0x790 [ 361.984498][T27274] __x64_sys_sendmsg+0x78/0xb0 [ 361.989265][T27274] do_syscall_64+0xfa/0x790 [ 361.993765][T27274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.993777][T27274] RIP: 0033:0x45a909 [ 361.993792][T27274] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.993799][T27274] RSP: 002b:00007f52ff603c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 361.993817][T27274] RAX: ffffffffffffffda RBX: 00007f52ff603c90 RCX: 000000000045a909 [ 362.039533][T27274] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 13:58:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0", 0x23}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 362.047512][T27274] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 362.055629][T27274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52ff6046d4 [ 362.063600][T27274] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000004 13:58:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e040000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:06 executing program 5 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e060000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\xfc', 0x248800) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'lapb0\x00', @remote}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) [ 362.462953][T27308] FAULT_INJECTION: forcing a failure. [ 362.462953][T27308] name failslab, interval 1, probability 0, space 0, times 0 13:58:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0a0000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 362.565546][T27308] CPU: 1 PID: 27308 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 362.574278][T27308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.584346][T27308] Call Trace: [ 362.587657][T27308] dump_stack+0x197/0x210 [ 362.592011][T27308] should_fail.cold+0xa/0x15 [ 362.592031][T27308] ? fault_create_debugfs_attr+0x180/0x180 [ 362.592060][T27308] __should_failslab+0x121/0x190 [ 362.592076][T27308] should_failslab+0x9/0x14 13:58:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006", 0x29}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 362.592093][T27308] kmem_cache_alloc+0x47/0x710 [ 362.611898][T27308] ? lock_acquire+0x190/0x410 [ 362.611918][T27308] ? netlink_deliver_tap+0x146/0xbe0 [ 362.611940][T27308] skb_clone+0x154/0x3d0 [ 362.630992][T27308] netlink_deliver_tap+0x943/0xbe0 [ 362.636121][T27308] netlink_unicast+0x643/0x7d0 [ 362.636144][T27308] ? netlink_attachskb+0x870/0x870 [ 362.636165][T27308] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 362.651717][T27308] ? __check_object_size+0x3d/0x437 [ 362.656934][T27308] netlink_sendmsg+0x91c/0xea0 [ 362.661715][T27308] ? netlink_unicast+0x7d0/0x7d0 [ 362.661733][T27308] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 362.661753][T27308] ? apparmor_socket_sendmsg+0x2a/0x30 [ 362.680522][T27308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.680539][T27308] ? security_socket_sendmsg+0x8d/0xc0 [ 362.680557][T27308] ? netlink_unicast+0x7d0/0x7d0 [ 362.680575][T27308] sock_sendmsg+0xd7/0x130 [ 362.680591][T27308] ____sys_sendmsg+0x753/0x880 [ 362.680610][T27308] ? kernel_sendmsg+0x50/0x50 [ 362.680623][T27308] ? __fget+0x35d/0x550 [ 362.680640][T27308] ? find_held_lock+0x35/0x130 [ 362.702093][T27308] ___sys_sendmsg+0x100/0x170 [ 362.702115][T27308] ? sendmsg_copy_msghdr+0x70/0x70 [ 362.702131][T27308] ? __kasan_check_read+0x11/0x20 [ 362.702149][T27308] ? __fget+0x37f/0x550 [ 362.702170][T27308] ? ksys_dup3+0x3e0/0x3e0 [ 362.702189][T27308] ? __fget_light+0x1a9/0x230 [ 362.702206][T27308] ? __fdget+0x1b/0x20 [ 362.711637][T27308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 362.711660][T27308] __sys_sendmsg+0x105/0x1d0 13:58:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) [ 362.711678][T27308] ? __sys_sendmsg_sock+0xc0/0xc0 [ 362.711708][T27308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.711723][T27308] ? do_syscall_64+0x26/0x790 [ 362.711738][T27308] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.711750][T27308] ? do_syscall_64+0x26/0x790 [ 362.711774][T27308] __x64_sys_sendmsg+0x78/0xb0 [ 362.720682][T27308] do_syscall_64+0xfa/0x790 [ 362.720703][T27308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.720715][T27308] RIP: 0033:0x45a909 [ 362.720731][T27308] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.720739][T27308] RSP: 002b:00007f52ff603c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 362.720754][T27308] RAX: ffffffffffffffda RBX: 00007f52ff603c90 RCX: 000000000045a909 [ 362.720762][T27308] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 362.720770][T27308] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 362.720778][T27308] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52ff6046d4 [ 362.720787][T27308] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000004 [ 362.885573][T27308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) 13:58:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0c0000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:07 executing program 5 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:07 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) 13:58:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) 13:58:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0e0000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:07 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 363.298835][T27356] FAULT_INJECTION: forcing a failure. [ 363.298835][T27356] name failslab, interval 1, probability 0, space 0, times 0 13:58:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0f0000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 363.377266][T27356] CPU: 0 PID: 27356 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 363.385997][T27356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.396053][T27356] Call Trace: [ 363.399343][T27356] dump_stack+0x197/0x210 [ 363.403685][T27356] should_fail.cold+0xa/0x15 [ 363.408302][T27356] ? fault_create_debugfs_attr+0x180/0x180 [ 363.414253][T27356] ? ___might_sleep+0x163/0x2c0 [ 363.419119][T27356] __should_failslab+0x121/0x190 [ 363.424075][T27356] should_failslab+0x9/0x14 [ 363.428585][T27356] __kmalloc+0x2e0/0x770 [ 363.432881][T27356] ? dev_set_alias+0x60/0x220 [ 363.437571][T27356] dev_set_alias+0x60/0x220 [ 363.442108][T27356] do_setlink+0x849/0x3720 [ 363.446538][T27356] ? __kernel_text_address+0xd/0x40 [ 363.451739][T27356] ? unwind_get_return_address+0x61/0xa0 [ 363.457384][T27356] ? rtnl_getlink+0xb40/0xb40 [ 363.462080][T27356] ? stack_trace_save+0xac/0xe0 [ 363.466962][T27356] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 363.472862][T27356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.479110][T27356] ? __nla_validate_parse+0x2d0/0x1ee0 [ 363.484574][T27356] ? mark_lock+0xc2/0x1220 [ 363.489008][T27356] ? nla_memcpy+0xb0/0xb0 [ 363.493337][T27356] ? __kasan_check_read+0x11/0x20 [ 363.498358][T27356] ? __nla_parse+0x43/0x60 [ 363.502790][T27356] rtnl_setlink+0x27a/0x3f0 [ 363.507293][T27356] ? do_setlink+0x3720/0x3720 [ 363.512019][T27356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.518362][T27356] ? do_setlink+0x3720/0x3720 [ 363.523064][T27356] rtnetlink_rcv_msg+0x45e/0xaf0 [ 363.527998][T27356] ? rtnl_bridge_getlink+0x910/0x910 [ 363.533281][T27356] ? netlink_deliver_tap+0x228/0xbe0 [ 363.538659][T27356] ? find_held_lock+0x35/0x130 [ 363.543430][T27356] netlink_rcv_skb+0x177/0x450 [ 363.548216][T27356] ? rtnl_bridge_getlink+0x910/0x910 [ 363.553854][T27356] ? netlink_ack+0xb50/0xb50 [ 363.558452][T27356] ? __kasan_check_read+0x11/0x20 [ 363.563475][T27356] ? netlink_deliver_tap+0x24a/0xbe0 [ 363.568756][T27356] rtnetlink_rcv+0x1d/0x30 [ 363.573157][T27356] netlink_unicast+0x58c/0x7d0 [ 363.577907][T27356] ? netlink_attachskb+0x870/0x870 [ 363.583015][T27356] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 363.588751][T27356] ? __check_object_size+0x3d/0x437 [ 363.593945][T27356] netlink_sendmsg+0x91c/0xea0 [ 363.598710][T27356] ? netlink_unicast+0x7d0/0x7d0 [ 363.603651][T27356] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 363.609192][T27356] ? apparmor_socket_sendmsg+0x2a/0x30 [ 363.614634][T27356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.620864][T27356] ? security_socket_sendmsg+0x8d/0xc0 [ 363.626322][T27356] ? netlink_unicast+0x7d0/0x7d0 [ 363.631270][T27356] sock_sendmsg+0xd7/0x130 [ 363.635681][T27356] ____sys_sendmsg+0x753/0x880 [ 363.640448][T27356] ? kernel_sendmsg+0x50/0x50 [ 363.645118][T27356] ? __fget+0x35d/0x550 [ 363.649838][T27356] ? find_held_lock+0x35/0x130 [ 363.654613][T27356] ___sys_sendmsg+0x100/0x170 [ 363.659276][T27356] ? sendmsg_copy_msghdr+0x70/0x70 [ 363.664370][T27356] ? __kasan_check_read+0x11/0x20 [ 363.669379][T27356] ? __fget+0x37f/0x550 [ 363.673534][T27356] ? ksys_dup3+0x3e0/0x3e0 [ 363.677952][T27356] ? __fget_light+0x1a9/0x230 [ 363.682626][T27356] ? __fdget+0x1b/0x20 [ 363.686703][T27356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.692954][T27356] __sys_sendmsg+0x105/0x1d0 [ 363.697529][T27356] ? __sys_sendmsg_sock+0xc0/0xc0 [ 363.702595][T27356] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.708055][T27356] ? do_syscall_64+0x26/0x790 [ 363.712726][T27356] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.718787][T27356] ? do_syscall_64+0x26/0x790 [ 363.723476][T27356] __x64_sys_sendmsg+0x78/0xb0 [ 363.728251][T27356] do_syscall_64+0xfa/0x790 [ 363.732926][T27356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.738809][T27356] RIP: 0033:0x45a909 [ 363.742746][T27356] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.763204][T27356] RSP: 002b:00007f52ff603c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 13:58:07 executing program 5 (fault-call:1 fault-nth:4): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 363.771619][T27356] RAX: ffffffffffffffda RBX: 00007f52ff603c90 RCX: 000000000045a909 [ 363.779584][T27356] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 363.787546][T27356] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 363.795513][T27356] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52ff6046d4 [ 363.803473][T27356] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000004 13:58:07 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400", 0x2c}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e100000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 363.990111][T27380] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 364.036433][T27380] FAULT_INJECTION: forcing a failure. [ 364.036433][T27380] name failslab, interval 1, probability 0, space 0, times 0 [ 364.066377][T27380] CPU: 0 PID: 27380 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 364.075205][T27380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.085352][T27380] Call Trace: [ 364.088660][T27380] dump_stack+0x197/0x210 [ 364.093010][T27380] should_fail.cold+0xa/0x15 [ 364.097620][T27380] ? fault_create_debugfs_attr+0x180/0x180 [ 364.103443][T27380] ? ___might_sleep+0x163/0x2c0 [ 364.108362][T27380] __should_failslab+0x121/0x190 [ 364.113384][T27380] should_failslab+0x9/0x14 [ 364.117889][T27380] kmem_cache_alloc_node+0x268/0x740 [ 364.123191][T27380] __alloc_skb+0xd5/0x5e0 [ 364.127515][T27380] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 364.133060][T27380] ? if_nlmsg_size+0x54a/0xa80 [ 364.137810][T27380] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 364.143095][T27380] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 364.148988][T27380] rtmsg_ifinfo+0x8d/0xa0 [ 364.153302][T27380] netdev_state_change+0x121/0x140 [ 364.158395][T27380] ? netdev_notify_peers+0xc0/0xc0 [ 364.163506][T27380] ? dev_change_flags+0x112/0x170 [ 364.168538][T27380] do_setlink+0x166a/0x3720 [ 364.173037][T27380] ? __kernel_text_address+0xd/0x40 [ 364.178218][T27380] ? unwind_get_return_address+0x61/0xa0 [ 364.183850][T27380] ? rtnl_getlink+0xb40/0xb40 [ 364.188531][T27380] ? stack_trace_save+0xac/0xe0 [ 364.193383][T27380] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 364.199367][T27380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.205594][T27380] ? __nla_validate_parse+0x2d0/0x1ee0 [ 364.211050][T27380] ? mark_lock+0xc2/0x1220 [ 364.215483][T27380] ? nla_memcpy+0xb0/0xb0 [ 364.219800][T27380] ? __kasan_check_read+0x11/0x20 [ 364.224920][T27380] ? __nla_parse+0x43/0x60 [ 364.229398][T27380] rtnl_setlink+0x27a/0x3f0 [ 364.233983][T27380] ? do_setlink+0x3720/0x3720 [ 364.238687][T27380] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.244911][T27380] ? do_setlink+0x3720/0x3720 [ 364.249813][T27380] rtnetlink_rcv_msg+0x45e/0xaf0 [ 364.254743][T27380] ? rtnl_bridge_getlink+0x910/0x910 [ 364.260196][T27380] ? netlink_deliver_tap+0x228/0xbe0 [ 364.265491][T27380] ? find_held_lock+0x35/0x130 [ 364.270282][T27380] netlink_rcv_skb+0x177/0x450 [ 364.275044][T27380] ? rtnl_bridge_getlink+0x910/0x910 [ 364.280468][T27380] ? netlink_ack+0xb50/0xb50 [ 364.285115][T27380] ? __kasan_check_read+0x11/0x20 [ 364.290142][T27380] ? netlink_deliver_tap+0x24a/0xbe0 [ 364.295430][T27380] rtnetlink_rcv+0x1d/0x30 [ 364.299833][T27380] netlink_unicast+0x58c/0x7d0 [ 364.304597][T27380] ? netlink_attachskb+0x870/0x870 [ 364.309698][T27380] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 364.315408][T27380] ? __check_object_size+0x3d/0x437 [ 364.320609][T27380] netlink_sendmsg+0x91c/0xea0 [ 364.325370][T27380] ? netlink_unicast+0x7d0/0x7d0 [ 364.330308][T27380] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 364.335949][T27380] ? apparmor_socket_sendmsg+0x2a/0x30 [ 364.341558][T27380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.347796][T27380] ? security_socket_sendmsg+0x8d/0xc0 [ 364.353358][T27380] ? netlink_unicast+0x7d0/0x7d0 [ 364.358281][T27380] sock_sendmsg+0xd7/0x130 [ 364.362931][T27380] ____sys_sendmsg+0x753/0x880 [ 364.367693][T27380] ? kernel_sendmsg+0x50/0x50 [ 364.372356][T27380] ? __fget+0x35d/0x550 [ 364.376524][T27380] ? find_held_lock+0x35/0x130 [ 364.381383][T27380] ___sys_sendmsg+0x100/0x170 [ 364.386059][T27380] ? sendmsg_copy_msghdr+0x70/0x70 [ 364.391171][T27380] ? __kasan_check_read+0x11/0x20 [ 364.396208][T27380] ? __fget+0x37f/0x550 [ 364.400365][T27380] ? ksys_dup3+0x3e0/0x3e0 [ 364.404781][T27380] ? __fget_light+0x1a9/0x230 [ 364.409439][T27380] ? __fdget+0x1b/0x20 [ 364.413492][T27380] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.419716][T27380] __sys_sendmsg+0x105/0x1d0 [ 364.424290][T27380] ? __sys_sendmsg_sock+0xc0/0xc0 [ 364.429302][T27380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 364.434745][T27380] ? do_syscall_64+0x26/0x790 [ 364.439403][T27380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.445453][T27380] ? do_syscall_64+0x26/0x790 [ 364.450530][T27380] __x64_sys_sendmsg+0x78/0xb0 [ 364.455288][T27380] do_syscall_64+0xfa/0x790 [ 364.462219][T27380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.468109][T27380] RIP: 0033:0x45a909 [ 364.472002][T27380] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.491599][T27380] RSP: 002b:00007f52ff603c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.500013][T27380] RAX: ffffffffffffffda RBX: 00007f52ff603c90 RCX: 000000000045a909 [ 364.508010][T27380] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 364.515964][T27380] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 364.523925][T27380] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52ff6046d4 [ 364.531914][T27380] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000004 13:58:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:08 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:58:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e600000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:08 executing program 5 (fault-call:1 fault-nth:5): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2ef00000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 364.806657][T27408] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 364.817579][T27408] FAULT_INJECTION: forcing a failure. [ 364.817579][T27408] name failslab, interval 1, probability 0, space 0, times 0 [ 364.846196][T27408] CPU: 1 PID: 27408 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 364.854901][T27408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.864959][T27408] Call Trace: [ 364.868268][T27408] dump_stack+0x197/0x210 [ 364.872607][T27408] should_fail.cold+0xa/0x15 [ 364.877235][T27408] ? fault_create_debugfs_attr+0x180/0x180 [ 364.883057][T27408] ? ___might_sleep+0x163/0x2c0 [ 364.887927][T27408] __should_failslab+0x121/0x190 [ 364.892977][T27408] should_failslab+0x9/0x14 [ 364.897523][T27408] kmem_cache_alloc_node_trace+0x274/0x750 [ 364.903314][T27408] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 364.909315][T27408] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 364.915136][T27408] __kmalloc_node_track_caller+0x3d/0x70 [ 364.920770][T27408] __kmalloc_reserve.isra.0+0x40/0xf0 [ 364.926132][T27408] __alloc_skb+0x10b/0x5e0 [ 364.930632][T27408] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 364.936186][T27408] ? if_nlmsg_size+0x54a/0xa80 [ 364.940963][T27408] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 364.946268][T27408] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 364.951716][T27408] rtmsg_ifinfo+0x8d/0xa0 [ 364.956141][T27408] netdev_state_change+0x121/0x140 [ 364.961249][T27408] ? netdev_notify_peers+0xc0/0xc0 [ 364.966346][T27408] ? dev_change_flags+0x112/0x170 [ 364.971357][T27408] do_setlink+0x166a/0x3720 [ 364.975884][T27408] ? __kernel_text_address+0xd/0x40 [ 364.981067][T27408] ? unwind_get_return_address+0x61/0xa0 [ 364.986683][T27408] ? rtnl_getlink+0xb40/0xb40 [ 364.991359][T27408] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 364.997259][T27408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.003491][T27408] ? __nla_validate_parse+0x2d0/0x1ee0 [ 365.008947][T27408] ? nla_memcpy+0xb0/0xb0 [ 365.013263][T27408] ? __kasan_check_read+0x11/0x20 [ 365.018270][T27408] ? __nla_parse+0x43/0x60 [ 365.022686][T27408] rtnl_setlink+0x27a/0x3f0 [ 365.027175][T27408] ? do_setlink+0x3720/0x3720 [ 365.032096][T27408] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 365.038341][T27408] ? do_setlink+0x3720/0x3720 [ 365.043010][T27408] rtnetlink_rcv_msg+0x45e/0xaf0 [ 365.048062][T27408] ? rtnl_bridge_getlink+0x910/0x910 [ 365.053351][T27408] ? netlink_deliver_tap+0x228/0xbe0 [ 365.058642][T27408] ? find_held_lock+0x35/0x130 [ 365.063403][T27408] netlink_rcv_skb+0x177/0x450 [ 365.068157][T27408] ? rtnl_bridge_getlink+0x910/0x910 [ 365.073432][T27408] ? netlink_ack+0xb50/0xb50 [ 365.078013][T27408] ? __kasan_check_read+0x11/0x20 [ 365.083055][T27408] ? netlink_deliver_tap+0x24a/0xbe0 [ 365.088335][T27408] rtnetlink_rcv+0x1d/0x30 [ 365.092735][T27408] netlink_unicast+0x58c/0x7d0 [ 365.097637][T27408] ? netlink_attachskb+0x870/0x870 [ 365.102838][T27408] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 365.108545][T27408] ? __check_object_size+0x3d/0x437 [ 365.113981][T27408] netlink_sendmsg+0x91c/0xea0 [ 365.118798][T27408] ? netlink_unicast+0x7d0/0x7d0 [ 365.123764][T27408] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 365.129349][T27408] ? apparmor_socket_sendmsg+0x2a/0x30 [ 365.134852][T27408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 365.141080][T27408] ? security_socket_sendmsg+0x8d/0xc0 [ 365.146530][T27408] ? netlink_unicast+0x7d0/0x7d0 [ 365.151454][T27408] sock_sendmsg+0xd7/0x130 [ 365.155970][T27408] ____sys_sendmsg+0x753/0x880 [ 365.160723][T27408] ? kernel_sendmsg+0x50/0x50 [ 365.165510][T27408] ? __fget+0x35d/0x550 [ 365.169758][T27408] ? find_held_lock+0x35/0x130 [ 365.174534][T27408] ___sys_sendmsg+0x100/0x170 [ 365.179317][T27408] ? sendmsg_copy_msghdr+0x70/0x70 [ 365.184433][T27408] ? __kasan_check_read+0x11/0x20 [ 365.189500][T27408] ? __fget+0x37f/0x550 [ 365.193650][T27408] ? ksys_dup3+0x3e0/0x3e0 [ 365.198251][T27408] ? __fget_light+0x1a9/0x230 [ 365.202918][T27408] ? __fdget+0x1b/0x20 [ 365.206975][T27408] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 365.213217][T27408] __sys_sendmsg+0x105/0x1d0 [ 365.217807][T27408] ? __sys_sendmsg_sock+0xc0/0xc0 [ 365.222830][T27408] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 365.228294][T27408] ? do_syscall_64+0x26/0x790 [ 365.232996][T27408] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.239062][T27408] ? do_syscall_64+0x26/0x790 [ 365.243730][T27408] __x64_sys_sendmsg+0x78/0xb0 [ 365.248477][T27408] do_syscall_64+0xfa/0x790 [ 365.252978][T27408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.258865][T27408] RIP: 0033:0x45a909 [ 365.262766][T27408] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 365.282457][T27408] RSP: 002b:00007f52ff603c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.290855][T27408] RAX: ffffffffffffffda RBX: 00007f52ff603c90 RCX: 000000000045a909 [ 365.298815][T27408] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 365.306778][T27408] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 365.314745][T27408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52ff6046d4 [ 365.322723][T27408] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000004 13:58:09 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:09 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e0", 0x2d}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:09 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={r3, r3, 0x0, 0x7}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\xfc', 0x248800) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x9, 0x8, 0x8, 0x6, 0x0, 0x8, 0x1070, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x6, 0x2}, 0x40d, 0x1fa, 0x5, 0x8, 0xffffffffffff23dd, 0x5, 0x45}, r1, 0x5, r4, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, r3, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\xfc', 0x248800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x3}, 0x0, 0x0, &(0x7f0000000800)={0x3, 0x0, 0x4, 0xe9}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x7}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x39d000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='./cgroup/syz0\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r5, 0x0, 0x35, &(0x7f0000000000)='GPL\\[security&]vboxnet1md5sum/\'.\xd3vboxnet0eth0)vmnet1\x00', r6}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000200)='cpu.stat\x00', 0x7a05, 0x1700) write$cgroup_type(r9, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$TUNSETFILTEREBPF(r7, 0x800454e1, &(0x7f0000000340)) openat$cgroup_ro(r9, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10000000, 0xffffffffffffffff, 0x0) close(r10) 13:58:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000300130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:09 executing program 5 (fault-call:1 fault-nth:6): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:09 executing program 3: socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="87", 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='\b\x00', 0x1430c2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="3cd1c555f4b61a028704038157"], 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000f080)={&(0x7f000000de40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002980)=[{&(0x7f00000016c0)=""/46, 0x2e}, {&(0x7f0000001700)=""/169, 0xa9}, {&(0x7f00000017c0)=""/111, 0x6f}, {0x0}, {&(0x7f0000002840)=""/27, 0x1b}, {&(0x7f0000002880)=""/225, 0xe1}], 0x6, &(0x7f0000002a00)=""/48, 0x30}, 0x2000) bpf$MAP_CREATE(0x0, &(0x7f0000002a80)={0x0, 0x3a, 0x0, 0x9, 0x4, 0xffffffffffffffff, 0x1, [], r6, 0xffffffffffffffff, 0x4}, 0x3c) socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="87", 0x1}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x0, 0x3, 0x10, 0x1, 0x0, [], r9, r8}, 0x415) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x5, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3612ee43fe38d9a1, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x8001, 0x0, 0x0, 0x40f00, 0x2, [], r9, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x1, 0x9c6, 0x4}, 0x10, r10}, 0x78) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r10, 0x4) r12 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r13, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x3, 0x9, 0x80000000, 0xdc}, &(0x7f00000044c0)=0x1b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=0x4}}, 0x10) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='\b\x00', 0x1430c2, 0x0) write$cgroup_subtree(r15, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r16, 0x0, 0x0) write$cgroup_subtree(r16, &(0x7f0000000000)=ANY=[@ANYBLOB="3cd1c555f4b61a028704038157"], 0x1) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r17, 0x0, 0x0) write$cgroup_subtree(r17, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000f080)={&(0x7f000000de40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000380)=ANY=[@ANYRESOCT=r15], &(0x7f0000001a40)='syzkaller\x00', 0x80, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000001a80), 0x10}, 0x78) r20 = bpf$PROG_LOAD(0x5, &(0x7f00000047c0)={0x1, 0xd, &(0x7f0000004640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xae5, 0x0, 0x0, 0x0, 0x1}, [@func, @map={0x18, 0x1, 0x1, 0x0, r16}, @map={0x18, 0x0, 0x1, 0x0, r17}, @call={0x85, 0x0, 0x0, 0x66}, @jmp={0x5, 0x1, 0x5, 0x2, 0x6, 0x10, 0xfffffffffffffff0}, @exit, @map={0x18, 0x8}]}, &(0x7f0000004700)='GPL\x00', 0xfffffff8, 0x0, 0x0, 0x40f00, 0x2, [], r18, 0x2, r7, 0x8, &(0x7f0000004740)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004780)={0x5, 0xa, 0x6, 0xffffad2c}, 0x10, 0x0, r19}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x0, 0x0, &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, r11, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000043c0)={0x1, 0xe, 0x0, 0xd3de}, 0x10, r14, r20}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0xfff, 0x19, &(0x7f0000000240)=""/25, 0x0, 0x1, [], r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xa, 0xe8, 0x200}, 0x10, r14}, 0x78) r21 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000380)=ANY=[@ANYRESOCT=r1], &(0x7f0000001a40)='syzkaller\x00', 0x80, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000001a80), 0x10, r14}, 0x78) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r22, &(0x7f0000000000)='threaded\xfc', 0x248800) write$cgroup_subtree(r22, &(0x7f0000000300)={[{0x2b, 'io'}, {0x2b, 'pids'}, {0x2d, 'pids'}, {0x2b, 'io'}, {0x2d, 'cpu'}, {0x2d, 'cpu'}, {0x2b, 'cpu'}, {0x5a, 'memory'}]}, 0x2b) bpf$PROG_LOAD(0x5, &(0x7f00000047c0)={0x1, 0xd, &(0x7f0000004640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xae5, 0x0, 0x0, 0x0, 0x1}, [@func, @map={0x18, 0x1, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x1, 0x0, r4}, @call={0x85, 0x0, 0x0, 0x66}, @jmp={0x5, 0x1, 0x5, 0x2, 0x6, 0x10, 0xfffffffffffffff0}, @exit, @map={0x18, 0x8}]}, &(0x7f0000004700)='GPL\x00', 0xfffffff8, 0x0, 0x0, 0x40f00, 0x2, [], r5, 0x2, r0, 0x8, &(0x7f0000004740)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004780)={0x5, 0xa, 0x6, 0xffffad2c}, 0x10, 0x0, r21}, 0x78) r23 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7ff, 0x4, 0x4, 0x2, 0xffffffffffffffff, 0x5, [], r5, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/167, 0xa7}, {&(0x7f0000000180)=""/25, 0x19}, {&(0x7f00000001c0)=""/82, 0x52}], 0x3}, 0x10000) r25 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r25, &(0x7f0000000000)='threaded\xfc', 0x248800) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x9, 0x80000001, 0x5, 0x8, r23, 0x40, [], r24, r25, 0x1, 0x5}, 0x3c) r26 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) r27 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r27) [ 365.614310][T27432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:09 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000600130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e570700130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) [ 365.934918][T27454] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:10 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000a00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:10 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0xfffffffffffffefe, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 366.221925][T27473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 366.234291][T27472] FAULT_INJECTION: forcing a failure. [ 366.234291][T27472] name failslab, interval 1, probability 0, space 0, times 0 [ 366.299164][T27472] CPU: 1 PID: 27472 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 366.307898][T27472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.317960][T27472] Call Trace: [ 366.321274][T27472] dump_stack+0x197/0x210 [ 366.325638][T27472] should_fail.cold+0xa/0x15 [ 366.330237][T27472] ? release_sock+0x156/0x1c0 [ 366.334928][T27472] ? fault_create_debugfs_attr+0x180/0x180 [ 366.340753][T27472] ? ___might_sleep+0x163/0x2c0 13:58:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000c00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:10 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) [ 366.345623][T27472] __should_failslab+0x121/0x190 [ 366.350723][T27472] should_failslab+0x9/0x14 [ 366.355345][T27472] kmem_cache_alloc_node+0x268/0x740 [ 366.360651][T27472] __alloc_skb+0xd5/0x5e0 [ 366.364991][T27472] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 366.370559][T27472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.370578][T27472] ? netlink_autobind.isra.0+0x223/0x300 [ 366.370598][T27472] netlink_sendmsg+0xa1b/0xea0 [ 366.382558][T27472] ? netlink_unicast+0x7d0/0x7d0 [ 366.382572][T27472] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 366.382590][T27472] ? apparmor_socket_sendmsg+0x2a/0x30 [ 366.382605][T27472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.382625][T27472] ? security_socket_sendmsg+0x8d/0xc0 [ 366.414931][T27472] ? netlink_unicast+0x7d0/0x7d0 [ 366.419880][T27472] sock_sendmsg+0xd7/0x130 [ 366.424305][T27472] ____sys_sendmsg+0x753/0x880 [ 366.429080][T27472] ? kernel_sendmsg+0x50/0x50 [ 366.433764][T27472] ? __fget+0x35d/0x550 [ 366.437926][T27472] ? find_held_lock+0x35/0x130 [ 366.442705][T27472] ___sys_sendmsg+0x100/0x170 [ 366.447392][T27472] ? sendmsg_copy_msghdr+0x70/0x70 [ 366.452512][T27472] ? __kasan_check_read+0x11/0x20 [ 366.457547][T27472] ? __fget+0x37f/0x550 [ 366.461714][T27472] ? ksys_dup3+0x3e0/0x3e0 [ 366.466141][T27472] ? __fget_light+0x1a9/0x230 [ 366.470824][T27472] ? __fdget+0x1b/0x20 [ 366.474902][T27472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 366.481146][T27472] __sys_sendmsg+0x105/0x1d0 [ 366.485727][T27472] ? __sys_sendmsg_sock+0xc0/0xc0 [ 366.490923][T27472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 366.496464][T27472] ? do_syscall_64+0x26/0x790 [ 366.501141][T27472] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.507187][T27472] ? do_syscall_64+0x26/0x790 [ 366.511854][T27472] __x64_sys_sendmsg+0x78/0xb0 [ 366.516629][T27472] do_syscall_64+0xfa/0x790 [ 366.521120][T27472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.526993][T27472] RIP: 0033:0x45a909 [ 366.532697][T27472] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.552290][T27472] RSP: 002b:00007fb21ddfac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 366.560685][T27472] RAX: ffffffffffffffda RBX: 00007fb21ddfac90 RCX: 000000000045a909 [ 366.568637][T27472] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 366.576589][T27472] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 366.584599][T27472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb21ddfb6d4 [ 366.592552][T27472] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:58:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000e00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:10 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000f00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:10 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r2}) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) [ 366.803803][T27499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 367.006953][T27517] FAULT_INJECTION: forcing a failure. [ 367.006953][T27517] name failslab, interval 1, probability 0, space 0, times 0 [ 367.049773][T27517] CPU: 1 PID: 27517 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 367.056748][T27505] device nr0 entered promiscuous mode [ 367.058595][T27517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.074244][T27517] Call Trace: [ 367.077526][T27517] dump_stack+0x197/0x210 [ 367.081852][T27517] should_fail.cold+0xa/0x15 [ 367.086435][T27517] ? fault_create_debugfs_attr+0x180/0x180 [ 367.092236][T27517] ? ___might_sleep+0x163/0x2c0 [ 367.097078][T27517] __should_failslab+0x121/0x190 [ 367.102001][T27517] should_failslab+0x9/0x14 [ 367.106486][T27517] kmem_cache_alloc_node_trace+0x274/0x750 [ 367.112275][T27517] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 367.118237][T27517] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 367.124028][T27517] __kmalloc_node_track_caller+0x3d/0x70 [ 367.129699][T27517] __kmalloc_reserve.isra.0+0x40/0xf0 [ 367.135059][T27517] __alloc_skb+0x10b/0x5e0 [ 367.139458][T27517] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 367.144988][T27517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.151212][T27517] ? netlink_autobind.isra.0+0x223/0x300 [ 367.156829][T27517] netlink_sendmsg+0xa1b/0xea0 [ 367.161604][T27517] ? netlink_unicast+0x7d0/0x7d0 [ 367.166526][T27517] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 367.172073][T27517] ? apparmor_socket_sendmsg+0x2a/0x30 [ 367.177513][T27517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.183859][T27517] ? security_socket_sendmsg+0x8d/0xc0 [ 367.189326][T27517] ? netlink_unicast+0x7d0/0x7d0 [ 367.194254][T27517] sock_sendmsg+0xd7/0x130 [ 367.198668][T27517] ____sys_sendmsg+0x753/0x880 [ 367.203425][T27517] ? kernel_sendmsg+0x50/0x50 [ 367.208110][T27517] ? __fget+0x35d/0x550 [ 367.212269][T27517] ? find_held_lock+0x35/0x130 [ 367.217027][T27517] ___sys_sendmsg+0x100/0x170 [ 367.221699][T27517] ? sendmsg_copy_msghdr+0x70/0x70 [ 367.226796][T27517] ? __kasan_check_read+0x11/0x20 [ 367.231938][T27517] ? __fget+0x37f/0x550 [ 367.236117][T27517] ? ksys_dup3+0x3e0/0x3e0 [ 367.240560][T27517] ? __fget_light+0x1a9/0x230 [ 367.245503][T27517] ? __fdget+0x1b/0x20 [ 367.249560][T27517] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 367.255794][T27517] __sys_sendmsg+0x105/0x1d0 [ 367.260397][T27517] ? __sys_sendmsg_sock+0xc0/0xc0 [ 367.265419][T27517] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 367.270860][T27517] ? do_syscall_64+0x26/0x790 [ 367.275613][T27517] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.281687][T27517] ? do_syscall_64+0x26/0x790 [ 367.286377][T27517] __x64_sys_sendmsg+0x78/0xb0 [ 367.291142][T27517] do_syscall_64+0xfa/0x790 [ 367.295636][T27517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.301514][T27517] RIP: 0033:0x45a909 [ 367.305396][T27517] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.324981][T27517] RSP: 002b:00007fb21ddd9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 367.333374][T27517] RAX: ffffffffffffffda RBX: 00007fb21ddd9c90 RCX: 000000000045a909 [ 367.341331][T27517] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 367.349285][T27517] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 367.357257][T27517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb21ddda6d4 [ 367.365313][T27517] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:58:11 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e003f00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 367.560001][T27522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:11 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0xfffffe1a, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x4840}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) [ 367.765839][T27535] FAULT_INJECTION: forcing a failure. [ 367.765839][T27535] name failslab, interval 1, probability 0, space 0, times 0 13:58:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e004000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 367.827463][T27535] CPU: 1 PID: 27535 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 367.836182][T27535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.846251][T27535] Call Trace: [ 367.849545][T27535] dump_stack+0x197/0x210 [ 367.853885][T27535] should_fail.cold+0xa/0x15 [ 367.858487][T27535] ? fault_create_debugfs_attr+0x180/0x180 [ 367.860657][T27541] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 367.864316][T27535] __should_failslab+0x121/0x190 [ 367.864339][T27535] should_failslab+0x9/0x14 [ 367.881034][T27535] kmem_cache_alloc+0x47/0x710 [ 367.885816][T27535] ? lock_acquire+0x190/0x410 [ 367.890502][T27535] ? netlink_deliver_tap+0x146/0xbe0 [ 367.895797][T27535] skb_clone+0x154/0x3d0 [ 367.900058][T27535] netlink_deliver_tap+0x943/0xbe0 [ 367.905221][T27535] netlink_unicast+0x643/0x7d0 [ 367.909997][T27535] ? netlink_attachskb+0x870/0x870 [ 367.915119][T27535] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 367.920846][T27535] ? __check_object_size+0x3d/0x437 13:58:11 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f00000008c0)={&(0x7f0000000080)=@isdn={0x22, 0x0, 0x4, 0x4a, 0x7f}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000100)="b92fef16fa8873284ed7a7e3810f8b8355bcc8485c377d668b3fdd36f2884b5f85f508ae49e6c4fd8d424542198326f989b2ef0b082e8cba71d04202aa5b0e24b26b1e91be8804a7e6b3ba3f65c922749277862b2ac73bc63404cb78340c2a6a632c2f94bce5062000b83bc4d56178393f105fcb2ea1a686409b0764f4e5f208a146542d1aa90cdd5edda1eb92a6c9eb0e33", 0x92}, {&(0x7f00000001c0)="0e119205670d606b0d28453f1d339c09784241c58e1a8e424e694822cd5a481a5da5f4ab293ff0bd13160dcf13b38e288facf0128f628513b8c967e1a1edaa85c501e63057fb9676c39f2095c8e9060735a9014d0e1c1dfc1159b4a49e3a46c8934896a558a363835dd8f1cb752a62edf3d44f071ae453fd464ab8433202", 0x7e}, {&(0x7f0000000240)="c4fbef2dd80ccba8855029e863baa59dfb199f4a305b1ec2b981e385ae54310dd8009bed7a1361321807074e24f9c66747bceb52eca7b5a594d0021635dfce57f2cf15e66e88908bcac67c716802af5a885d6ace7e5acd6b7524736f2e0d356e6b619579ced1f4f3fad28ed7fcffdccee98c362c4220da4160987549501219f1d424bb08b106d70bfd25982ab7ea1bf46e56a773886461343e893635e9f2012e9207a74bfc3b92aa4154d7777477edb587b91aee4b886f7153771bfd9c89a1ab973fa7a8e0be98354204d207b838262ca2adfb829dda6bcf24", 0xd9}, {&(0x7f0000000340)="1fb0a3ba3d717b6e797621e54156d44a9c50f9ea08090b913080a371948cfed7695db4bd9618d13eef16fb78da208d3e30a35970d61bb75c6e844fb53e2454d7669d84d49286de33b75d45ac57b816acdd271628648ab4f95f00e7b072b21b3877cf8022f2da433cb5", 0x69}, {&(0x7f00000003c0)="374e00f22c2f67428040a6bdcaf0981b0f1f8244b9c4392dc0149c470570e318cbfa197c1e77f4fa6cf8a3dbbce8551bed84847de2042d69885b5d792eed7be866130494da0e9b1e99bbd8764716cff97f909d1f55e1b256baa35a73ecbd708c9ea2b666caa5d7084e92c0e210d19c0ae380653643a318943cc8542152406e6279f4bd702bb633ad88f61d48937365622151381efc364638bfa81508e308e7941464cf74052829e5fc02ff95fdbbc58b2d64242e93b7ad9edeb4324b81ee93b97f649fb16592ed60ada8", 0xca}, {&(0x7f0000000600)="03cec4dfbcc27ae8b5695a560673b3f2e547efd6d3ec3dde6ed32ed6df94fa51b36e9e61fc5751f3a6ba5fbf0ae3575de25ebfa13e27459a65c35471f9f4278fb2c690827a81026ab3082b3e706d7fc995981e6b3808e5fe5f6235465f5fcda323339c99ae80c8d04f85cdfa08e51eee1d1b6d22f4d2a977a86c752574ad4a20e49210b969293973a9668dedaea146fed7a29abffc010621053c3bb32571d9ceb928e5b11212e57400144269e40c8fb405c597dd715861351f71022172f597412d82cffa", 0xc4}, {&(0x7f00000004c0)="8245a808d144fece4e6b7e6287ba", 0xe}, {&(0x7f0000000500)="172ab48f661c9e6d", 0x8}, {&(0x7f0000000540)="1e4a9ab8660757bbeda34dfcd0906506e004db99a5816c3558f8a27ed3f05fe7319a613b3b06", 0x26}], 0x9, &(0x7f00000007c0)=[{0xc8, 0x88, 0x7f, "0fe20c085288108d5eb56ca1173d0bed8228109f514e0e717299b0f53547f4a1ec90c368cb9b14d70054f24b9f1591a24e22596d4338e43e8b2ba1b110b8b1a6c324de46f6ccdc03194ad742c0106e838334f5bc2593172ae9d08b54b05a5eefe778ea58af01441ed5cd8d203e2c4a79f8cb5e4f68b063ca67afc95fb95b5669daebe7cd946b6b3797f3b1b94240bbcb5b32fd4f506c764ab1d1f3e0cb8e305c68fa803a0cbfc8770a20b21b61ef3a656388"}], 0xc8}, 0x10) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r2) close(r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 367.926056][T27535] netlink_sendmsg+0x91c/0xea0 [ 367.930838][T27535] ? netlink_unicast+0x7d0/0x7d0 [ 367.935940][T27535] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 367.941498][T27535] ? apparmor_socket_sendmsg+0x2a/0x30 [ 367.946974][T27535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.953214][T27535] ? security_socket_sendmsg+0x8d/0xc0 [ 367.958848][T27535] ? netlink_unicast+0x7d0/0x7d0 [ 367.963808][T27535] sock_sendmsg+0xd7/0x130 [ 367.968232][T27535] ____sys_sendmsg+0x753/0x880 [ 367.973007][T27535] ? kernel_sendmsg+0x50/0x50 13:58:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 367.977692][T27535] ? __fget+0x35d/0x550 [ 367.981846][T27535] ? find_held_lock+0x35/0x130 [ 367.986620][T27535] ___sys_sendmsg+0x100/0x170 [ 367.991300][T27535] ? sendmsg_copy_msghdr+0x70/0x70 [ 367.996422][T27535] ? __kasan_check_read+0x11/0x20 [ 368.001458][T27535] ? __fget+0x37f/0x550 [ 368.005629][T27535] ? ksys_dup3+0x3e0/0x3e0 [ 368.010061][T27535] ? __fget_light+0x1a9/0x230 [ 368.014746][T27535] ? __fdget+0x1b/0x20 [ 368.018820][T27535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 368.025069][T27535] __sys_sendmsg+0x105/0x1d0 [ 368.029773][T27535] ? __sys_sendmsg_sock+0xc0/0xc0 [ 368.035081][T27535] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 368.040551][T27535] ? do_syscall_64+0x26/0x790 [ 368.045233][T27535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.051421][T27535] ? do_syscall_64+0x26/0x790 [ 368.056120][T27535] __x64_sys_sendmsg+0x78/0xb0 [ 368.060896][T27535] do_syscall_64+0xfa/0x790 [ 368.065412][T27535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.071463][T27535] RIP: 0033:0x45a909 [ 368.075362][T27535] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 368.095401][T27535] RSP: 002b:00007fb21ddfac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 368.103810][T27535] RAX: ffffffffffffffda RBX: 00007fb21ddfac90 RCX: 000000000045a909 [ 368.111781][T27535] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 368.119749][T27535] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:58:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 368.127736][T27535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb21ddfb6d4 [ 368.135700][T27535] R13: 00000000004c99c8 R14: 00000000004e1750 R15: 0000000000000005 13:58:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e075700130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 368.199621][T27555] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 368.344535][T27559] device nr0 entered promiscuous mode [ 368.554509][T27567] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 368.565872][T27535] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:58:12 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e655800130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:12 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(r1) 13:58:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 368.783281][T27584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 368.816142][T27586] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. 13:58:12 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:13 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="0a000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 368.931960][T27591] FAULT_INJECTION: forcing a failure. [ 368.931960][T27591] name failslab, interval 1, probability 0, space 0, times 0 [ 368.988906][T27591] CPU: 1 PID: 27591 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 368.997669][T27591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.007739][T27591] Call Trace: [ 369.011046][T27591] dump_stack+0x197/0x210 [ 369.015394][T27591] should_fail.cold+0xa/0x15 [ 369.020033][T27591] ? fault_create_debugfs_attr+0x180/0x180 [ 369.025853][T27591] ? ___might_sleep+0x163/0x2c0 [ 369.030724][T27591] __should_failslab+0x121/0x190 [ 369.035683][T27591] should_failslab+0x9/0x14 [ 369.040194][T27591] kmem_cache_alloc_trace+0x2d3/0x790 [ 369.045656][T27591] htab_map_alloc+0xe3/0x11c0 [ 369.050376][T27591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.056623][T27591] ? htab_map_update_elem+0xca0/0xca0 [ 369.062073][T27591] __do_sys_bpf+0x478/0x3610 [ 369.066678][T27591] ? bpf_prog_load+0x1960/0x1960 [ 369.071803][T27591] ? __kasan_check_write+0x14/0x20 [ 369.071818][T27591] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 369.071834][T27591] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 369.071848][T27591] ? wait_for_completion+0x440/0x440 [ 369.071875][T27591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 369.082538][T27591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 369.082557][T27591] ? do_syscall_64+0x26/0x790 [ 369.109441][T27591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.115512][T27591] ? do_syscall_64+0x26/0x790 [ 369.120222][T27591] __x64_sys_bpf+0x73/0xb0 [ 369.120241][T27591] do_syscall_64+0xfa/0x790 [ 369.120260][T27591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.120275][T27591] RIP: 0033:0x45a909 [ 369.138979][T27591] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.158586][T27591] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 369.158601][T27591] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 369.158608][T27591] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:58:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e586500130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 369.158615][T27591] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 369.158623][T27591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 369.158631][T27591] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:13 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x4, 0x0) [ 369.236445][T27602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:13 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 369.486772][T27600] device nr0 entered promiscuous mode [ 369.501687][T27617] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 369.515940][T27622] FAULT_INJECTION: forcing a failure. [ 369.515940][T27622] name failslab, interval 1, probability 0, space 0, times 0 [ 369.529289][T27622] CPU: 0 PID: 27622 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 369.537985][T27622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.548142][T27622] Call Trace: [ 369.551452][T27622] dump_stack+0x197/0x210 [ 369.555797][T27622] should_fail.cold+0xa/0x15 [ 369.560510][T27622] ? fault_create_debugfs_attr+0x180/0x180 [ 369.566321][T27622] ? ___might_sleep+0x163/0x2c0 [ 369.571172][T27622] __should_failslab+0x121/0x190 [ 369.576097][T27622] should_failslab+0x9/0x14 [ 369.580598][T27622] kmem_cache_alloc_node_trace+0x274/0x750 [ 369.586398][T27622] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 369.592009][T27622] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 369.598133][T27622] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 369.603941][T27622] __kmalloc_node+0x3d/0x70 [ 369.608559][T27622] __bpf_map_area_alloc+0xbd/0xf0 [ 369.613569][T27622] bpf_map_area_alloc+0x20/0x30 [ 369.618446][T27622] htab_map_alloc+0x589/0x11c0 [ 369.623236][T27622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.629474][T27622] ? htab_map_update_elem+0xca0/0xca0 [ 369.634839][T27622] __do_sys_bpf+0x478/0x3610 [ 369.639446][T27622] ? bpf_prog_load+0x1960/0x1960 [ 369.644385][T27622] ? __kasan_check_write+0x14/0x20 [ 369.649489][T27622] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 369.655025][T27622] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 369.660312][T27622] ? wait_for_completion+0x440/0x440 [ 369.665595][T27622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 369.671827][T27622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 369.677286][T27622] ? do_syscall_64+0x26/0x790 [ 369.681957][T27622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.688015][T27622] ? do_syscall_64+0x26/0x790 [ 369.692676][T27622] __x64_sys_bpf+0x73/0xb0 [ 369.697078][T27622] do_syscall_64+0xfa/0x790 [ 369.701582][T27622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.707572][T27622] RIP: 0033:0x45a909 [ 369.711480][T27622] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:58:13 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="0f000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e008100130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 369.731078][T27622] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 369.739478][T27622] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 369.747445][T27622] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 369.755400][T27622] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 369.763360][T27622] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 369.771358][T27622] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:13 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:58:14 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 370.122357][T27642] FAULT_INJECTION: forcing a failure. [ 370.122357][T27642] name failslab, interval 1, probability 0, space 0, times 0 [ 370.136728][T27642] CPU: 1 PID: 27642 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 370.145412][T27642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.155479][T27642] Call Trace: [ 370.158774][T27642] dump_stack+0x197/0x210 [ 370.163169][T27642] should_fail.cold+0xa/0x15 [ 370.167748][T27642] ? fault_create_debugfs_attr+0x180/0x180 [ 370.173579][T27642] ? ___might_sleep+0x163/0x2c0 [ 370.178543][T27642] __should_failslab+0x121/0x190 [ 370.183474][T27642] should_failslab+0x9/0x14 [ 370.188095][T27642] kmem_cache_alloc_node_trace+0x274/0x750 [ 370.193890][T27642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.200133][T27642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.206443][T27642] ? debug_smp_processor_id+0x33/0x18a [ 370.211892][T27642] __get_vm_area_node+0x12b/0x4f0 [ 370.216900][T27642] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 370.222534][T27642] __vmalloc_node_range+0xd4/0x810 [ 370.227627][T27642] ? bpf_map_area_alloc+0x20/0x30 [ 370.232793][T27642] ? kasan_unpoison_shadow+0x35/0x50 [ 370.238122][T27642] ? bpf_map_area_alloc+0x20/0x30 [ 370.243280][T27642] __vmalloc_node_flags_caller+0x71/0x90 [ 370.248918][T27642] ? bpf_map_area_alloc+0x20/0x30 [ 370.253926][T27642] __bpf_map_area_alloc+0xde/0xf0 [ 370.258950][T27642] bpf_map_area_alloc+0x20/0x30 [ 370.263784][T27642] htab_map_alloc+0x8d3/0x11c0 [ 370.268535][T27642] ? htab_map_update_elem+0xca0/0xca0 [ 370.273902][T27642] __do_sys_bpf+0x478/0x3610 [ 370.278498][T27642] ? bpf_prog_load+0x1960/0x1960 [ 370.283430][T27642] ? __kasan_check_write+0x14/0x20 [ 370.288534][T27642] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 370.294089][T27642] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 370.299377][T27642] ? wait_for_completion+0x440/0x440 [ 370.304670][T27642] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 370.310914][T27642] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.316471][T27642] ? do_syscall_64+0x26/0x790 [ 370.321137][T27642] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.327192][T27642] ? do_syscall_64+0x26/0x790 [ 370.331864][T27642] __x64_sys_bpf+0x73/0xb0 [ 370.336267][T27642] do_syscall_64+0xfa/0x790 [ 370.340773][T27642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.346660][T27642] RIP: 0033:0x45a909 [ 370.350562][T27642] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.370188][T27642] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 370.378939][T27642] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 370.386893][T27642] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 370.394854][T27642] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 370.402816][T27642] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 370.410870][T27642] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 370.448027][T27637] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:14 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:58:14 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00f000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:14 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="10000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:14 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, r3, 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x16, 0x40, 0x1, 0x7, 0x0, 0x81, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x7f009f24cf45115d, 0x8, 0x1, 0x12f953eb0d1c5b8, 0x401, 0x8000000, 0x400}, r2, 0xc, r4, 0x6a200e043b9d587f) close(r1) write$cgroup_int(r4, &(0x7f0000000100)=0x1, 0x12) [ 370.714918][T27658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 370.737964][T27656] FAULT_INJECTION: forcing a failure. [ 370.737964][T27656] name failslab, interval 1, probability 0, space 0, times 0 [ 370.796324][T27656] CPU: 0 PID: 27656 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 370.805058][T27656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.805066][T27656] Call Trace: [ 370.805091][T27656] dump_stack+0x197/0x210 [ 370.805112][T27656] should_fail.cold+0xa/0x15 [ 370.805127][T27656] ? htab_map_alloc+0x8d3/0x11c0 [ 370.805145][T27656] ? fault_create_debugfs_attr+0x180/0x180 [ 370.805165][T27656] ? ___might_sleep+0x163/0x2c0 [ 370.805185][T27656] __should_failslab+0x121/0x190 [ 370.805203][T27656] should_failslab+0x9/0x14 [ 370.805217][T27656] kmem_cache_alloc_node+0x268/0x740 [ 370.805229][T27656] ? ___might_sleep+0x163/0x2c0 [ 370.805252][T27656] alloc_vmap_area+0x147/0x2030 [ 370.805268][T27656] ? __get_vm_area_node+0x12b/0x4f0 [ 370.805281][T27656] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 370.805303][T27656] ? purge_vmap_area_lazy+0x40/0x40 [ 370.827565][T27656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.827586][T27656] ? debug_smp_processor_id+0x33/0x18a [ 370.848110][T27656] __get_vm_area_node+0x179/0x4f0 [ 370.857873][T27656] __vmalloc_node_range+0xd4/0x810 [ 370.857887][T27656] ? bpf_map_area_alloc+0x20/0x30 [ 370.857906][T27656] ? kasan_unpoison_shadow+0x35/0x50 [ 370.867598][T27656] ? bpf_map_area_alloc+0x20/0x30 [ 370.867617][T27656] __vmalloc_node_flags_caller+0x71/0x90 [ 370.867632][T27656] ? bpf_map_area_alloc+0x20/0x30 [ 370.867651][T27656] __bpf_map_area_alloc+0xde/0xf0 [ 370.905446][T27656] bpf_map_area_alloc+0x20/0x30 [ 370.905462][T27656] htab_map_alloc+0x8d3/0x11c0 [ 370.905486][T27656] ? htab_map_update_elem+0xca0/0xca0 [ 370.951276][T27656] __do_sys_bpf+0x478/0x3610 [ 370.955854][T27656] ? bpf_prog_load+0x1960/0x1960 [ 370.960776][T27656] ? __kasan_check_write+0x14/0x20 [ 370.965870][T27656] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 370.971399][T27656] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 370.976669][T27656] ? wait_for_completion+0x440/0x440 [ 370.981942][T27656] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 370.988173][T27656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.993614][T27656] ? do_syscall_64+0x26/0x790 [ 370.998273][T27656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.004336][T27656] ? do_syscall_64+0x26/0x790 [ 371.009002][T27656] __x64_sys_bpf+0x73/0xb0 [ 371.013405][T27656] do_syscall_64+0xfa/0x790 [ 371.017898][T27656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.023790][T27656] RIP: 0033:0x45a909 [ 371.027671][T27656] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:58:15 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="1b000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 371.047261][T27656] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 371.055669][T27656] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 371.063624][T27656] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 371.071596][T27656] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 371.079553][T27656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 371.087508][T27656] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:15 executing program 1 (fault-call:2 fault-nth:4): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:15 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="25000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 371.311325][T27667] device nr0 entered promiscuous mode [ 371.352265][T27679] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 371.367611][T27681] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 371.387362][T27688] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 371.399328][T27689] FAULT_INJECTION: forcing a failure. [ 371.399328][T27689] name failslab, interval 1, probability 0, space 0, times 0 [ 371.415013][T27689] CPU: 1 PID: 27689 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 371.423738][T27689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.433794][T27689] Call Trace: [ 371.437127][T27689] dump_stack+0x197/0x210 [ 371.441489][T27689] should_fail.cold+0xa/0x15 [ 371.441507][T27689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.441526][T27689] ? fault_create_debugfs_attr+0x180/0x180 [ 371.452355][T27689] ? ___might_sleep+0x163/0x2c0 [ 371.452379][T27689] __should_failslab+0x121/0x190 [ 371.452399][T27689] should_failslab+0x9/0x14 [ 371.452412][T27689] kmem_cache_alloc_node+0x268/0x740 [ 371.452424][T27689] ? ___might_sleep+0x163/0x2c0 [ 371.452446][T27689] alloc_vmap_area+0xc8d/0x2030 [ 371.452465][T27689] ? __get_vm_area_node+0x12b/0x4f0 [ 371.492679][T27689] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 371.498431][T27689] ? purge_vmap_area_lazy+0x40/0x40 [ 371.503656][T27689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.509930][T27689] ? debug_smp_processor_id+0x33/0x18a [ 371.509959][T27689] __get_vm_area_node+0x179/0x4f0 [ 371.509980][T27689] __vmalloc_node_range+0xd4/0x810 [ 371.520561][T27689] ? bpf_map_area_alloc+0x20/0x30 [ 371.520580][T27689] ? kasan_unpoison_shadow+0x35/0x50 [ 371.520605][T27689] ? bpf_map_area_alloc+0x20/0x30 [ 371.520621][T27689] __vmalloc_node_flags_caller+0x71/0x90 [ 371.520635][T27689] ? bpf_map_area_alloc+0x20/0x30 [ 371.520651][T27689] __bpf_map_area_alloc+0xde/0xf0 [ 371.520672][T27689] bpf_map_area_alloc+0x20/0x30 [ 371.561812][T27689] htab_map_alloc+0x8d3/0x11c0 [ 371.566587][T27689] ? htab_map_update_elem+0xca0/0xca0 [ 371.571950][T27689] __do_sys_bpf+0x478/0x3610 [ 371.576529][T27689] ? bpf_prog_load+0x1960/0x1960 [ 371.581458][T27689] ? __kasan_check_write+0x14/0x20 [ 371.586555][T27689] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 371.592086][T27689] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 371.597356][T27689] ? wait_for_completion+0x440/0x440 [ 371.602626][T27689] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 371.608864][T27689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 371.614315][T27689] ? do_syscall_64+0x26/0x790 [ 371.618977][T27689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.625026][T27689] ? do_syscall_64+0x26/0x790 [ 371.629697][T27689] __x64_sys_bpf+0x73/0xb0 [ 371.634117][T27689] do_syscall_64+0xfa/0x790 [ 371.638615][T27689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.644486][T27689] RIP: 0033:0x45a909 [ 371.648379][T27689] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 371.668013][T27689] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 371.676532][T27689] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 371.684601][T27689] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 371.692568][T27689] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 371.700544][T27689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 371.708519][T27689] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:16 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x4b1f25e3f5072d1d, 0x70, 0x1, 0x1, 0x90, 0xfa, 0x0, 0xe20, 0x170, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x40, 0x4, 0x0, 0x8, 0xb0f, 0x10a, 0xfffe}, 0x0, 0x6, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0xa6, 0x5, 0x0, 0x40, 0x0, 0x1d6c00000000000, 0x8804, 0x1d, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6f4e, 0x7, @perf_bp={&(0x7f0000000000), 0x943dcfbabfbbc689}, 0x8, 0x8, 0xfff, 0x0, 0x5, 0x7}, 0x0, 0xffffffffffffffff, r2, 0x8) close(r1) 13:58:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:16 executing program 1 (fault-call:2 fault-nth:5): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000250081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="30000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 372.216432][T27702] FAULT_INJECTION: forcing a failure. [ 372.216432][T27702] name failslab, interval 1, probability 0, space 0, times 0 [ 372.218109][T27704] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 372.254945][T27703] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. 13:58:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4c, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000400081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 372.308332][T27702] CPU: 1 PID: 27702 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 372.317067][T27702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.327154][T27702] Call Trace: [ 372.330560][T27702] dump_stack+0x197/0x210 [ 372.330583][T27702] should_fail.cold+0xa/0x15 [ 372.330601][T27702] ? fault_create_debugfs_attr+0x180/0x180 [ 372.330621][T27702] ? ___might_sleep+0x163/0x2c0 [ 372.330641][T27702] __should_failslab+0x121/0x190 [ 372.330661][T27702] should_failslab+0x9/0x14 [ 372.359759][T27702] kmem_cache_alloc_node_trace+0x274/0x750 [ 372.365576][T27702] ? do_raw_spin_unlock+0x178/0x270 [ 372.370779][T27702] __kmalloc_node+0x3d/0x70 [ 372.370800][T27702] __vmalloc_node_range+0x1db/0x810 [ 372.370821][T27702] ? bpf_map_area_alloc+0x20/0x30 [ 372.370836][T27702] __vmalloc_node_flags_caller+0x71/0x90 [ 372.370847][T27702] ? bpf_map_area_alloc+0x20/0x30 [ 372.370865][T27702] __bpf_map_area_alloc+0xde/0xf0 [ 372.401212][T27702] bpf_map_area_alloc+0x20/0x30 [ 372.406081][T27702] htab_map_alloc+0x8d3/0x11c0 [ 372.410876][T27702] ? htab_map_update_elem+0xca0/0xca0 [ 372.416275][T27702] __do_sys_bpf+0x478/0x3610 [ 372.420887][T27702] ? bpf_prog_load+0x1960/0x1960 [ 372.425945][T27702] ? __kasan_check_write+0x14/0x20 [ 372.431075][T27702] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 372.436642][T27702] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 372.441946][T27702] ? wait_for_completion+0x440/0x440 [ 372.447253][T27702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 372.453528][T27702] ? trace_hardirqs_on_thunk+0x1a/0x1c 13:58:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="68000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 372.459001][T27702] ? do_syscall_64+0x26/0x790 [ 372.463683][T27702] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.463709][T27702] ? do_syscall_64+0x26/0x790 [ 372.474444][T27702] __x64_sys_bpf+0x73/0xb0 [ 372.478875][T27702] do_syscall_64+0xfa/0x790 [ 372.483391][T27702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.489287][T27702] RIP: 0033:0x45a909 [ 372.489304][T27702] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.489311][T27702] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 372.489329][T27702] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 372.505108][T27717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 372.512908][T27702] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 372.512917][T27702] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 372.512925][T27702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 372.512932][T27702] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:16 executing program 1 (fault-call:2 fault-nth:6): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:16 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1f) [ 372.682796][T27720] device nr0 entered promiscuous mode 13:58:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 372.800497][T27731] FAULT_INJECTION: forcing a failure. [ 372.800497][T27731] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 372.846022][T27731] CPU: 0 PID: 27731 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 372.854758][T27731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.864840][T27731] Call Trace: [ 372.868148][T27731] dump_stack+0x197/0x210 [ 372.872484][T27731] should_fail.cold+0xa/0x15 [ 372.877081][T27731] ? fault_create_debugfs_attr+0x180/0x180 [ 372.882881][T27731] ? ___might_sleep+0x163/0x2c0 [ 372.887734][T27731] should_fail_alloc_page+0x50/0x60 [ 372.892942][T27731] __alloc_pages_nodemask+0x1a1/0x910 [ 372.898307][T27731] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 372.903844][T27731] ? __alloc_pages_slowpath+0x2920/0x2920 [ 372.909551][T27731] ? kasan_unpoison_shadow+0x35/0x50 [ 372.914824][T27731] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 372.921117][T27731] alloc_pages_current+0x107/0x210 [ 372.926215][T27731] __vmalloc_node_range+0x4f8/0x810 [ 372.931406][T27731] ? bpf_map_area_alloc+0x20/0x30 [ 372.936432][T27731] __vmalloc_node_flags_caller+0x71/0x90 [ 372.942046][T27731] ? bpf_map_area_alloc+0x20/0x30 [ 372.947051][T27731] __bpf_map_area_alloc+0xde/0xf0 [ 372.952060][T27731] bpf_map_area_alloc+0x20/0x30 [ 372.956896][T27731] htab_map_alloc+0x8d3/0x11c0 [ 372.961654][T27731] ? htab_map_update_elem+0xca0/0xca0 [ 372.967026][T27731] __do_sys_bpf+0x478/0x3610 [ 372.971608][T27731] ? bpf_prog_load+0x1960/0x1960 [ 372.976533][T27731] ? __kasan_check_write+0x14/0x20 [ 372.981628][T27731] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 372.987161][T27731] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 372.992433][T27731] ? wait_for_completion+0x440/0x440 [ 372.997708][T27731] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 373.003939][T27731] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 373.009465][T27731] ? do_syscall_64+0x26/0x790 [ 373.014122][T27731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.020172][T27731] ? do_syscall_64+0x26/0x790 [ 373.024861][T27731] __x64_sys_bpf+0x73/0xb0 [ 373.029265][T27731] do_syscall_64+0xfa/0x790 [ 373.033756][T27731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.042594][T27731] RIP: 0033:0x45a909 [ 373.046476][T27731] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.066075][T27731] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 373.074469][T27731] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 373.082424][T27731] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 373.090430][T27731] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 373.098409][T27731] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 373.106378][T27731] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 373.296511][T27738] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:17 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="c0000000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000006f0081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x68, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:17 executing program 1 (fault-call:2 fault-nth:7): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:17 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xfc, 0x3f, 0x9, 0x8, 0x0, 0x8, 0x10000, 0xd0eb39805c26abb8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x9, @perf_config_ext={0xf315, 0x6}, 0x4000, 0x5, 0x400, 0x4, 0x71d0, 0x8, 0x3}, 0xffffffffffffffff, 0xa, r1, 0xc) close(r1) [ 373.557110][T27747] FAULT_INJECTION: forcing a failure. [ 373.557110][T27747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 373.567758][T27751] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 373.606415][T27747] CPU: 0 PID: 27747 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 373.615139][T27747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.625336][T27747] Call Trace: [ 373.628651][T27747] dump_stack+0x197/0x210 [ 373.633015][T27747] should_fail.cold+0xa/0x15 [ 373.637624][T27747] ? fault_create_debugfs_attr+0x180/0x180 [ 373.643443][T27747] ? ___might_sleep+0x163/0x2c0 [ 373.648476][T27747] should_fail_alloc_page+0x50/0x60 [ 373.653695][T27747] __alloc_pages_nodemask+0x1a1/0x910 [ 373.659088][T27747] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 373.664658][T27747] ? __alloc_pages_slowpath+0x2920/0x2920 [ 373.670438][T27747] ? kasan_unpoison_shadow+0x35/0x50 [ 373.675779][T27747] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 373.682043][T27747] alloc_pages_current+0x107/0x210 [ 373.687166][T27747] ? ___might_sleep+0x163/0x2c0 [ 373.692042][T27747] __vmalloc_node_range+0x4f8/0x810 [ 373.697261][T27747] ? bpf_map_area_alloc+0x20/0x30 [ 373.702298][T27747] __vmalloc_node_flags_caller+0x71/0x90 [ 373.707942][T27747] ? bpf_map_area_alloc+0x20/0x30 [ 373.712974][T27747] __bpf_map_area_alloc+0xde/0xf0 [ 373.718004][T27747] bpf_map_area_alloc+0x20/0x30 [ 373.722864][T27747] htab_map_alloc+0x8d3/0x11c0 [ 373.727656][T27747] ? htab_map_update_elem+0xca0/0xca0 [ 373.733034][T27747] __do_sys_bpf+0x478/0x3610 [ 373.737650][T27747] ? bpf_prog_load+0x1960/0x1960 [ 373.742605][T27747] ? __kasan_check_write+0x14/0x20 [ 373.747734][T27747] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 373.753286][T27747] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 373.758582][T27747] ? wait_for_completion+0x440/0x440 [ 373.763884][T27747] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 373.768574][T27757] device nr0 entered promiscuous mode [ 373.770157][T27747] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 373.770173][T27747] ? do_syscall_64+0x26/0x790 [ 373.770189][T27747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.770202][T27747] ? do_syscall_64+0x26/0x790 [ 373.770221][T27747] __x64_sys_bpf+0x73/0xb0 [ 373.770239][T27747] do_syscall_64+0xfa/0x790 [ 373.784132][T27762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 373.786954][T27747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.786968][T27747] RIP: 0033:0x45a909 [ 373.786984][T27747] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.786992][T27747] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:58:17 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="b3010000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6c, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000200130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000300130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:17 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="c00e0000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x74, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 373.787006][T27747] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 373.787016][T27747] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 373.787024][T27747] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 373.787032][T27747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 373.787047][T27747] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 374.231783][T27779] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:18 executing program 1 (fault-call:2 fault-nth:8): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:18 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)=""/221, 0xdd}, {&(0x7f0000000180)=""/131, 0xfffffffffffffc3e}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/121, 0x79}], 0x4}, 0x2e042) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x18}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x3, 0x7, 0x65, 0xe0, 0x0, 0x75db, 0x54508, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ef, 0x2034195202130e7b, @perf_bp={&(0x7f0000000400), 0x7}, 0x1a60, 0x1, 0x5, 0x8, 0x800, 0x6, 0xfff}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x1e) perf_event_open$cgroup(&(0x7f0000000380)={0x3, 0x70, 0xfd, 0x6, 0x7b, 0x9, 0x0, 0xffff, 0x100, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x10000, 0x9, 0x5, 0xf, 0x8, 0x9}, r3, 0xd, r4, 0x7) close(r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)=':bdevsystem#selfGPL+eth1\x00') 13:58:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000400130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:18 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="e03f0300200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7a, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 374.550775][T27797] FAULT_INJECTION: forcing a failure. [ 374.550775][T27797] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 374.558299][T27794] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 374.567251][T27797] CPU: 1 PID: 27797 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 374.580033][T27797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.590094][T27797] Call Trace: [ 374.593404][T27797] dump_stack+0x197/0x210 [ 374.597749][T27797] should_fail.cold+0xa/0x15 [ 374.602358][T27797] ? fault_create_debugfs_attr+0x180/0x180 [ 374.608223][T27797] ? ___might_sleep+0x163/0x2c0 [ 374.613104][T27797] should_fail_alloc_page+0x50/0x60 [ 374.618311][T27797] __alloc_pages_nodemask+0x1a1/0x910 [ 374.623695][T27797] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 374.623712][T27797] ? __alloc_pages_slowpath+0x2920/0x2920 [ 374.623731][T27797] ? kasan_unpoison_shadow+0x35/0x50 [ 374.640651][T27797] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 374.646899][T27797] alloc_pages_current+0x107/0x210 [ 374.646914][T27797] ? ___might_sleep+0x163/0x2c0 [ 374.646932][T27797] __vmalloc_node_range+0x4f8/0x810 [ 374.646967][T27797] ? bpf_map_area_alloc+0x20/0x30 [ 374.662115][T27797] __vmalloc_node_flags_caller+0x71/0x90 [ 374.662132][T27797] ? bpf_map_area_alloc+0x20/0x30 [ 374.662147][T27797] __bpf_map_area_alloc+0xde/0xf0 [ 374.662163][T27797] bpf_map_area_alloc+0x20/0x30 [ 374.662177][T27797] htab_map_alloc+0x8d3/0x11c0 [ 374.662201][T27797] ? htab_map_update_elem+0xca0/0xca0 [ 374.677854][T27797] __do_sys_bpf+0x478/0x3610 [ 374.677874][T27797] ? bpf_prog_load+0x1960/0x1960 [ 374.677893][T27797] ? __kasan_check_write+0x14/0x20 [ 374.692540][T27797] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 374.692558][T27797] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 374.692571][T27797] ? wait_for_completion+0x440/0x440 [ 374.692593][T27797] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 374.692620][T27797] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 374.692633][T27797] ? do_syscall_64+0x26/0x790 [ 374.692645][T27797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.692741][T27797] ? do_syscall_64+0x26/0x790 [ 374.707643][T27797] __x64_sys_bpf+0x73/0xb0 [ 374.707662][T27797] do_syscall_64+0xfa/0x790 [ 374.707683][T27797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.718339][T27797] RIP: 0033:0x45a909 [ 374.718354][T27797] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:58:18 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="6e010020200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:18 executing program 1 (fault-call:2 fault-nth:9): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 374.718362][T27797] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 374.718376][T27797] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 374.718385][T27797] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 374.718393][T27797] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 374.718401][T27797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 374.718415][T27797] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000600130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 374.936723][T27817] FAULT_INJECTION: forcing a failure. [ 374.936723][T27817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 374.987647][T27817] CPU: 1 PID: 27817 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 374.996376][T27817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.006446][T27817] Call Trace: [ 375.009758][T27817] dump_stack+0x197/0x210 [ 375.014108][T27817] should_fail.cold+0xa/0x15 [ 375.018717][T27817] ? fault_create_debugfs_attr+0x180/0x180 [ 375.024535][T27817] ? ___might_sleep+0x163/0x2c0 [ 375.028760][T27803] device nr0 entered promiscuous mode [ 375.029430][T27817] should_fail_alloc_page+0x50/0x60 [ 375.029446][T27817] __alloc_pages_nodemask+0x1a1/0x910 [ 375.029466][T27817] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 375.051237][T27817] ? __alloc_pages_slowpath+0x2920/0x2920 [ 375.057078][T27817] ? kasan_unpoison_shadow+0x35/0x50 [ 375.062355][T27817] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 375.068588][T27817] alloc_pages_current+0x107/0x210 [ 375.073687][T27817] ? ___might_sleep+0x163/0x2c0 [ 375.078603][T27817] __vmalloc_node_range+0x4f8/0x810 [ 375.083793][T27817] ? bpf_map_area_alloc+0x20/0x30 [ 375.088801][T27817] __vmalloc_node_flags_caller+0x71/0x90 [ 375.098380][T27817] ? bpf_map_area_alloc+0x20/0x30 [ 375.103475][T27817] __bpf_map_area_alloc+0xde/0xf0 [ 375.108484][T27817] bpf_map_area_alloc+0x20/0x30 [ 375.113320][T27817] htab_map_alloc+0x8d3/0x11c0 [ 375.118087][T27817] ? htab_map_update_elem+0xca0/0xca0 [ 375.123452][T27817] __do_sys_bpf+0x478/0x3610 [ 375.128034][T27817] ? bpf_prog_load+0x1960/0x1960 [ 375.132955][T27817] ? __kasan_check_write+0x14/0x20 [ 375.138045][T27817] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 375.143591][T27817] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 375.148875][T27817] ? wait_for_completion+0x440/0x440 [ 375.154177][T27817] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 375.160494][T27817] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 375.165961][T27817] ? do_syscall_64+0x26/0x790 [ 375.170626][T27817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.176829][T27817] ? do_syscall_64+0x26/0x790 [ 375.181515][T27817] __x64_sys_bpf+0x73/0xb0 [ 375.185982][T27817] do_syscall_64+0xfa/0x790 [ 375.190490][T27817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.196388][T27817] RIP: 0033:0x45a909 [ 375.200268][T27817] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 375.219882][T27817] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 375.228276][T27817] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 375.236230][T27817] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 375.244186][T27817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 375.252141][T27817] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 375.260103][T27817] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:19 executing program 1 (fault-call:2 fault-nth:10): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:19 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x3, 0x2, 0x2, {0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}}, 0x80, &(0x7f0000000600)=[{&(0x7f00000000c0)="384ca4710c59d2bc600c94fd870b7af8eba680786cbc8abce635e7332941502d898d3da6f767a283ab3204973c8954c7039ad8982935eb0e760c889e59d978e0b0bd4f7d4f30d6daa9f4732b321f4bcab63f8ff9c3fa59e506e55ad9f0a7f895e19c06194dfc10394553172f83ea6fc97a6c58956bb006aee865f1d018d47881", 0x80}, {&(0x7f0000000140)="e43a16d3801b0260637cba", 0xb}, {&(0x7f0000000180)="629edd83281007b8c00d2c8b3d38a2d648c203885c39b3b363a79996997857a192babf6a6c2298ede32a59725423059a72c98248c55bcabc72824f232fa37d9ed64c88625da6cc756542e0f7ffa881abffbec6591542c0afd954f295f8a81e5fadfc2ab84735440947fb2cd447ad564e0d11407f430bdac0d337b675a1573a42ddb597dcaab154a7500bc5b4148c8dfc1c679561faa36230eefb064a6d6202f0dc3b9e99e8f35e73bb5d2abb57879504215b95790b25ae7e0a16929e3430ab1b0a8bad78af918bc8dad1", 0xca}, {&(0x7f0000000280)="de4fab74387fbfab3c684569c45bd319d123dd94c9b056547a1781ee277c31b2d2e53b3af72e1c8a4bbf59a5d8ca", 0x2e}, {&(0x7f00000002c0)="12dd882e4b90a4323a6ec3711bb5f78afbbcda1677262b3317a431998424bee95a651659965733dde7b958eba56c86bd3efc9ca449d25a2864df4e134969426d8ec719e98db24e4361c5408940a8819b3a8e71bdda1c93aff3a6984b955053c04a0085ae2a983f12f3d11065d21136260c9a1bc1a773ba1189847dd00bd1383b6374e9c9ae09b1af37c1f565690dac0e0a1ba3", 0x93}, {&(0x7f0000000380)="b617faf9972cfaf02c4ebd70b0e51aedb8b97ff375af36946cafd7d7f02e5466", 0x20}, {&(0x7f00000003c0)="2d2d20c5db45b9a47f5b11cf9cf9d4b7a502ffcd1975b569f7bf7c98064a6cf1975dd759990126c9f62ceda53c4a67229d2d9ded9c24465ab11b3bc118f9d7264985866305867ad58013d220630799c2cce24432a4a8e844cf2d057e7b677edc2ee1eea43a01c1403b4cd4da727f1039fcff0b892c1d53caf76c2fa692676c223bd0886f8fdc4f37aa54320ff9d90911c9d01f2b1de1c464e1d3fe23a386cf5f6425a306fb5f62659c2c4e40022c9b68b3b4c4d6d289f59792c3883687d1f2c65779aafc6b8a8ec79e54da2c149552fe6caed7435ff53dd6d53d6b1174657b6ca943458898b02aace0682cb6e5c6828c", 0xf0}, {&(0x7f00000004c0)="24f999aefabc2e763f2f2f7969584867442f3d8b0f84d31ae79b9b6bea382859f40d889b08b2919b9013a7d3958adcb8746f70aff746ad575842b79e1442a3238b6d258f23e65dc14e9fdfad98109833e75bff263737ecb9d4a90c574be1a6b042bb8d1b7ef7dba84b2b88b618cce275e267d453044f5bda", 0x78}], 0x8, &(0x7f0000000680)=[{0x88, 0x105, 0x401, "cb9485afe856a3c15bdea2fd41315ec11d86fb0c7fee11634cb92161c28b71a1824f9a449962b6a29b4e33b1f4a2ec101e8fc7d6c03d23d64159fd855a1e40b2a4746b36433f994c39e994bbe45badec59df6a64b9ab1f421e168329c88a64439dad863cfa324d7ff84086cd8305f0bfca1e60"}, {0x100, 0x111, 0x0, "b81d9e42484a95b92924aad0c977bae3af7f6a590e7f42234a79be1a797b5649252a467b8ea2ad24ef6708332b2d49ec0ff17b40a541c3de958af046c5217d7acb9b9b35770e59b298ac6f9d13b8bce3ffd3cb78af07595fa00dc0cfc8530ad7fd28654020fb8afd8478026c8b8774329bda08ab4445ff3f5b1acbb08e581c3d4ac4cbf4e0c89bfe8aa48e590877f9e2479aa21908dfecd1858340aef802e958f24c9982357fd233c87397c7523f9c37429e43c1e65634076545fad43ff61cf6c4cff28e9af746b2ef1f127a7c5bbec6956b158c17f47c6f403fa4d56507e885dbc7dd92eb47d787f57c"}, {0x68, 0x104, 0x1, "9786904dc4036cab16224a3165d8efe26ea42f172b6750397f4d6c9987e56cde4575e5fd6ddee981a3526d51767207a1e0df71097ac424bb8604091ee87904738f24f4ab919e3f4b93216a20c24d5c8cb40abc"}], 0x1f0}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) [ 375.472704][T27810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 375.491234][T27827] FAULT_INJECTION: forcing a failure. [ 375.491234][T27827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 375.586544][T27827] CPU: 1 PID: 27827 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 375.595292][T27827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.605363][T27827] Call Trace: [ 375.608676][T27827] dump_stack+0x197/0x210 [ 375.613030][T27827] should_fail.cold+0xa/0x15 [ 375.617639][T27827] ? fault_create_debugfs_attr+0x180/0x180 [ 375.623477][T27827] ? ___might_sleep+0x163/0x2c0 [ 375.628356][T27827] should_fail_alloc_page+0x50/0x60 [ 375.633568][T27827] __alloc_pages_nodemask+0x1a1/0x910 [ 375.638959][T27827] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 375.644513][T27827] ? __alloc_pages_slowpath+0x2920/0x2920 [ 375.650247][T27827] ? kasan_unpoison_shadow+0x35/0x50 [ 375.655541][T27827] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 375.661797][T27827] alloc_pages_current+0x107/0x210 [ 375.666915][T27827] ? ___might_sleep+0x163/0x2c0 [ 375.671779][T27827] __vmalloc_node_range+0x4f8/0x810 [ 375.676996][T27827] ? bpf_map_area_alloc+0x20/0x30 [ 375.682030][T27827] __vmalloc_node_flags_caller+0x71/0x90 [ 375.687671][T27827] ? bpf_map_area_alloc+0x20/0x30 [ 375.692731][T27827] __bpf_map_area_alloc+0xde/0xf0 [ 375.697754][T27827] bpf_map_area_alloc+0x20/0x30 [ 375.702750][T27827] htab_map_alloc+0x8d3/0x11c0 [ 375.708162][T27827] ? htab_map_update_elem+0xca0/0xca0 [ 375.713542][T27827] __do_sys_bpf+0x478/0x3610 [ 375.718142][T27827] ? bpf_prog_load+0x1960/0x1960 [ 375.723070][T27827] ? __kasan_check_write+0x14/0x20 [ 375.728179][T27827] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 375.733715][T27827] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 375.738989][T27827] ? wait_for_completion+0x440/0x440 [ 375.744263][T27827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 375.750497][T27827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 375.755968][T27827] ? do_syscall_64+0x26/0x790 [ 375.760651][T27827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.766713][T27827] ? do_syscall_64+0x26/0x790 [ 375.771389][T27827] __x64_sys_bpf+0x73/0xb0 [ 375.775799][T27827] do_syscall_64+0xfa/0x790 [ 375.780295][T27827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.786172][T27827] RIP: 0033:0x45a909 [ 375.790152][T27827] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 375.809772][T27827] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 375.818264][T27827] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 375.826221][T27827] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 375.834200][T27827] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 375.842154][T27827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 375.850108][T27827] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:19 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="00f0ff7f200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000a00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:19 executing program 1 (fault-call:2 fault-nth:11): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000c00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 375.993810][T27841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:20 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}}, 0x0, 0x0, r1, 0x0) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cgroup_ro(r3, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) recvmsg(r4, &(0x7f0000000180)={&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000140)}, 0x2000) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) [ 376.113253][T27846] FAULT_INJECTION: forcing a failure. [ 376.113253][T27846] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:20 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="effdffff200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 376.169711][T27846] CPU: 1 PID: 27846 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 376.178554][T27846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.188623][T27846] Call Trace: [ 376.191947][T27846] dump_stack+0x197/0x210 [ 376.196312][T27846] should_fail.cold+0xa/0x15 [ 376.201280][T27846] ? fault_create_debugfs_attr+0x180/0x180 [ 376.207111][T27846] ? ___might_sleep+0x163/0x2c0 [ 376.212000][T27846] should_fail_alloc_page+0x50/0x60 [ 376.217226][T27846] __alloc_pages_nodemask+0x1a1/0x910 [ 376.222628][T27846] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 376.228186][T27846] ? __alloc_pages_slowpath+0x2920/0x2920 [ 376.233903][T27846] ? kasan_unpoison_shadow+0x35/0x50 [ 376.233919][T27846] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 376.233936][T27846] alloc_pages_current+0x107/0x210 [ 376.233950][T27846] ? ___might_sleep+0x163/0x2c0 [ 376.233968][T27846] __vmalloc_node_range+0x4f8/0x810 [ 376.233990][T27846] ? bpf_map_area_alloc+0x20/0x30 [ 376.234008][T27846] __vmalloc_node_flags_caller+0x71/0x90 [ 376.271548][T27846] ? bpf_map_area_alloc+0x20/0x30 [ 376.276598][T27846] __bpf_map_area_alloc+0xde/0xf0 [ 376.281640][T27846] bpf_map_area_alloc+0x20/0x30 [ 376.286504][T27846] htab_map_alloc+0x8d3/0x11c0 [ 376.291293][T27846] ? htab_map_update_elem+0xca0/0xca0 [ 376.296672][T27846] __do_sys_bpf+0x478/0x3610 [ 376.301287][T27846] ? bpf_prog_load+0x1960/0x1960 [ 376.306235][T27846] ? __kasan_check_write+0x14/0x20 [ 376.311356][T27846] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 376.316915][T27846] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 376.322209][T27846] ? wait_for_completion+0x440/0x440 [ 376.327513][T27846] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 376.333775][T27846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 376.339251][T27846] ? do_syscall_64+0x26/0x790 [ 376.343940][T27846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.350041][T27846] ? do_syscall_64+0x26/0x790 [ 376.354719][T27846] __x64_sys_bpf+0x73/0xb0 [ 376.359157][T27846] do_syscall_64+0xfa/0x790 [ 376.363654][T27846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.369532][T27846] RIP: 0033:0x45a909 [ 376.373411][T27846] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.393008][T27846] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 376.401403][T27846] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 376.409356][T27846] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 376.417310][T27846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.425263][T27846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 376.433217][T27846] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:20 executing program 1 (fault-call:2 fault-nth:12): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 376.503936][T27851] device nr0 entered promiscuous mode [ 376.511633][T27857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 376.637363][T27873] FAULT_INJECTION: forcing a failure. [ 376.637363][T27873] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 376.651067][T27873] CPU: 0 PID: 27873 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 376.659747][T27873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.669807][T27873] Call Trace: [ 376.673111][T27873] dump_stack+0x197/0x210 [ 376.677452][T27873] should_fail.cold+0xa/0x15 [ 376.682046][T27873] ? fault_create_debugfs_attr+0x180/0x180 [ 376.687858][T27873] ? ___might_sleep+0x163/0x2c0 [ 376.692739][T27873] should_fail_alloc_page+0x50/0x60 [ 376.697943][T27873] __alloc_pages_nodemask+0x1a1/0x910 [ 376.703348][T27873] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 376.708902][T27873] ? __alloc_pages_slowpath+0x2920/0x2920 [ 376.714638][T27873] ? kasan_unpoison_shadow+0x35/0x50 [ 376.719934][T27873] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 376.726184][T27873] alloc_pages_current+0x107/0x210 [ 376.731294][T27873] ? ___might_sleep+0x163/0x2c0 [ 376.736148][T27873] __vmalloc_node_range+0x4f8/0x810 [ 376.741360][T27873] ? bpf_map_area_alloc+0x20/0x30 [ 376.746383][T27873] __vmalloc_node_flags_caller+0x71/0x90 [ 376.752017][T27873] ? bpf_map_area_alloc+0x20/0x30 [ 376.757040][T27873] __bpf_map_area_alloc+0xde/0xf0 [ 376.762065][T27873] bpf_map_area_alloc+0x20/0x30 [ 376.766919][T27873] htab_map_alloc+0x8d3/0x11c0 [ 376.771696][T27873] ? htab_map_update_elem+0xca0/0xca0 [ 376.777070][T27873] __do_sys_bpf+0x478/0x3610 [ 376.781665][T27873] ? bpf_prog_load+0x1960/0x1960 [ 376.786592][T27873] ? __kasan_check_write+0x14/0x20 [ 376.791686][T27873] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 376.797211][T27873] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 376.802776][T27873] ? wait_for_completion+0x440/0x440 [ 376.808064][T27873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 376.814306][T27873] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 376.819883][T27873] ? do_syscall_64+0x26/0x790 [ 376.824620][T27873] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.830687][T27873] ? do_syscall_64+0x26/0x790 [ 376.835374][T27873] __x64_sys_bpf+0x73/0xb0 [ 376.839987][T27873] do_syscall_64+0xfa/0x790 [ 376.844515][T27873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.850424][T27873] RIP: 0033:0x45a909 [ 376.854362][T27873] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.873980][T27873] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 376.882398][T27873] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 376.890727][T27873] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 376.898910][T27873] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 376.906879][T27873] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 376.915057][T27873] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000e00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 376.962672][T27872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:21 executing program 1 (fault-call:2 fault-nth:13): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000000a0081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:21 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'nlmon0\x00', @local}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\xfc', 0x248800) r5 = openat$cgroup_ro(r4, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\xfc', 0x248800) mkdirat$cgroup(r5, &(0x7f0000000000)='syz1\x00', 0x1ff) 13:58:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000f00130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 377.245514][T27890] FAULT_INJECTION: forcing a failure. [ 377.245514][T27890] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 377.275509][T27890] CPU: 0 PID: 27890 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 377.284245][T27890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.294392][T27890] Call Trace: [ 377.297694][T27890] dump_stack+0x197/0x210 [ 377.302029][T27890] should_fail.cold+0xa/0x15 [ 377.302049][T27890] ? fault_create_debugfs_attr+0x180/0x180 [ 377.302067][T27890] ? ___might_sleep+0x163/0x2c0 [ 377.302094][T27890] should_fail_alloc_page+0x50/0x60 [ 377.302111][T27890] __alloc_pages_nodemask+0x1a1/0x910 [ 377.322706][T27890] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 377.322725][T27890] ? __alloc_pages_slowpath+0x2920/0x2920 [ 377.322746][T27890] ? kasan_unpoison_shadow+0x35/0x50 [ 377.322765][T27890] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 377.322782][T27890] alloc_pages_current+0x107/0x210 [ 377.322800][T27890] ? ___might_sleep+0x163/0x2c0 [ 377.333720][T27890] __vmalloc_node_range+0x4f8/0x810 [ 377.333748][T27890] ? bpf_map_area_alloc+0x20/0x30 [ 377.333763][T27890] __vmalloc_node_flags_caller+0x71/0x90 [ 377.333777][T27890] ? bpf_map_area_alloc+0x20/0x30 [ 377.333790][T27890] __bpf_map_area_alloc+0xde/0xf0 [ 377.333808][T27890] bpf_map_area_alloc+0x20/0x30 [ 377.344811][T27890] htab_map_alloc+0x8d3/0x11c0 [ 377.344837][T27890] ? htab_map_update_elem+0xca0/0xca0 [ 377.356159][T27890] __do_sys_bpf+0x478/0x3610 [ 377.356181][T27890] ? bpf_prog_load+0x1960/0x1960 [ 377.356197][T27890] ? __kasan_check_write+0x14/0x20 [ 377.356211][T27890] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 377.356229][T27890] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 377.366262][T27890] ? wait_for_completion+0x440/0x440 [ 377.366287][T27890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 377.366316][T27890] ? trace_hardirqs_on_thunk+0x1a/0x1c 13:58:21 executing program 1 (fault-call:2 fault-nth:14): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 377.366334][T27890] ? do_syscall_64+0x26/0x790 [ 377.376954][T27890] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.376970][T27890] ? do_syscall_64+0x26/0x790 [ 377.376994][T27890] __x64_sys_bpf+0x73/0xb0 [ 377.377009][T27890] do_syscall_64+0xfa/0x790 [ 377.377027][T27890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.387033][T27890] RIP: 0033:0x45a909 [ 377.387049][T27890] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.387057][T27890] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 377.387072][T27890] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 377.387081][T27890] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 377.387089][T27890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 377.387096][T27890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 377.387109][T27890] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 377.564854][T27894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 377.574543][T27907] FAULT_INJECTION: forcing a failure. [ 377.574543][T27907] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e001000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 377.611585][T27907] CPU: 1 PID: 27907 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 377.620315][T27907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.630409][T27907] Call Trace: [ 377.633714][T27907] dump_stack+0x197/0x210 [ 377.638160][T27907] should_fail.cold+0xa/0x15 [ 377.642769][T27907] ? fault_create_debugfs_attr+0x180/0x180 [ 377.648589][T27907] ? ___might_sleep+0x163/0x2c0 [ 377.653464][T27907] should_fail_alloc_page+0x50/0x60 13:58:21 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x57, 0x5, 0x0, 0x3, 0x0, 0x0, 0x40000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c6, 0x4, @perf_bp={&(0x7f0000000140), 0x1a}, 0x13256, 0x1, 0x3, 0x0, 0x7, 0xb2d43eca, 0x8000}, 0x0, 0xe, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x400) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'ip6erspan0\x00'}) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) 13:58:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9a1, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 377.658692][T27907] __alloc_pages_nodemask+0x1a1/0x910 [ 377.664079][T27907] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 377.669651][T27907] ? __alloc_pages_slowpath+0x2920/0x2920 [ 377.675386][T27907] ? kasan_unpoison_shadow+0x35/0x50 [ 377.680682][T27907] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 377.686934][T27907] alloc_pages_current+0x107/0x210 [ 377.692050][T27907] ? ___might_sleep+0x163/0x2c0 [ 377.696912][T27907] __vmalloc_node_range+0x4f8/0x810 [ 377.702129][T27907] ? bpf_map_area_alloc+0x20/0x30 [ 377.707206][T27907] __vmalloc_node_flags_caller+0x71/0x90 [ 377.712872][T27907] ? bpf_map_area_alloc+0x20/0x30 [ 377.717954][T27907] __bpf_map_area_alloc+0xde/0xf0 [ 377.722989][T27907] bpf_map_area_alloc+0x20/0x30 [ 377.731497][T27907] htab_map_alloc+0x8d3/0x11c0 [ 377.736284][T27907] ? htab_map_update_elem+0xca0/0xca0 [ 377.741667][T27907] __do_sys_bpf+0x478/0x3610 [ 377.744488][T27901] device nr0 entered promiscuous mode [ 377.746359][T27907] ? bpf_prog_load+0x1960/0x1960 [ 377.746376][T27907] ? __kasan_check_write+0x14/0x20 [ 377.746392][T27907] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 377.746409][T27907] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 377.746422][T27907] ? wait_for_completion+0x440/0x440 [ 377.746443][T27907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 377.784329][T27907] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 377.789796][T27907] ? do_syscall_64+0x26/0x790 [ 377.794492][T27907] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.794505][T27907] ? do_syscall_64+0x26/0x790 [ 377.794525][T27907] __x64_sys_bpf+0x73/0xb0 [ 377.794542][T27907] do_syscall_64+0xfa/0x790 [ 377.794557][T27907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.794569][T27907] RIP: 0033:0x45a909 [ 377.794585][T27907] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.794592][T27907] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:58:21 executing program 1 (fault-call:2 fault-nth:15): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 377.794605][T27907] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 377.794613][T27907] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 377.794620][T27907] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 377.794627][T27907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 377.794634][T27907] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 377.937913][T27919] FAULT_INJECTION: forcing a failure. [ 377.937913][T27919] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 377.996838][T27919] CPU: 0 PID: 27919 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 378.005574][T27919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.015647][T27919] Call Trace: [ 378.018969][T27919] dump_stack+0x197/0x210 [ 378.023321][T27919] should_fail.cold+0xa/0x15 [ 378.027931][T27919] ? fault_create_debugfs_attr+0x180/0x180 [ 378.033748][T27919] ? ___might_sleep+0x163/0x2c0 [ 378.038621][T27919] should_fail_alloc_page+0x50/0x60 [ 378.043840][T27919] __alloc_pages_nodemask+0x1a1/0x910 [ 378.049223][T27919] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 378.054782][T27919] ? __alloc_pages_slowpath+0x2920/0x2920 [ 378.060614][T27919] ? kasan_unpoison_shadow+0x35/0x50 [ 378.065915][T27919] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 378.072170][T27919] alloc_pages_current+0x107/0x210 [ 378.077278][T27919] ? ___might_sleep+0x163/0x2c0 [ 378.082117][T27919] __vmalloc_node_range+0x4f8/0x810 [ 378.087306][T27919] ? bpf_map_area_alloc+0x20/0x30 [ 378.092348][T27919] __vmalloc_node_flags_caller+0x71/0x90 [ 378.098082][T27919] ? bpf_map_area_alloc+0x20/0x30 [ 378.103096][T27919] __bpf_map_area_alloc+0xde/0xf0 [ 378.108185][T27919] bpf_map_area_alloc+0x20/0x30 [ 378.113114][T27919] htab_map_alloc+0x8d3/0x11c0 [ 378.117901][T27919] ? htab_map_update_elem+0xca0/0xca0 [ 378.123269][T27919] __do_sys_bpf+0x478/0x3610 [ 378.127984][T27919] ? bpf_prog_load+0x1960/0x1960 [ 378.132929][T27919] ? __kasan_check_write+0x14/0x20 [ 378.138030][T27919] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 378.143611][T27919] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 378.148891][T27919] ? wait_for_completion+0x440/0x440 [ 378.154178][T27919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 378.160409][T27919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 378.165884][T27919] ? do_syscall_64+0x26/0x790 [ 378.170547][T27919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.176866][T27919] ? do_syscall_64+0x26/0x790 [ 378.181704][T27919] __x64_sys_bpf+0x73/0xb0 [ 378.186113][T27919] do_syscall_64+0xfa/0x790 [ 378.190606][T27919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.196549][T27919] RIP: 0033:0x45a909 [ 378.200464][T27919] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.220308][T27919] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 378.228772][T27919] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 378.236731][T27919] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 378.244695][T27919] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 378.252674][T27919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 378.260804][T27919] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000000f0081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 378.382515][T27912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:22 executing program 1 (fault-call:2 fault-nth:16): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa00, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e020000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:22 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) close(r1) 13:58:22 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) 13:58:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00f000130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 378.738862][T27944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 378.752852][T27943] FAULT_INJECTION: forcing a failure. [ 378.752852][T27943] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc00, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e030000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 378.929944][T27943] CPU: 0 PID: 27943 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 378.938673][T27943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.948738][T27943] Call Trace: [ 378.952048][T27943] dump_stack+0x197/0x210 [ 378.956389][T27943] should_fail.cold+0xa/0x15 [ 378.961016][T27943] ? fault_create_debugfs_attr+0x180/0x180 [ 378.966936][T27943] ? ___might_sleep+0x163/0x2c0 [ 378.971902][T27943] should_fail_alloc_page+0x50/0x60 [ 378.977129][T27943] __alloc_pages_nodemask+0x1a1/0x910 [ 378.981879][T27949] device nr0 entered promiscuous mode [ 378.982515][T27943] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 378.993490][T27943] ? __alloc_pages_slowpath+0x2920/0x2920 [ 378.999236][T27943] ? kasan_unpoison_shadow+0x35/0x50 [ 379.004511][T27943] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 379.010744][T27943] alloc_pages_current+0x107/0x210 [ 379.015852][T27943] ? ___might_sleep+0x163/0x2c0 [ 379.020704][T27943] __vmalloc_node_range+0x4f8/0x810 [ 379.026617][T27943] ? bpf_map_area_alloc+0x20/0x30 [ 379.031631][T27943] __vmalloc_node_flags_caller+0x71/0x90 [ 379.037253][T27943] ? bpf_map_area_alloc+0x20/0x30 [ 379.042273][T27943] __bpf_map_area_alloc+0xde/0xf0 [ 379.047295][T27943] bpf_map_area_alloc+0x20/0x30 [ 379.052140][T27943] htab_map_alloc+0x8d3/0x11c0 [ 379.056903][T27943] ? htab_map_update_elem+0xca0/0xca0 [ 379.062259][T27943] __do_sys_bpf+0x478/0x3610 [ 379.066847][T27943] ? bpf_prog_load+0x1960/0x1960 [ 379.071780][T27943] ? __kasan_check_write+0x14/0x20 [ 379.076886][T27943] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 379.082415][T27943] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 379.087683][T27943] ? wait_for_completion+0x440/0x440 [ 379.092958][T27943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 379.099191][T27943] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 379.104647][T27943] ? do_syscall_64+0x26/0x790 [ 379.109306][T27943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.115356][T27943] ? do_syscall_64+0x26/0x790 [ 379.120127][T27943] __x64_sys_bpf+0x73/0xb0 [ 379.125118][T27943] do_syscall_64+0xfa/0x790 [ 379.129630][T27943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.135789][T27943] RIP: 0033:0x45a909 [ 379.139674][T27943] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.159287][T27943] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 379.167715][T27943] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 379.175716][T27943] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 379.183680][T27943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 379.191769][T27943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 379.199728][T27943] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 379.207849][T27961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:23 executing program 1 (fault-call:2 fault-nth:17): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe00, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 379.452301][T27976] FAULT_INJECTION: forcing a failure. [ 379.452301][T27976] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 379.472743][T27976] CPU: 1 PID: 27976 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 379.481445][T27976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.491501][T27976] Call Trace: [ 379.494799][T27976] dump_stack+0x197/0x210 [ 379.499131][T27976] should_fail.cold+0xa/0x15 [ 379.503727][T27976] ? fault_create_debugfs_attr+0x180/0x180 [ 379.509533][T27976] ? ___might_sleep+0x163/0x2c0 [ 379.514391][T27976] should_fail_alloc_page+0x50/0x60 [ 379.519584][T27976] __alloc_pages_nodemask+0x1a1/0x910 [ 379.524957][T27976] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 379.530505][T27976] ? __alloc_pages_slowpath+0x2920/0x2920 [ 379.536231][T27976] ? kasan_unpoison_shadow+0x35/0x50 [ 379.541509][T27976] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 379.547739][T27976] alloc_pages_current+0x107/0x210 [ 379.552835][T27976] ? ___might_sleep+0x163/0x2c0 [ 379.557673][T27976] __vmalloc_node_range+0x4f8/0x810 [ 379.562861][T27976] ? bpf_map_area_alloc+0x20/0x30 [ 379.567869][T27976] __vmalloc_node_flags_caller+0x71/0x90 [ 379.573486][T27976] ? bpf_map_area_alloc+0x20/0x30 [ 379.578516][T27976] __bpf_map_area_alloc+0xde/0xf0 [ 379.583612][T27976] bpf_map_area_alloc+0x20/0x30 [ 379.588449][T27976] htab_map_alloc+0x8d3/0x11c0 [ 379.593202][T27976] ? htab_map_update_elem+0xca0/0xca0 [ 379.598558][T27976] __do_sys_bpf+0x478/0x3610 [ 379.603134][T27976] ? bpf_prog_load+0x1960/0x1960 [ 379.608057][T27976] ? __kasan_check_write+0x14/0x20 [ 379.613154][T27976] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 379.618682][T27976] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 379.623965][T27976] ? wait_for_completion+0x440/0x440 [ 379.629239][T27976] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 379.635472][T27976] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 379.640914][T27976] ? do_syscall_64+0x26/0x790 [ 379.645576][T27976] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.651624][T27976] ? do_syscall_64+0x26/0x790 [ 379.656293][T27976] __x64_sys_bpf+0x73/0xb0 [ 379.660694][T27976] do_syscall_64+0xfa/0x790 [ 379.665198][T27976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.671072][T27976] RIP: 0033:0x45a909 [ 379.674954][T27976] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.694539][T27976] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 379.702933][T27976] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 379.710886][T27976] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 379.718838][T27976] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 379.726808][T27976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 379.734765][T27976] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 379.767136][T27973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000003130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:24 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e040000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:24 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0xd, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) r3 = gettid() perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x62, 0x3, 0x5, 0x3, 0x0, 0x7ff, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0xb13ad9b93b50fbc9, @perf_bp={&(0x7f0000000080), 0x6}, 0x4, 0x1000, 0x9, 0x5, 0x1, 0x80000001}, r3, 0x2, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r4}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r5}) close(r1) 13:58:24 executing program 1 (fault-call:2 fault-nth:18): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 380.022491][T27988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 380.057554][T27986] FAULT_INJECTION: forcing a failure. [ 380.057554][T27986] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 380.102782][T27986] CPU: 0 PID: 27986 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 380.111525][T27986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.111533][T27986] Call Trace: [ 380.111557][T27986] dump_stack+0x197/0x210 [ 380.111578][T27986] should_fail.cold+0xa/0x15 [ 380.111596][T27986] ? fault_create_debugfs_attr+0x180/0x180 [ 380.111610][T27986] ? ___might_sleep+0x163/0x2c0 [ 380.111636][T27986] should_fail_alloc_page+0x50/0x60 [ 380.111650][T27986] __alloc_pages_nodemask+0x1a1/0x910 [ 380.111666][T27986] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 380.111681][T27986] ? __alloc_pages_slowpath+0x2920/0x2920 [ 380.111699][T27986] ? kasan_unpoison_shadow+0x35/0x50 [ 380.111719][T27986] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 380.177975][T27986] alloc_pages_current+0x107/0x210 [ 380.183096][T27986] ? ___might_sleep+0x163/0x2c0 [ 380.187938][T27986] __vmalloc_node_range+0x4f8/0x810 [ 380.193134][T27986] ? bpf_map_area_alloc+0x20/0x30 [ 380.198154][T27986] __vmalloc_node_flags_caller+0x71/0x90 [ 380.203772][T27986] ? bpf_map_area_alloc+0x20/0x30 [ 380.208783][T27986] __bpf_map_area_alloc+0xde/0xf0 [ 380.213799][T27986] bpf_map_area_alloc+0x20/0x30 [ 380.218635][T27986] htab_map_alloc+0x8d3/0x11c0 [ 380.223392][T27986] ? htab_map_update_elem+0xca0/0xca0 [ 380.228749][T27986] __do_sys_bpf+0x478/0x3610 [ 380.233344][T27986] ? bpf_prog_load+0x1960/0x1960 [ 380.238264][T27986] ? __kasan_check_write+0x14/0x20 [ 380.243537][T27986] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 380.249080][T27986] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 380.254374][T27986] ? wait_for_completion+0x440/0x440 [ 380.259652][T27986] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 380.265898][T27986] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 380.271348][T27986] ? do_syscall_64+0x26/0x790 [ 380.276016][T27986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.282157][T27986] ? do_syscall_64+0x26/0x790 [ 380.286846][T27986] __x64_sys_bpf+0x73/0xb0 [ 380.291251][T27986] do_syscall_64+0xfa/0x790 [ 380.295741][T27986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.301615][T27986] RIP: 0033:0x45a909 [ 380.305498][T27986] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.325086][T27986] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 380.333499][T27986] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 380.341456][T27986] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:58:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000006130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:24 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, &(0x7f0000000180)=""/180, 0xb4}, 0x0) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000280)) [ 380.349424][T27986] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 380.357389][T27986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 380.365353][T27986] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:24 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e050000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:24 executing program 1 (fault-call:2 fault-nth:19): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 380.508731][T27996] device nr0 entered promiscuous mode [ 380.532320][T28002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 380.591177][T28014] FAULT_INJECTION: forcing a failure. [ 380.591177][T28014] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 380.640141][T28014] CPU: 0 PID: 28014 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 380.648860][T28014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.658909][T28014] Call Trace: [ 380.658934][T28014] dump_stack+0x197/0x210 [ 380.658956][T28014] should_fail.cold+0xa/0x15 [ 380.658974][T28014] ? fault_create_debugfs_attr+0x180/0x180 [ 380.658990][T28014] ? ___might_sleep+0x163/0x2c0 [ 380.659017][T28014] should_fail_alloc_page+0x50/0x60 [ 380.659030][T28014] __alloc_pages_nodemask+0x1a1/0x910 [ 380.659057][T28014] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 380.659076][T28014] ? __alloc_pages_slowpath+0x2920/0x2920 [ 380.659098][T28014] ? kasan_unpoison_shadow+0x35/0x50 [ 380.659115][T28014] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 380.659132][T28014] alloc_pages_current+0x107/0x210 [ 380.659143][T28014] ? ___might_sleep+0x163/0x2c0 [ 380.659168][T28014] __vmalloc_node_range+0x4f8/0x810 [ 380.709385][T28014] ? bpf_map_area_alloc+0x20/0x30 [ 380.709406][T28014] __vmalloc_node_flags_caller+0x71/0x90 [ 380.741393][T28014] ? bpf_map_area_alloc+0x20/0x30 [ 380.741411][T28014] __bpf_map_area_alloc+0xde/0xf0 [ 380.741426][T28014] bpf_map_area_alloc+0x20/0x30 [ 380.741442][T28014] htab_map_alloc+0x8d3/0x11c0 [ 380.741467][T28014] ? htab_map_update_elem+0xca0/0xca0 [ 380.741484][T28014] __do_sys_bpf+0x478/0x3610 [ 380.741500][T28014] ? bpf_prog_load+0x1960/0x1960 [ 380.741517][T28014] ? __kasan_check_write+0x14/0x20 [ 380.771065][T28014] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 380.771083][T28014] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 380.771098][T28014] ? wait_for_completion+0x440/0x440 [ 380.771121][T28014] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 380.771147][T28014] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 380.771162][T28014] ? do_syscall_64+0x26/0x790 [ 380.771177][T28014] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.771190][T28014] ? do_syscall_64+0x26/0x790 [ 380.771209][T28014] __x64_sys_bpf+0x73/0xb0 [ 380.771227][T28014] do_syscall_64+0xfa/0x790 [ 380.786800][T28014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.786817][T28014] RIP: 0033:0x45a909 [ 380.786840][T28014] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.862832][T28014] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 380.871272][T28014] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 380.879253][T28014] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 380.887433][T28014] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 380.895408][T28014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 380.903399][T28014] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 381.074563][T28018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e005707130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e060000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:25 executing program 1 (fault-call:2 fault-nth:20): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:25 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xbf, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000180)=@llc={0x1a, 0x201, 0x7f, 0x7, 0x0, 0x5, @dev={[], 0x15}}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x18}, 0x40000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000200), &(0x7f0000000100)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x6, 0x6, 0x3, 0x80, r2, 0x8, [], 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r3, 0x28, &(0x7f0000000200)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={r4, 0x2, 0xc}, 0xc) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r5) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r3, &(0x7f0000000040)="616d220d9a961f34a5fb3447499f0d168f99ee97cda542c33fbe1ffdc4931c2fb2410fd516950c0c3df3a669a2b0243b040efc8f919c0f14a98b4eaa062fa8176419fede0d3bdb2b85a0d2bfdc241c7250dc71c4cb", &(0x7f00000000c0)=""/94, 0x6}, 0x20) [ 381.388284][T28032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 381.427489][T28031] FAULT_INJECTION: forcing a failure. 13:58:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e070000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 381.427489][T28031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 381.481248][T28031] CPU: 0 PID: 28031 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 381.489972][T28031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.500067][T28031] Call Trace: [ 381.503385][T28031] dump_stack+0x197/0x210 [ 381.507748][T28031] should_fail.cold+0xa/0x15 [ 381.512372][T28031] ? fault_create_debugfs_attr+0x180/0x180 [ 381.518201][T28031] ? ___might_sleep+0x163/0x2c0 [ 381.523083][T28031] should_fail_alloc_page+0x50/0x60 [ 381.528297][T28031] __alloc_pages_nodemask+0x1a1/0x910 [ 381.533696][T28031] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 381.539259][T28031] ? __alloc_pages_slowpath+0x2920/0x2920 [ 381.544999][T28031] ? kasan_unpoison_shadow+0x35/0x50 [ 381.550305][T28031] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 381.556558][T28031] alloc_pages_current+0x107/0x210 [ 381.561682][T28031] ? ___might_sleep+0x163/0x2c0 [ 381.566554][T28031] __vmalloc_node_range+0x4f8/0x810 [ 381.571780][T28031] ? bpf_map_area_alloc+0x20/0x30 13:58:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000a130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4800, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 381.576821][T28031] __vmalloc_node_flags_caller+0x71/0x90 [ 381.582472][T28031] ? bpf_map_area_alloc+0x20/0x30 [ 381.587511][T28031] __bpf_map_area_alloc+0xde/0xf0 [ 381.592558][T28031] bpf_map_area_alloc+0x20/0x30 [ 381.593775][T28040] device nr0 entered promiscuous mode [ 381.597409][T28031] htab_map_alloc+0x8d3/0x11c0 [ 381.597439][T28031] ? htab_map_update_elem+0xca0/0xca0 [ 381.597457][T28031] __do_sys_bpf+0x478/0x3610 [ 381.597474][T28031] ? bpf_prog_load+0x1960/0x1960 [ 381.597494][T28031] ? __kasan_check_write+0x14/0x20 [ 381.613053][T28031] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 381.622547][T28031] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 381.622567][T28031] ? wait_for_completion+0x440/0x440 [ 381.622593][T28031] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 381.622620][T28031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 381.622638][T28031] ? do_syscall_64+0x26/0x790 [ 381.633265][T28031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.633284][T28031] ? do_syscall_64+0x26/0x790 [ 381.633308][T28031] __x64_sys_bpf+0x73/0xb0 [ 381.633325][T28031] do_syscall_64+0xfa/0x790 [ 381.633347][T28031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.643890][T28031] RIP: 0033:0x45a909 [ 381.643908][T28031] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 381.643916][T28031] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 381.643931][T28031] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 13:58:25 executing program 1 (fault-call:2 fault-nth:21): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 381.643940][T28031] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 381.643949][T28031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 381.643958][T28031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 381.643966][T28031] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 381.770321][T28049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:25 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x2321) 13:58:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0a0000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 381.845723][T28059] FAULT_INJECTION: forcing a failure. [ 381.845723][T28059] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 381.885582][T28059] CPU: 0 PID: 28059 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 381.894390][T28059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.904897][T28059] Call Trace: [ 381.908222][T28059] dump_stack+0x197/0x210 [ 381.912578][T28059] should_fail.cold+0xa/0x15 [ 381.917196][T28059] ? fault_create_debugfs_attr+0x180/0x180 [ 381.923029][T28059] ? ___might_sleep+0x163/0x2c0 [ 381.927920][T28059] should_fail_alloc_page+0x50/0x60 [ 381.933138][T28059] __alloc_pages_nodemask+0x1a1/0x910 [ 381.938530][T28059] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 381.944089][T28059] ? __alloc_pages_slowpath+0x2920/0x2920 [ 381.949826][T28059] ? kasan_unpoison_shadow+0x35/0x50 [ 381.955125][T28059] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 381.961382][T28059] alloc_pages_current+0x107/0x210 [ 381.966495][T28059] ? ___might_sleep+0x163/0x2c0 [ 381.971353][T28059] __vmalloc_node_range+0x4f8/0x810 [ 381.976560][T28059] ? bpf_map_area_alloc+0x20/0x30 [ 381.981587][T28059] __vmalloc_node_flags_caller+0x71/0x90 [ 381.987223][T28059] ? bpf_map_area_alloc+0x20/0x30 [ 381.992252][T28059] __bpf_map_area_alloc+0xde/0xf0 [ 381.997277][T28059] bpf_map_area_alloc+0x20/0x30 [ 382.002136][T28059] htab_map_alloc+0x8d3/0x11c0 [ 382.006911][T28059] ? htab_map_update_elem+0xca0/0xca0 [ 382.012276][T28059] __do_sys_bpf+0x478/0x3610 [ 382.016867][T28059] ? bpf_prog_load+0x1960/0x1960 [ 382.021814][T28059] ? __kasan_check_write+0x14/0x20 [ 382.026928][T28059] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 382.032465][T28059] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 382.037735][T28059] ? wait_for_completion+0x440/0x440 [ 382.043011][T28059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 382.049277][T28059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 382.054722][T28059] ? do_syscall_64+0x26/0x790 [ 382.059384][T28059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.065432][T28059] ? do_syscall_64+0x26/0x790 [ 382.070127][T28059] __x64_sys_bpf+0x73/0xb0 [ 382.074531][T28059] do_syscall_64+0xfa/0x790 [ 382.079024][T28059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.085025][T28059] RIP: 0033:0x45a909 [ 382.088924][T28059] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.108611][T28059] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 382.117101][T28059] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 382.125056][T28059] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 382.133012][T28059] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 382.140979][T28059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 382.148932][T28059] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:26 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000c130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:26 executing program 1 (fault-call:2 fault-nth:22): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0c0000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:26 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000080)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)="849ccf0805877e5c652f1194eac52e79eb708d23f7cbbb48ceb7e1cea5bcd5aa19cee817ea96908edd05bb17465ee39545fe08fd4f65c404d879b9438eed09462bd5c924c42a6232d1a4399383ecd806558f887480d84aa1a01bd5a50bb9f315871c7f725f8963c577886b5bd4443b71674919", 0x73}, {&(0x7f0000000180)="efa345a7d1376f1897979f3a3b3d9ac1acb34aae60be43990187e089bc298bf02bc7943fca68c0dbd27eab352cce7294a5f4d0fd977e089ade0b3cd23094e498691483fe15d7a05cb0cc80ae9954025aa98235765843c576be2798c0f21f140205a1837f4ffb1182d1f4", 0x6a}, {&(0x7f0000000200)="15a7c356b70eb44a93b4324cd1ac23df4f93e7a6775f8b20361b7b5d6b6c2f55bac8a29f93d650646dc583e1d94fb432743c4f73724d2ec21b3a2bddce35c5a95d5774c55dde45089589345df0948733cf0a092232c3b6b087cd79745b47a79c1a469868b96c0d5d2cbc63339b32755dbd8f1219aa6c0ef53f68b308f24175c48266b6ab4a0561d52517bbc001f5be8e4bb5f6fc4ec928035d74fd79db46f4eb184e1816", 0xa4}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/4744], 0x1288}, 0x8800) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r5) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r3, 0xffffffffffffffff, r4, 0x8) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x2, 0x0, 0x85, 0x1, 0x0, 0x5, 0x2000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x108674ca, 0x0, @perf_config_ext={0x8a95, 0x3ff}, 0x800, 0x100, 0x5, 0xa, 0x72eb, 0x3, 0x5}, r3, 0x10, 0xffffffffffffffff, 0x18) 13:58:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0e0000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 382.581521][T28080] FAULT_INJECTION: forcing a failure. [ 382.581521][T28080] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 382.594903][T28085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000e130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 382.645525][T28080] CPU: 1 PID: 28080 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 382.654256][T28080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.654265][T28080] Call Trace: [ 382.654293][T28080] dump_stack+0x197/0x210 [ 382.654317][T28080] should_fail.cold+0xa/0x15 [ 382.654337][T28080] ? fault_create_debugfs_attr+0x180/0x180 [ 382.654356][T28080] ? ___might_sleep+0x163/0x2c0 [ 382.654381][T28080] should_fail_alloc_page+0x50/0x60 [ 382.654395][T28080] __alloc_pages_nodemask+0x1a1/0x910 [ 382.654411][T28080] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 382.654427][T28080] ? __alloc_pages_slowpath+0x2920/0x2920 [ 382.654447][T28080] ? kasan_unpoison_shadow+0x35/0x50 [ 382.654471][T28080] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 382.709117][T28080] alloc_pages_current+0x107/0x210 [ 382.709133][T28080] ? ___might_sleep+0x163/0x2c0 [ 382.709158][T28080] __vmalloc_node_range+0x4f8/0x810 [ 382.709186][T28080] ? bpf_map_area_alloc+0x20/0x30 [ 382.709204][T28080] __vmalloc_node_flags_caller+0x71/0x90 [ 382.746672][T28080] ? bpf_map_area_alloc+0x20/0x30 [ 382.751716][T28080] __bpf_map_area_alloc+0xde/0xf0 [ 382.756754][T28080] bpf_map_area_alloc+0x20/0x30 [ 382.761624][T28080] htab_map_alloc+0x8d3/0x11c0 [ 382.766412][T28080] ? htab_map_update_elem+0xca0/0xca0 [ 382.771799][T28080] __do_sys_bpf+0x478/0x3610 [ 382.776402][T28080] ? bpf_prog_load+0x1960/0x1960 [ 382.781431][T28080] ? __kasan_check_write+0x14/0x20 [ 382.786554][T28080] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 382.792109][T28080] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 382.792677][T28084] device nr0 entered promiscuous mode [ 382.797392][T28080] ? wait_for_completion+0x440/0x440 [ 382.797417][T28080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 382.797449][T28080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 382.797465][T28080] ? do_syscall_64+0x26/0x790 [ 382.797479][T28080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.797496][T28080] ? do_syscall_64+0x26/0x790 [ 382.835316][T28080] __x64_sys_bpf+0x73/0xb0 [ 382.839748][T28080] do_syscall_64+0xfa/0x790 13:58:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0f0000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x5865, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000f130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 382.844275][T28080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.850164][T28080] RIP: 0033:0x45a909 [ 382.850179][T28080] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.850186][T28080] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 382.850205][T28080] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 382.873881][T28080] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 382.873890][T28080] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 382.873899][T28080] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 382.873908][T28080] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:27 executing program 1 (fault-call:2 fault-nth:23): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 383.104807][T28113] FAULT_INJECTION: forcing a failure. [ 383.104807][T28113] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 383.119098][T28113] CPU: 1 PID: 28113 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 383.127785][T28113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.137848][T28113] Call Trace: [ 383.141156][T28113] dump_stack+0x197/0x210 [ 383.145505][T28113] should_fail.cold+0xa/0x15 [ 383.150140][T28113] ? fault_create_debugfs_attr+0x180/0x180 [ 383.155945][T28113] ? ___might_sleep+0x163/0x2c0 [ 383.160811][T28113] should_fail_alloc_page+0x50/0x60 [ 383.166006][T28113] __alloc_pages_nodemask+0x1a1/0x910 [ 383.171383][T28113] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 383.176927][T28113] ? __alloc_pages_slowpath+0x2920/0x2920 [ 383.182783][T28113] ? kasan_unpoison_shadow+0x35/0x50 [ 383.188075][T28113] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 383.194316][T28113] alloc_pages_current+0x107/0x210 [ 383.199529][T28113] ? ___might_sleep+0x163/0x2c0 [ 383.204369][T28113] __vmalloc_node_range+0x4f8/0x810 [ 383.209556][T28113] ? bpf_map_area_alloc+0x20/0x30 [ 383.214565][T28113] __vmalloc_node_flags_caller+0x71/0x90 [ 383.220181][T28113] ? bpf_map_area_alloc+0x20/0x30 [ 383.225212][T28113] __bpf_map_area_alloc+0xde/0xf0 [ 383.230215][T28113] bpf_map_area_alloc+0x20/0x30 [ 383.235069][T28113] htab_map_alloc+0x8d3/0x11c0 [ 383.239849][T28113] ? htab_map_update_elem+0xca0/0xca0 [ 383.245228][T28113] __do_sys_bpf+0x478/0x3610 [ 383.249820][T28113] ? bpf_prog_load+0x1960/0x1960 [ 383.254758][T28113] ? __kasan_check_write+0x14/0x20 [ 383.259875][T28113] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 383.265416][T28113] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 383.270687][T28113] ? wait_for_completion+0x440/0x440 [ 383.275972][T28113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 383.282215][T28113] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 383.287666][T28113] ? do_syscall_64+0x26/0x790 [ 383.292324][T28113] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.298397][T28113] ? do_syscall_64+0x26/0x790 [ 383.303093][T28113] __x64_sys_bpf+0x73/0xb0 [ 383.307520][T28113] do_syscall_64+0xfa/0x790 [ 383.312038][T28113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.317919][T28113] RIP: 0033:0x45a909 [ 383.321810][T28113] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.341494][T28113] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 383.350050][T28113] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 383.358015][T28113] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 383.365974][T28113] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 383.373983][T28113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 383.382011][T28113] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 383.416253][T28107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:27 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:27 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000000)=@generic={0x8, "8c5ec7790c9c60a51cce45a705292490b444e653493061108162dc2c98fc8b5b9c4991a93315826923c1eeab3e01d6510a826a4aa7f81ecd50c8f53fc00998db0c3e4c11b6a5845af66388eadfa6ca3efc437728da55236714d4b62a5eceea251330eb1fc729bcefa5042e9160ca394288c959c6490a3c8ff8f98fd4a4f2"}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="443997c22363edd3cd641d49c719b12b5f4013438233c689a2d3bd5b50e5f141715fc6dec9747ac49b11a13bed84d9b546e894bb37e598c170ff3ee37f3eb9d367cfa887f85df64727e03345e36b7bfe74d6d4812e4cac5158cfee4e33be33ea95bb36fdc01eb18971201322e00339925ba4c63b", 0x74}, {&(0x7f0000000100)="229565a03514f55a628f10228bcaa7140dbf1483f1d2478ae0", 0x19}, {&(0x7f0000000140)="fd676ae4b6e574ec07b9cd5158683e978caa1aa825ceb0e37e973c49b57f3715654c8a8d51674a11dc0d97a874c5352b4e9906d38b999a35a01627aa98f6cf8aba48bd6d4beae1286377a38516b52cfd7884015cfb6ba368ae9dadc544e215d1a401c567bf5951266d203e3cb536089ab1490bcc46e9ab393b32247a4a3c7c294994b2a62bc75a6397cbeb6781bf63ea6d60fc666cc4c69646c1d7bc810863966b2686", 0xa3}], 0x3, &(0x7f0000000240)=[{0xc0, 0x104, 0x7ff, "1823deaf99c8390a583a9d314e68cac1dca2af28cd4d7ad257b5809711d1bbc8208654baefec86d5f82b0fdc4f064d37e67a223eac56a88e7305dc2efdc222060843265463fe661d6cdd4369a076ab7e3d9391363205bbafedd12fd93b561b96f9f7ddd814dffd1fae5b62328f24bbefa2fbed707051c8d35235b93600db13e6934dc328096ad8afc10017c3147e309d2712832fb3cbfc2c75ef23a5923030d7160215511306b818bc8ad860"}, {0x40, 0x112, 0x1, "c44ae63f6f78f8973ac7c2b312fe5a277778a2a9865c2f27680111010c06f343144870718b00e1018340f83b900a6e"}, {0x48, 0xff, 0x8000, "b291cb93b1bb5af2c3db48321f85102bb40eeae70d9a4fc73b84cdff8b2826a5a7f883a29ca97684cd7ed6c8108c2dafaf6f144516"}, {0x100, 0x115, 0x8, "8faa2928784b3d6bc63a9d6ea22dcfc2b1ab1634e0e7442d67284bc5c3b8fa089fc9b42592477da5d640441211286e087585bb726978e9272beb4605aebc8567424b50acc66313bc5299f11d698ce4d9a02b6d0d849232cb0ce4915dfd3cf5a7ffb6e329c83e7ecd09239027e5a048d8b134d298b2a59d44b7562b99488f979abbcde78a3d1bbf856915f217f7713928a20cad3a76e6c601949bbea68d5ee4c555131b5d1037350e20176fbc877dc06fd49c9aa63b945a3cf209675b8a9c4941ae43257232d19d46192418bc588d0c53de301d3434414e681f36a6f11ad6204b78eb0d6010542ed98c7c728d68b0d5"}], 0x248}, 0xcd872ca40a776a8a) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 13:58:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00003f130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e100000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:27 executing program 1 (fault-call:2 fault-nth:24): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000040130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 383.680898][T28130] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 383.691080][T28129] FAULT_INJECTION: forcing a failure. [ 383.691080][T28129] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e480000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 383.762251][T28129] CPU: 1 PID: 28129 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 383.770978][T28129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.781040][T28129] Call Trace: [ 383.784349][T28129] dump_stack+0x197/0x210 [ 383.788691][T28129] should_fail.cold+0xa/0x15 [ 383.793286][T28129] ? fault_create_debugfs_attr+0x180/0x180 [ 383.799097][T28129] ? ___might_sleep+0x163/0x2c0 [ 383.803964][T28129] should_fail_alloc_page+0x50/0x60 [ 383.809170][T28129] __alloc_pages_nodemask+0x1a1/0x910 [ 383.814560][T28129] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 383.820192][T28129] ? __alloc_pages_slowpath+0x2920/0x2920 [ 383.820790][T28133] device nr0 entered promiscuous mode [ 383.825942][T28129] ? kasan_unpoison_shadow+0x35/0x50 [ 383.825962][T28129] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 383.825982][T28129] alloc_pages_current+0x107/0x210 [ 383.825995][T28129] ? ___might_sleep+0x163/0x2c0 [ 383.826015][T28129] __vmalloc_node_range+0x4f8/0x810 13:58:27 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000003c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x2, 0x6, 0x6, 0x0, 0x4, 0x12048, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000280), 0x2}, 0x200, 0x3, 0x7b, 0x9, 0x51, 0xff, 0x6}, 0xffffffffffffffff, 0x5, r2, 0xb) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYBLOB="0300000000000000000000000080000000000000a4fca4b388830fcaac0264f163557053c220a6dfc69a1636d2f6a53efa35ede2c19a4d085517753fdd11af4efb7650b3411fe823648751c9cf11862d862c745ffa053e3e53bda930fe9421bed4acef29cc9a8a2bdbe35e110f2c2802751c169603353a14696baeb0ac8a00fa000000ea830d58e4c17a122e6cf0a00b3f50fa7a99684db2c578027d7031ab5a282d85a81fc91db521fdcb1433f211ba302a89e3425245a44276628c85fffc7d3cc78ecb36c5932e3035b959872a442834a6bfcd8d354f953071bc28de269811179a67109b38"]) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="e200fb054278ab18b55056fb6eefbebe0d1527474200050d54553e3bc8e98da6e526ebeb1d9b5df165122b7d794deecc52d6e07471927bdbea4baa25ad88c0e44b41dcac8357d66985a5ee970540994d380ce761754024b7c3cb54c36919642c20a5d1e9138e201f42feea260b47272f5cebaa4c8c319d911f866b436a059e6e558b15e63066ef6326919299a5fc6a3a3a6ee0cc48813bb261db24907c1d8c3eba19364dd2be82a0447713183c25c8e8e6f70f38da833bb81ae78158cb4d7238c1cf2b15aef98bba736043c3953978eaea5ad0f285fe4a6688f33267c4", 0xdd}, {&(0x7f0000000100)="8c34a88eae9e89559ee3ff8be9688787ccd18313d9a1b4d0b1e63500f285e7d0263f407dceebfc83539d7a64e5e5f01a72f0638c6057fffd9aea02e8c702a07a18ffd8039074208b1e7f0a4d26aff727f6ac6270b91c2785180aba24001bea9743d6a35f4a3aa3070899fb1a39f39fd579cfc4f16d2eac2a59144f17bf7e8bd7b8ff4684d0176df37975776af74900a85988ce1caed7471a27e1c89e4c9d8fa4d4332bef5f9e5a0c99940b27b6d47e889580775cecde2375ca68dce2456c607ef78c07d2eab20e1f8b0207919e00b0be0ac6fec7aacffb7748442ef742046446b5ef1ba05fc0238390cc1c53f17ef3107c792657aff78923", 0xf8}], 0x2}, 0x24008800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(r1, &(0x7f0000006000)={&(0x7f0000005e40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000005f80)=[{&(0x7f0000005ec0)=""/130, 0x82}], 0x1, &(0x7f0000005fc0)=""/38, 0x26}, 0x40002003) bpf$MAP_CREATE(0x0, &(0x7f0000006040)={0xf, 0x9, 0x400, 0x2f5f5367, 0x2, r2, 0xff, [], r4, r2, 0x3, 0x4}, 0x3c) r5 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x2c000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) close(r5) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$kcm(r6, &(0x7f0000000400)={&(0x7f0000000600)=@nl=@unspec, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000680)="40883c71f9ff059dca7337525763cade13d3e9d8b8ce19e4d5bfe6ee8f16b130e1ff8c9fc3f784ec26c433007bc20fabbc4536328db4e85ddf1b29bbc1061dde61f86f8a87798c7628fb48ca7697b82788e51a683f0e405bc32d823a250e317225a52685469bc72b5156fd125dd7ffcd620771b168a8e9ff32c05d9d957cfdbf33f7ea87459ae1489e1998836ee391c7dcce533b62f44db1464925a080e570726afcf73d1584746f9a", 0xa9}, {&(0x7f0000000740)="011e53819b430e5470a8008e87aab71de50afa700beabc9ab3bad9898ea91269d902ab552cda13d5ec18bd228f5b315458dbd7ce14e74282d5065c9d41151b55122950c40132750f90a8f1b34ce1926bf8c11c9834999798497427c4", 0x5c}, {&(0x7f00000007c0)="b94286eb26c942e83d1b9f4ba420c083889b1bee9e5f54b243b5c03ea03b4d0b048bc23f9d997eecdb379d908e508ab8eaee5b0b74f69b669a7c3fa47d76524d2b204987d2692e35fc4fda6684b6c6e0c15d42f6c0f1337e2e7683b9d7bcd92dcb2b326e45bab7e7d2f8fd", 0x6b}, {&(0x7f0000000840)="d96e69c5975be2995998723a31df050d2e3db9fc952486d218d31c3b0892a534a3912fe99a54d9dc0b988484aa126d10cf86934fdf2e8deeee39d0ce167f347f55dc0fff48c12d994a84f5d1836c25dd49a7f552ea", 0x55}, {&(0x7f0000000340)="bb4f75a89b0131f5452bb6563a2c225cc4cf2f628803c7606f12d6d24298db01ac0ab2a2317dd88168342252a964d5a9", 0x30}, {&(0x7f00000008c0)="06ab0ab04d1b3d5640055417289edcd3826192e7aa076573d45885f82911aa8a5c882b6792b86223384c888a2d35e12ec86eb15866a5a49caa5b56b65e642aa3ff82a9f9b68ba4b537b2374e5168faa2e6fc3af7cce2f038a3ecf3c75aa59f2efb557831f8ee18372528210994db0b36fc8f688f96a2c7bde1dd624f444756aac97deaa56288daea2cd5421828cf8b2527238fbe2036e9ffbf1973857f42a25a96c87fbba07d6d07c6a2c2ddbff673d792c406d69a930aaca1815154321474806b9642d08b7d673ae7ff1523340bfced9eba829ee63ae73c7250aaf6311a42950f8ae39f4b8ec89a99e70209f0b0ff3124af3a4911860f93bc43b502d8f8e91f3717a1171764c43541a52b0018b7c21e6c073a925a043923603b755f02e5388f8d5beb2091bd703e767faeb2d23de697a31aabbac3c30cbaff0f1b9c726fb8b635240bf26d82fbb6c6fa1f58e9d474ba4cf136f6db48f69d76534a6be8e80043160ec02099379c32bf8e13bd0943e2bbcd46fa98f17c77b45214c6815e461fc1f73a30a3dca2a75280207afcce30238e48590b3a301b73c845374939b38e690864cba106116e620a4846ecdcb4b43ef235fc4d3681813fcb4abd62b3103e25ea5b4c9cc2afc85e36de0fc60c0b1ae76d7eea3397aafae62cd143e1af7dcc7d371e7dc08fcd24f3e4d297d67c0f04377e9da12f1842dcbdb234edc1df14893484dc361c4a1897195f72ead0a3f111c9b836b74b206df374c47d02d2c54b9dad94a1d82d17dc02fa8c0e2375a61b515ae12a8f8de165bc73c779a2a20a76a16c481fa6e20c2ad69adffd97eb1c497c225ae8b3fc8d5aa2a54d602ad0c9c696987b6657a18311189e36a2cb6b7309c4bb83a5a9f66b28feaa708b45873cceb4cd3f44f9ae8c51549faf00da9ff3b74075e72fa8939649813e51aed6d7d961f8d42210f253c2c5d4d0aa7a7c869ba1ad3050049fc36de802a705f63c0d478154e33a47ad2d46249ab865f36bc7f78f1c75217ac3dc326577853f13415f0a5361c5b1ea688f961f84e41302145b097e08f2a55aad3ce0c6b623b2fd451d56beb15fcd461d5cd095b0e48455f7ca81d68860c749e20cb7dd2344bae0c43e03b86592354e7988d79ed42d5cc3932606d0478a4b4e23771451c33f6ddcb81aa6c05ee6696b0e2ed86f2e560dae7cac93bb75d391f85aeff3923a6a5622b299c315329c597189ca14f11fd7e6f28c2ae98089b40582a1e9fc884b3cff72182b6d58415349df90c98729993d20f03af75a7ab44b715af0b4724f5d0e9ebe1c7611626ff6aa0b3b9b01194438054cce2fc1add6b3201447e82f0abc7146fdc4e86e84a2f1475ec5c05ca4843466940af9178a640fb18141461fc29b4e0a79b9ed253daedd6d5caa67b8d40cca05608e3d2e3a77ef0d0bf5a3c0b1924c294b4c4d0f98e8115671fcb34d4f28c06cf9ea21d10bfda494ca9353de52d57c2e41b8aadbbffb72bc14e5a5bc7f3c5922caa7d04a1d9fd3101f821032d18401ff9fa542a3d34e7ea9c90fb3443844a71104b23429abf8dc840b9b2771b52de18bfb705bc11ceff9afc714a4088bac99dc41f3558bd4deebd310bdaa370766e354e8c45175862e1d56deb0b8c5ff83d74a23e7be46bfb3227ed86c722f439d60b7c393446efce6fd6b173dfcde49e93c0c36aa39bf8e84cadf5d08c8f5a3bf91982f1c97f55746511a77b5cafa48a9f314116837f232402597f05531e85b4ff5c0ac1c47c7cc58a453aa2fce9773624a4fe518ada466b3950c15f041b03a135e78dc38679f260f9900005eb76995813dc7a6d1e7eebdc83916f634699c4ff62eb7a80731a325ee37eb42f8da77780a3a6f9a09af39f8351dec80f0170a33057b6d632ab123abe251bd79af1830b6b6980313fbafc1acc5f3d95705ef79fb5cf7a5572108f3db0ac523a1686cbd2199b23682c6f132497db74392d4cb822bcf677aa080f70ef167133a4c9895480c35c2a7e70fcb21bd11796c7a56c40a893ef0b3023d8d7fa4a61c8e8d0745e15e9aab0e33702600e4cf78f5c507308f19b3405fbed06d4ef22ade3b68281cba157aa583245a05187f0c4cd4bb60b2524584a8652c3cd5903386890528badc5b829970e6faa476c17c18c9fe445ea21df58201096b5b2a0f135c5ea048b1f15af47218aa460bf91575da2fad47e88ec22507c83a8b8f406c91af1098dcb6910e21845dc2c1a11fbc07349fb82d89189c13c715b429872fede8d6a27a97e7a9ec17fe0adcfba158ec9a9bf05cb31c6fc9c302e0e350610b47aabd1c64d50b533fa2bcc8f08f79f213f17f9e90b7f446be929dc8f4ef2da2b12ebc39cb2838904bbe84f2312171ca14aec47733bc5ccb66cd0d35614d2ab29e6f3bba437b2d9afc4f3150f46637673877812a282ab478fb0f3f26a67f8f3143efdd7f3f0a6a0fbc3bb28f8152145b422ddefeeff912602420f9cf8e4875d08c469d632a847326b2d51ccecb4ceb839543560462719aea20f8e250347a3f1273a87a84e13b403deb07318e37b4a41bb994dd3bbca810a79419860b48c7de01515bc6f4a66312e3d66b191bd9a3c38173acb74601ed0d9fec5e174509de0869eb15ab884ae8fb208cfe5e16faccd62b95a07de3b86ad897e3ff7576e61563407ffb349cf0bb6b85044b00c986b5374fc810e3d312983fa8a335d07370f8c11c1802286be088916cbec8cc0d62fd9e679ae64ba9babb4042c45039f1565bd39476f7ff81f0e3d58d811d6511485dfceb5e64631412486ba7965846d6a7166e2b43423da5cc9096729a94c176a96c70c17bc0a6211214d6ec3a8ca22c300149224ca941184a888e5b6d59e2a1b79d14978d9dc009dd80487eb0f0c6cfd109da6a283b60e59269b77c49bba3f183a4a13ff643206f49e86cd0569e47904d0721f30ee47319a4e5c5cabc0ebf0a30a2cdf6805ea79aaf071665285a147f48167954b5f936bc6ebcca692185cefe3fae55cae603dfaacda98a19160eff678255f7e63ff2ff1e2b695b338c561820bdf20e78b5592be2e4d9492dab0b133b5515f6a3e077217cafc92a4dc92892933512177e244da2e19969a02d7f86dd8036e92c8c4f7188c640a1652c59c25a16ecf7b3c02f11e85c350d539f5083fd4861aa6844961b80c7ea1d9caa4a522137662009821cc2e1cd5cc1d65504375cb565d70e21ef37fa72494ba521aabe7fd44ea1cc5ed0102075d5a753f5287b8f44eee14fb207c95803850b1b45cde140bb36097013e2a966890f46e1b28b89e14a7013d6e42fd4c35f7ab4f8290c092ec9e361626321ece26212b745e9ebb5de4e53a673593d1dc1d21e232ec83b4529dfcc33990e970bfe982e08a7ea6204d503797fc0c8726087c0e60ee67620479d361b2671b07a1d2ebbc63c10f04d136160e89cf360d37c4ed146f6bc1f99c527edde1997695098be2269bd6916abe16d9c723e7c0293cfd6ecc9948a2c2cdd9cd84d0c15c12dcd5441311939482ccf39412b4f3833bc64aed917a09257ea504d84fe99f931557aef936029c53fe01bc5912f283c2185452ec256ee2e951dd145bfb3043ea9083be1b42d898d6a71e4b0d52f21364256d0921158aa34d4128e8cd8a2ebcdae176add6a4cf0b3b19e14b8e8d1a435b456204e3219a6b87c474dff8ab6e0d452a5d5f6d57450a132b6ae355fca2d84af0c63052ceba112b243cd5795eb673d00f7fd279e5366a1deb90115fbe9a69ec149f8f19002e584f0a506f559a81abfb70b92d0d1a952de3d1568d8ea3e3d1a8094ed36d2a08b06cdff0c1d9203b59374be7b16fdd85d5be57aad447003586d4c6386542cdf33278b9c7adfad4ac7086206727aa39554aea03b2b451e2e45f254b32ceb80aa8d4cc59f45f0f7333ac8ee8ce74692b261ce3e63fd8ca39af43ddaa976f69f5d8a768f6772affba446a6616e2726c72cf61cad1cfb527ba8df918e1a9102215593b6e72dccfb9ccde3e165543e2cc71eab4a84580fd6ee820b3063ca9732c788e89bfd03bf4c1e08db27517637eeabf4f0fbbdb3a4036561c502c4899f483f2019714bf135838301978c55c02dd8dad43e963a2ed21245773b1945c95001aca96eac6fc0fabc4b045ab9816bb08100d7e49810798750656c7effee8ccef24a86a17cea464331bb4ca1a03b6c76504989e675f283dd5b7038760fd0927f4d35210725962aa38d10a39d660558621e8234861e898f727e582d0b907ac28e3360b17ccbcee8d86261459ff56d71e2e8b2bcbb7d9ad900a5d893279a9c6adab88d886f8167038bea6bbc315d8d726799605dc6a12270d50e213920493a304413f05bb723488bb8d4a088bea1be5b6fd2333b8fdbe3b7660e26ec06169dc902184368b10334d5a694d5887c3c85ddba2b92f14d277b18c9517b4745fdad97a5f9449a2286198ff963b66aa06f0a006b5475c9ae84e330a10bb3a537d9e225533e31850813a8c8baaab43144ea30afa7ba4d9d5c204a8478e28ef0390e0fa2bae29ba79060e05d7911074641d0a4c482a4669a27d432997ca3fce9d050ad9f72a33bea9b99b8bfda7246d7767707ceb91da19cc3e5df983f9e76b7425fb0fe49f32068b976c38f85cb2673ecc39c0d9260dcb38fb9e037c0c3a19e601f8a5ba8b4893ec3897ca7f693a98e269b581781d891eae454fb1547fbeec32a7dc113c793789485523d9d508259e9428250acabe8a94509585f74d1d702e57b1355ea47ef7dc087557a28a75e4261b4f4a3841095caa536ef673261492ec9c656e5fcd459881d67dc8feec7c4f5c2eea66bd4be6c263bb6d0a215e2750c95fb2f8a9b028daa097f96b1b02c3ed896869d2e21521a5dddd08d6cb89fa92cbf61a8b4c8e16f4335395a2409d097eb69188b84479066d68ba24d148461df73cd49065a440cc2c5800c73c5671c00a493752610db774d777a80d6c78ad220ea82f1bb4157cf66c70f4832a6d9548ba3d071c4cb60804aca0400caf04ae0ea38a472da4f6affdde77e2f7a0023687c0f423f9c8c01abf13e70b3b50c5a0267cb1f9df72dd765b7f998107b7e9ea3589f8c2a30d5233249c8feb20ee1af1ba9af6479bc44dfe00b992510d84037d7321da1dbe88537d3f9ac393e212e7bcd80f169fb515f7e3d9e1e39269ef2f31dcc06602753c94c9534b74fbe8a4d64fde9fe150c28d7b0e8aec8dd5fff5b5be982fdca37b98afa6d35c839e4624e17be522adfad2467313996830ee00462134d7432a9fce7866ef47460905db473ee5b4cde3067c5232941d500f912bbdd0de71749143c5306c698828b7404f0a46672cfa5dc6d584c641aa8d3808e299e823586512f6c226be8121c04243093b71ebce37bdddf816685431bf15a65e028695ce7317a75169fd20f66780e5262147dc76565e092ed3bffa5e7dcd90a6b74e7cd483f4297a4c5e7f50653bc7eef13be3d1a0fe2ebda2f1f1653b18275769e667b411c9b2716c9d740bcbf29dff00f01fb78d17dc166442dec5c376fc2bac8240e770e18055468e057cf88028e21b33aee0b9031dde86790e00dc83ca1fc279de656d240985dd5829892f4d235be742c32eb6879de8ca4d2eaebf6508e5f8af57600b4dfd351a978c6043bb9fd4837c45c7b3df8ffe1e35ac87d92c86deca33bb3500fcdd7d29ae1966711b7c9b4d0bf82f3ac4543c7ef0853428b0b0ab5a0d0a44b662b7a9c7a9e7e7785a30dfbe23e2c6246b2d720eb4c5855523d7f549d87b6a74d936964c8f7ec1aa794a879648949d0b57a80d05bab95d4e685", 0x1000}], 0x6, &(0x7f0000001940)=[{0x60, 0x1, 0x6, "1c625db0d1f64707b7cb30fdd8fc954ebd169cef24c96749e1eb80a6b63baf6ae158b14c66c07e51b4e68e767781c9b5273beea4e014787d0bba11194e67ef1f2acdea24cf15cb8cda96ab10"}, {0xd0, 0x118, 0x6, "57938d97ba62b30c9ad9a80c7a4b83ac434696ba4cfddd3cb58e32b804aa76f64b5f4f8d446163c478cb96243472bcdb5876686aaf3032d0e716e53e6157f03b549163db654cc92e788f80cc5152ba50a024b1661cf5ae8382905e4571b6240fb94180bee4ffcec15d3e1b7c706d59cd5e23cf2a1450e2cdb334028666a86f0e2fb35e0b429a5e8fdfc1b8e6aff2f242f8d494d7b4598c8e09cded13b94f85864ca092e5f2ce8696f32d2049eb75267e3c00224867335307e45b209df1874f54"}, {0x58, 0x17, 0x83, "854bc5beca010d3c7fca5b3cbd9274d01d66822e5ca5154a902f2d358e50b85ddbdee3eb4dff544e0dd7fb03d75699b7e214cb1c2e50d51a21d5eb0ee78891cbfe71a2"}], 0x188}, 0x20000000) 13:58:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000757130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 383.858306][T28129] ? bpf_map_area_alloc+0x20/0x30 [ 383.863393][T28129] __vmalloc_node_flags_caller+0x71/0x90 [ 383.869021][T28129] ? bpf_map_area_alloc+0x20/0x30 [ 383.874052][T28129] __bpf_map_area_alloc+0xde/0xf0 [ 383.879086][T28129] bpf_map_area_alloc+0x20/0x30 [ 383.883939][T28129] htab_map_alloc+0x8d3/0x11c0 [ 383.888711][T28129] ? htab_map_update_elem+0xca0/0xca0 [ 383.894112][T28129] __do_sys_bpf+0x478/0x3610 [ 383.898723][T28129] ? bpf_prog_load+0x1960/0x1960 [ 383.903669][T28129] ? __kasan_check_write+0x14/0x20 [ 383.908883][T28129] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 383.914436][T28129] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 383.919743][T28129] ? wait_for_completion+0x440/0x440 [ 383.925068][T28129] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 383.925096][T28129] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 383.936784][T28129] ? do_syscall_64+0x26/0x790 [ 383.941472][T28129] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.947539][T28129] ? do_syscall_64+0x26/0x790 [ 383.952226][T28129] __x64_sys_bpf+0x73/0xb0 [ 383.956655][T28129] do_syscall_64+0xfa/0x790 [ 383.961221][T28129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.967104][T28129] RIP: 0033:0x45a909 [ 383.967120][T28129] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.967136][T28129] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 383.999011][T28129] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 384.006993][T28129] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 384.014970][T28129] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 384.022967][T28129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 384.030965][T28129] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6558, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:28 executing program 1 (fault-call:2 fault-nth:25): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 384.325998][T28161] FAULT_INJECTION: forcing a failure. [ 384.325998][T28161] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.339596][T28161] CPU: 1 PID: 28161 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 384.348285][T28161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.358472][T28161] Call Trace: [ 384.361778][T28161] dump_stack+0x197/0x210 [ 384.366121][T28161] should_fail.cold+0xa/0x15 [ 384.370754][T28161] ? fault_create_debugfs_attr+0x180/0x180 [ 384.376570][T28161] ? ___might_sleep+0x163/0x2c0 [ 384.381430][T28161] should_fail_alloc_page+0x50/0x60 [ 384.381445][T28161] __alloc_pages_nodemask+0x1a1/0x910 [ 384.381461][T28161] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 384.381476][T28161] ? __alloc_pages_slowpath+0x2920/0x2920 [ 384.381496][T28161] ? kasan_unpoison_shadow+0x35/0x50 [ 384.408662][T28161] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 384.414900][T28161] alloc_pages_current+0x107/0x210 [ 384.414914][T28161] ? ___might_sleep+0x163/0x2c0 [ 384.414932][T28161] __vmalloc_node_range+0x4f8/0x810 [ 384.414953][T28161] ? bpf_map_area_alloc+0x20/0x30 [ 384.414971][T28161] __vmalloc_node_flags_caller+0x71/0x90 [ 384.440740][T28161] ? bpf_map_area_alloc+0x20/0x30 [ 384.445786][T28161] __bpf_map_area_alloc+0xde/0xf0 [ 384.450821][T28161] bpf_map_area_alloc+0x20/0x30 [ 384.455611][T28157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 384.455680][T28161] htab_map_alloc+0x8d3/0x11c0 [ 384.467719][T28161] ? htab_map_update_elem+0xca0/0xca0 [ 384.473101][T28161] __do_sys_bpf+0x478/0x3610 [ 384.477705][T28161] ? bpf_prog_load+0x1960/0x1960 [ 384.482653][T28161] ? __kasan_check_write+0x14/0x20 [ 384.487776][T28161] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 384.493330][T28161] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 384.498617][T28161] ? wait_for_completion+0x440/0x440 [ 384.503899][T28161] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 384.510143][T28161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 384.515596][T28161] ? do_syscall_64+0x26/0x790 [ 384.520288][T28161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.526345][T28161] ? do_syscall_64+0x26/0x790 [ 384.531018][T28161] __x64_sys_bpf+0x73/0xb0 [ 384.535446][T28161] do_syscall_64+0xfa/0x790 [ 384.539946][T28161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.545853][T28161] RIP: 0033:0x45a909 [ 384.549738][T28161] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 384.569326][T28161] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 384.577725][T28161] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 384.585695][T28161] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 384.593651][T28161] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 384.601607][T28161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 384.609563][T28161] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:28 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:28 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006558130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:28 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e4c0000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6800, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:28 executing program 1 (fault-call:2 fault-nth:26): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:28 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x1, 0x70, 0x8, 0x0, 0x80, 0x1, 0x0, 0xfff, 0x2000, 0x7f2650de3633e51, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x18, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x800, 0x5, 0x4, 0xa, 0x3, 0x6, 0x7}) 13:58:28 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000060130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 384.915045][T28178] FAULT_INJECTION: forcing a failure. [ 384.915045][T28178] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.970191][T28177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 384.987409][T28178] CPU: 1 PID: 28178 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 384.996139][T28178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.006204][T28178] Call Trace: [ 385.009518][T28178] dump_stack+0x197/0x210 [ 385.013866][T28178] should_fail.cold+0xa/0x15 13:58:29 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e600000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 385.018476][T28178] ? fault_create_debugfs_attr+0x180/0x180 [ 385.024306][T28178] ? ___might_sleep+0x163/0x2c0 [ 385.029440][T28178] should_fail_alloc_page+0x50/0x60 [ 385.034656][T28178] __alloc_pages_nodemask+0x1a1/0x910 [ 385.040040][T28178] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 385.045683][T28178] ? __alloc_pages_slowpath+0x2920/0x2920 [ 385.051415][T28178] ? kasan_unpoison_shadow+0x35/0x50 [ 385.056711][T28178] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 385.062966][T28178] alloc_pages_current+0x107/0x210 [ 385.068080][T28178] ? ___might_sleep+0x163/0x2c0 [ 385.072958][T28178] __vmalloc_node_range+0x4f8/0x810 [ 385.078179][T28178] ? bpf_map_area_alloc+0x20/0x30 [ 385.083224][T28178] __vmalloc_node_flags_caller+0x71/0x90 [ 385.088875][T28178] ? bpf_map_area_alloc+0x20/0x30 [ 385.091246][T28176] device nr0 entered promiscuous mode [ 385.093932][T28178] __bpf_map_area_alloc+0xde/0xf0 [ 385.093952][T28178] bpf_map_area_alloc+0x20/0x30 [ 385.093975][T28178] htab_map_alloc+0x8d3/0x11c0 [ 385.094001][T28178] ? htab_map_update_elem+0xca0/0xca0 13:58:29 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e005865130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 385.119433][T28178] __do_sys_bpf+0x478/0x3610 [ 385.124067][T28178] ? bpf_prog_load+0x1960/0x1960 [ 385.129018][T28178] ? __kasan_check_write+0x14/0x20 [ 385.134138][T28178] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 385.139696][T28178] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 385.144990][T28178] ? wait_for_completion+0x440/0x440 [ 385.150295][T28178] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 385.156552][T28178] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 385.162020][T28178] ? do_syscall_64+0x26/0x790 [ 385.166691][T28178] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.172752][T28178] ? do_syscall_64+0x26/0x790 [ 385.177438][T28178] __x64_sys_bpf+0x73/0xb0 [ 385.181932][T28178] do_syscall_64+0xfa/0x790 [ 385.186550][T28178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.192449][T28178] RIP: 0033:0x45a909 [ 385.196348][T28178] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:58:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 385.216240][T28178] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 385.224664][T28178] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 385.232723][T28178] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 385.240699][T28178] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.248695][T28178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 385.256771][T28178] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:29 executing program 1 (fault-call:2 fault-nth:27): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 385.487969][T28204] FAULT_INJECTION: forcing a failure. [ 385.487969][T28204] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 385.510287][T28204] CPU: 0 PID: 28204 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 385.518983][T28204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.529036][T28204] Call Trace: [ 385.532337][T28204] dump_stack+0x197/0x210 [ 385.536671][T28204] should_fail.cold+0xa/0x15 [ 385.541293][T28204] ? fault_create_debugfs_attr+0x180/0x180 [ 385.547102][T28204] ? ___might_sleep+0x163/0x2c0 [ 385.552009][T28204] should_fail_alloc_page+0x50/0x60 [ 385.557234][T28204] __alloc_pages_nodemask+0x1a1/0x910 [ 385.562592][T28204] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 385.568119][T28204] ? __alloc_pages_slowpath+0x2920/0x2920 [ 385.573835][T28204] ? kasan_unpoison_shadow+0x35/0x50 [ 385.579119][T28204] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 385.585414][T28204] alloc_pages_current+0x107/0x210 [ 385.590527][T28204] ? ___might_sleep+0x163/0x2c0 [ 385.595369][T28204] __vmalloc_node_range+0x4f8/0x810 [ 385.600571][T28204] ? bpf_map_area_alloc+0x20/0x30 [ 385.605600][T28204] __vmalloc_node_flags_caller+0x71/0x90 [ 385.611213][T28204] ? bpf_map_area_alloc+0x20/0x30 [ 385.616226][T28204] __bpf_map_area_alloc+0xde/0xf0 [ 385.621243][T28204] bpf_map_area_alloc+0x20/0x30 [ 385.626072][T28204] htab_map_alloc+0x8d3/0x11c0 [ 385.630820][T28204] ? htab_map_update_elem+0xca0/0xca0 [ 385.636171][T28204] __do_sys_bpf+0x478/0x3610 [ 385.640755][T28204] ? bpf_prog_load+0x1960/0x1960 [ 385.645698][T28204] ? __kasan_check_write+0x14/0x20 [ 385.650794][T28204] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 385.656464][T28204] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 385.661766][T28204] ? wait_for_completion+0x440/0x440 [ 385.667044][T28204] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 385.673278][T28204] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 385.678771][T28204] ? do_syscall_64+0x26/0x790 [ 385.683433][T28204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.689566][T28204] ? do_syscall_64+0x26/0x790 [ 385.694228][T28204] __x64_sys_bpf+0x73/0xb0 [ 385.698638][T28204] do_syscall_64+0xfa/0x790 [ 385.703214][T28204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.709095][T28204] RIP: 0033:0x45a909 [ 385.712970][T28204] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.732561][T28204] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 385.740950][T28204] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 385.748909][T28204] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 385.756957][T28204] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 385.764930][T28204] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 385.772885][T28204] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:29 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000081130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 385.804310][T28199] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7400, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:30 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0xd498) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(r3) 13:58:30 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e680000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:30 executing program 1 (fault-call:2 fault-nth:28): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:30 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000f0130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 386.063093][T28215] FAULT_INJECTION: forcing a failure. [ 386.063093][T28215] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.086630][T28221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 386.120337][T28215] CPU: 0 PID: 28215 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 386.129065][T28215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.139122][T28215] Call Trace: [ 386.142430][T28215] dump_stack+0x197/0x210 [ 386.146779][T28215] should_fail.cold+0xa/0x15 [ 386.151385][T28215] ? fault_create_debugfs_attr+0x180/0x180 [ 386.157201][T28215] ? ___might_sleep+0x163/0x2c0 [ 386.162075][T28215] should_fail_alloc_page+0x50/0x60 [ 386.167279][T28215] __alloc_pages_nodemask+0x1a1/0x910 [ 386.167299][T28215] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 386.167316][T28215] ? __alloc_pages_slowpath+0x2920/0x2920 [ 386.167338][T28215] ? kasan_unpoison_shadow+0x35/0x50 [ 386.189475][T28215] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 386.195763][T28215] alloc_pages_current+0x107/0x210 [ 386.200886][T28215] ? ___might_sleep+0x163/0x2c0 [ 386.205756][T28215] __vmalloc_node_range+0x4f8/0x810 [ 386.210959][T28215] ? bpf_map_area_alloc+0x20/0x30 13:58:30 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000000f0081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 386.210978][T28215] __vmalloc_node_flags_caller+0x71/0x90 [ 386.210992][T28215] ? bpf_map_area_alloc+0x20/0x30 [ 386.211006][T28215] __bpf_map_area_alloc+0xde/0xf0 [ 386.211021][T28215] bpf_map_area_alloc+0x20/0x30 [ 386.211036][T28215] htab_map_alloc+0x8d3/0x11c0 [ 386.211063][T28215] ? htab_map_update_elem+0xca0/0xca0 [ 386.211078][T28215] __do_sys_bpf+0x478/0x3610 [ 386.211094][T28215] ? bpf_prog_load+0x1960/0x1960 [ 386.211113][T28215] ? __kasan_check_write+0x14/0x20 [ 386.231767][T28215] ? __mutex_unlock_slowpath+0xf0/0x6a0 13:58:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 386.231784][T28215] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 386.231796][T28215] ? wait_for_completion+0x440/0x440 [ 386.231817][T28215] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.231844][T28215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 386.231857][T28215] ? do_syscall_64+0x26/0x790 [ 386.231870][T28215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.231888][T28215] ? do_syscall_64+0x26/0x790 [ 386.241691][T28215] __x64_sys_bpf+0x73/0xb0 [ 386.241711][T28215] do_syscall_64+0xfa/0x790 [ 386.261750][T28215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.261763][T28215] RIP: 0033:0x45a909 [ 386.261777][T28215] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.261784][T28215] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 386.261797][T28215] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 386.261804][T28215] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:58:30 executing program 1 (fault-call:2 fault-nth:29): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:30 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e6c0000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 386.261812][T28215] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 386.261820][T28215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 386.261827][T28215] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 386.512336][T28233] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 386.550917][T28249] FAULT_INJECTION: forcing a failure. 13:58:30 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 386.550917][T28249] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.612216][T28249] CPU: 0 PID: 28249 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 386.620951][T28249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.631016][T28249] Call Trace: [ 386.634316][T28249] dump_stack+0x197/0x210 [ 386.638949][T28249] should_fail.cold+0xa/0x15 [ 386.643554][T28249] ? fault_create_debugfs_attr+0x180/0x180 [ 386.649376][T28249] ? ___might_sleep+0x163/0x2c0 [ 386.654259][T28249] should_fail_alloc_page+0x50/0x60 [ 386.659477][T28249] __alloc_pages_nodemask+0x1a1/0x910 [ 386.665211][T28249] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 386.670775][T28249] ? __alloc_pages_slowpath+0x2920/0x2920 [ 386.676510][T28249] ? kasan_unpoison_shadow+0x35/0x50 [ 386.681798][T28249] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 386.688042][T28249] alloc_pages_current+0x107/0x210 [ 386.693164][T28249] ? ___might_sleep+0x163/0x2c0 [ 386.698030][T28249] __vmalloc_node_range+0x4f8/0x810 [ 386.703248][T28249] ? bpf_map_area_alloc+0x20/0x30 [ 386.708286][T28249] __vmalloc_node_flags_caller+0x71/0x90 [ 386.713928][T28249] ? bpf_map_area_alloc+0x20/0x30 [ 386.718964][T28249] __bpf_map_area_alloc+0xde/0xf0 [ 386.724000][T28249] bpf_map_area_alloc+0x20/0x30 [ 386.724665][T28234] device nr0 entered promiscuous mode [ 386.728849][T28249] htab_map_alloc+0x8d3/0x11c0 [ 386.728879][T28249] ? htab_map_update_elem+0xca0/0xca0 [ 386.728896][T28249] __do_sys_bpf+0x478/0x3610 [ 386.728916][T28249] ? bpf_prog_load+0x1960/0x1960 [ 386.753940][T28249] ? __kasan_check_write+0x14/0x20 [ 386.759063][T28249] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 386.764593][T28249] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 386.769868][T28249] ? wait_for_completion+0x440/0x440 [ 386.775258][T28249] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.781498][T28249] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 386.786938][T28249] ? do_syscall_64+0x26/0x790 [ 386.791600][T28249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.797647][T28249] ? do_syscall_64+0x26/0x790 [ 386.802313][T28249] __x64_sys_bpf+0x73/0xb0 [ 386.806716][T28249] do_syscall_64+0xfa/0x790 [ 386.811207][T28249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.817081][T28249] RIP: 0033:0x45a909 [ 386.820962][T28249] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.840564][T28249] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 386.848959][T28249] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 386.856928][T28249] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 386.864888][T28249] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 386.872842][T28249] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 386.880796][T28249] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 386.895687][T28253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:31 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000002130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa109, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:31 executing program 1 (fault-call:2 fault-nth:30): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:31 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e740000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:31 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 387.439531][T28269] FAULT_INJECTION: forcing a failure. [ 387.439531][T28269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 387.458698][T28272] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 387.474462][T28269] CPU: 0 PID: 28269 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 387.483186][T28269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.494119][T28269] Call Trace: [ 387.497446][T28269] dump_stack+0x197/0x210 [ 387.501809][T28269] should_fail.cold+0xa/0x15 [ 387.506449][T28269] ? fault_create_debugfs_attr+0x180/0x180 [ 387.506474][T28269] ? ___might_sleep+0x163/0x2c0 [ 387.517194][T28269] should_fail_alloc_page+0x50/0x60 [ 387.522585][T28269] __alloc_pages_nodemask+0x1a1/0x910 [ 387.527983][T28269] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 387.533563][T28269] ? __alloc_pages_slowpath+0x2920/0x2920 [ 387.539470][T28269] ? kasan_unpoison_shadow+0x35/0x50 [ 387.539487][T28269] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 387.539513][T28269] alloc_pages_current+0x107/0x210 [ 387.556141][T28269] ? ___might_sleep+0x163/0x2c0 [ 387.561109][T28269] __vmalloc_node_range+0x4f8/0x810 [ 387.566326][T28269] ? bpf_map_area_alloc+0x20/0x30 [ 387.571380][T28269] __vmalloc_node_flags_caller+0x71/0x90 [ 387.571396][T28269] ? bpf_map_area_alloc+0x20/0x30 [ 387.571415][T28269] __bpf_map_area_alloc+0xde/0xf0 [ 387.587080][T28269] bpf_map_area_alloc+0x20/0x30 [ 387.587097][T28269] htab_map_alloc+0x8d3/0x11c0 [ 387.587122][T28269] ? htab_map_update_elem+0xca0/0xca0 [ 387.596703][T28269] __do_sys_bpf+0x478/0x3610 [ 387.596724][T28269] ? bpf_prog_load+0x1960/0x1960 [ 387.596739][T28269] ? __kasan_check_write+0x14/0x20 [ 387.596758][T28269] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 387.606697][T28269] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 387.606714][T28269] ? wait_for_completion+0x440/0x440 [ 387.606736][T28269] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 13:58:31 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e7a0000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 387.606762][T28269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 387.616780][T28269] ? do_syscall_64+0x26/0x790 [ 387.616795][T28269] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.616810][T28269] ? do_syscall_64+0x26/0x790 [ 387.616829][T28269] __x64_sys_bpf+0x73/0xb0 [ 387.616849][T28269] do_syscall_64+0xfa/0x790 [ 387.627655][T28269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.627668][T28269] RIP: 0033:0x45a909 [ 387.627684][T28269] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 387.627692][T28269] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 387.627706][T28269] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 387.627713][T28269] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 387.627725][T28269] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 387.639209][T28269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 13:58:31 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000003130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 387.639218][T28269] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 387.794817][T28282] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:31 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2ef00000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:31 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x400) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x5, 0x5, 0x80, 0x0, 0x7, 0x102, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000000), 0xc}, 0x1000, 0x5, 0x2, 0x9, 0x6, 0x2, 0x31}, r2, 0xc, 0xffffffffffffffff, 0xdbff1e293819abd1) [ 388.035582][T28280] device nr0 entered promiscuous mode [ 388.053780][T28305] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:32 executing program 1 (fault-call:2 fault-nth:31): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:32 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000004130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:32 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000300200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:32 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x29, 0x7, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x8, 0x6, 0x3, 0x5, 0x0, 0xa74, 0x4002, 0x5a280241ce6bd881, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x400, 0x8, 0x4, 0x4, 0x1, 0x10000, 0x6000}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 13:58:32 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000500200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:32 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000006130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 388.565613][T28325] FAULT_INJECTION: forcing a failure. [ 388.565613][T28325] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 388.609608][T28324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 388.650240][T28325] CPU: 1 PID: 28325 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 388.659064][T28325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.669130][T28325] Call Trace: [ 388.672449][T28325] dump_stack+0x197/0x210 [ 388.676809][T28325] should_fail.cold+0xa/0x15 [ 388.681419][T28325] ? fault_create_debugfs_attr+0x180/0x180 [ 388.687240][T28325] ? ___might_sleep+0x163/0x2c0 [ 388.692117][T28325] should_fail_alloc_page+0x50/0x60 [ 388.697328][T28325] __alloc_pages_nodemask+0x1a1/0x910 [ 388.702712][T28325] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 388.708270][T28325] ? __alloc_pages_slowpath+0x2920/0x2920 [ 388.714000][T28325] ? kasan_unpoison_shadow+0x35/0x50 [ 388.718420][T28326] device nr0 entered promiscuous mode [ 388.719286][T28325] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 388.719307][T28325] alloc_pages_current+0x107/0x210 [ 388.719322][T28325] ? ___might_sleep+0x163/0x2c0 [ 388.719340][T28325] __vmalloc_node_range+0x4f8/0x810 [ 388.719362][T28325] ? bpf_map_area_alloc+0x20/0x30 [ 388.751430][T28325] __vmalloc_node_flags_caller+0x71/0x90 [ 388.757050][T28325] ? bpf_map_area_alloc+0x20/0x30 [ 388.762070][T28325] __bpf_map_area_alloc+0xde/0xf0 [ 388.767093][T28325] bpf_map_area_alloc+0x20/0x30 [ 388.771937][T28325] htab_map_alloc+0x8d3/0x11c0 [ 388.776711][T28325] ? htab_map_update_elem+0xca0/0xca0 [ 388.782117][T28325] __do_sys_bpf+0x478/0x3610 [ 388.786736][T28325] ? bpf_prog_load+0x1960/0x1960 [ 388.791674][T28325] ? __kasan_check_write+0x14/0x20 [ 388.796908][T28325] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 388.802457][T28325] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 388.807786][T28325] ? wait_for_completion+0x440/0x440 [ 388.813086][T28325] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 388.819337][T28325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.824821][T28325] ? do_syscall_64+0x26/0x790 [ 388.829490][T28325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.835539][T28325] ? do_syscall_64+0x26/0x790 [ 388.840223][T28325] __x64_sys_bpf+0x73/0xb0 [ 388.844692][T28325] do_syscall_64+0xfa/0x790 [ 388.849208][T28325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.855108][T28325] RIP: 0033:0x45a909 [ 388.859000][T28325] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.878710][T28325] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 388.887214][T28325] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 13:58:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 388.895184][T28325] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 388.903178][T28325] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 388.911161][T28325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 388.919119][T28325] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:33 executing program 1 (fault-call:2 fault-nth:32): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 389.131894][T28345] FAULT_INJECTION: forcing a failure. [ 389.131894][T28345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 389.159104][T28345] CPU: 0 PID: 28345 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 389.167841][T28345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.178064][T28345] Call Trace: [ 389.181469][T28345] dump_stack+0x197/0x210 [ 389.185794][T28345] should_fail.cold+0xa/0x15 [ 389.190506][T28345] ? fault_create_debugfs_attr+0x180/0x180 [ 389.196315][T28345] ? ___might_sleep+0x163/0x2c0 [ 389.201305][T28345] should_fail_alloc_page+0x50/0x60 [ 389.206608][T28345] __alloc_pages_nodemask+0x1a1/0x910 [ 389.212023][T28345] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 389.217698][T28345] ? __alloc_pages_slowpath+0x2920/0x2920 [ 389.223419][T28345] ? kasan_unpoison_shadow+0x35/0x50 [ 389.228707][T28345] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 389.234942][T28345] alloc_pages_current+0x107/0x210 [ 389.240154][T28345] ? ___might_sleep+0x163/0x2c0 [ 389.244989][T28345] __vmalloc_node_range+0x4f8/0x810 [ 389.250336][T28345] ? bpf_map_area_alloc+0x20/0x30 [ 389.255363][T28345] __vmalloc_node_flags_caller+0x71/0x90 [ 389.260984][T28345] ? bpf_map_area_alloc+0x20/0x30 [ 389.266005][T28345] __bpf_map_area_alloc+0xde/0xf0 [ 389.271024][T28345] bpf_map_area_alloc+0x20/0x30 [ 389.275863][T28345] htab_map_alloc+0x8d3/0x11c0 [ 389.280621][T28345] ? htab_map_update_elem+0xca0/0xca0 [ 389.285974][T28345] __do_sys_bpf+0x478/0x3610 [ 389.290560][T28345] ? bpf_prog_load+0x1960/0x1960 [ 389.295504][T28345] ? __kasan_check_write+0x14/0x20 [ 389.300610][T28345] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 389.306282][T28345] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 389.311572][T28345] ? wait_for_completion+0x440/0x440 [ 389.316863][T28345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 389.323119][T28345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.328578][T28345] ? do_syscall_64+0x26/0x790 [ 389.333256][T28345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.339347][T28345] ? do_syscall_64+0x26/0x790 [ 389.344046][T28345] __x64_sys_bpf+0x73/0xb0 [ 389.348471][T28345] do_syscall_64+0xfa/0x790 [ 389.352968][T28345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.358845][T28345] RIP: 0033:0x45a909 [ 389.362777][T28345] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.382402][T28345] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 389.390810][T28345] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 389.398788][T28345] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 389.406757][T28345] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 389.414720][T28345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 389.422798][T28345] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:33 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x3ff}, 0x0, 0x0, 0x0, 0x3, 0x80, 0x0, 0x8}, r1, 0x0, 0xffffffffffffffff, 0x0) close(r2) 13:58:33 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000a130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 389.440817][T28343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:33 executing program 1 (fault-call:2 fault-nth:33): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:33 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000600200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:33 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000c130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 389.698024][T28361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 389.716088][T28360] FAULT_INJECTION: forcing a failure. [ 389.716088][T28360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 389.778699][T28360] CPU: 0 PID: 28360 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 389.787422][T28360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.787430][T28360] Call Trace: [ 389.787457][T28360] dump_stack+0x197/0x210 [ 389.787480][T28360] should_fail.cold+0xa/0x15 [ 389.809736][T28360] ? fault_create_debugfs_attr+0x180/0x180 [ 389.815556][T28360] ? ___might_sleep+0x163/0x2c0 [ 389.820451][T28360] should_fail_alloc_page+0x50/0x60 [ 389.820465][T28360] __alloc_pages_nodemask+0x1a1/0x910 [ 389.820480][T28360] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 389.820494][T28360] ? __alloc_pages_slowpath+0x2920/0x2920 [ 389.820513][T28360] ? kasan_unpoison_shadow+0x35/0x50 [ 389.831072][T28360] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 389.831090][T28360] alloc_pages_current+0x107/0x210 [ 389.831102][T28360] ? ___might_sleep+0x163/0x2c0 [ 389.831120][T28360] __vmalloc_node_range+0x4f8/0x810 [ 389.831144][T28360] ? bpf_map_area_alloc+0x20/0x30 [ 389.831156][T28360] __vmalloc_node_flags_caller+0x71/0x90 [ 389.831173][T28360] ? bpf_map_area_alloc+0x20/0x30 [ 389.854088][T28360] __bpf_map_area_alloc+0xde/0xf0 [ 389.854106][T28360] bpf_map_area_alloc+0x20/0x30 [ 389.854119][T28360] htab_map_alloc+0x8d3/0x11c0 [ 389.854144][T28360] ? htab_map_update_elem+0xca0/0xca0 [ 389.854166][T28360] __do_sys_bpf+0x478/0x3610 [ 389.854183][T28360] ? bpf_prog_load+0x1960/0x1960 [ 389.854198][T28360] ? __kasan_check_write+0x14/0x20 [ 389.854211][T28360] ? __mutex_unlock_slowpath+0xf0/0x6a0 13:58:33 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x5, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) close(r1) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xb6c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r2}) 13:58:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 389.854233][T28360] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 389.885379][T28360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.905333][T28360] ? debug_smp_processor_id+0x33/0x18a [ 389.905353][T28360] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 389.905390][T28360] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.919994][T28360] ? do_syscall_64+0x26/0x790 [ 389.920011][T28360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.920023][T28360] ? do_syscall_64+0x26/0x790 [ 389.920043][T28360] __x64_sys_bpf+0x73/0xb0 [ 389.920059][T28360] do_syscall_64+0xfa/0x790 [ 389.920075][T28360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.920085][T28360] RIP: 0033:0x45a909 [ 389.920103][T28360] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.958930][T28360] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 389.958946][T28360] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 13:58:34 executing program 1 (fault-call:2 fault-nth:34): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000700200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 389.958954][T28360] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 389.958963][T28360] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 389.958972][T28360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 389.958979][T28360] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 390.132606][T28370] device nr0 entered promiscuous mode [ 390.141765][T28378] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 390.203374][T28389] FAULT_INJECTION: forcing a failure. [ 390.203374][T28389] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 390.252336][T28389] CPU: 1 PID: 28389 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 390.261093][T28389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.271176][T28389] Call Trace: [ 390.274480][T28389] dump_stack+0x197/0x210 [ 390.278822][T28389] should_fail.cold+0xa/0x15 [ 390.283423][T28389] ? fault_create_debugfs_attr+0x180/0x180 [ 390.289272][T28389] ? ___might_sleep+0x163/0x2c0 [ 390.294137][T28389] should_fail_alloc_page+0x50/0x60 [ 390.299348][T28389] __alloc_pages_nodemask+0x1a1/0x910 [ 390.304737][T28389] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 390.310307][T28389] ? __alloc_pages_slowpath+0x2920/0x2920 [ 390.316046][T28389] ? kasan_unpoison_shadow+0x35/0x50 [ 390.321343][T28389] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 390.327597][T28389] alloc_pages_current+0x107/0x210 [ 390.332715][T28389] ? ___might_sleep+0x163/0x2c0 [ 390.337578][T28389] __vmalloc_node_range+0x4f8/0x810 [ 390.342790][T28389] ? bpf_map_area_alloc+0x20/0x30 [ 390.347819][T28389] __vmalloc_node_flags_caller+0x71/0x90 [ 390.353457][T28389] ? bpf_map_area_alloc+0x20/0x30 [ 390.358488][T28389] __bpf_map_area_alloc+0xde/0xf0 [ 390.363514][T28389] bpf_map_area_alloc+0x20/0x30 [ 390.368370][T28389] htab_map_alloc+0x8d3/0x11c0 [ 390.373199][T28389] ? htab_map_update_elem+0xca0/0xca0 [ 390.378582][T28389] __do_sys_bpf+0x478/0x3610 [ 390.383182][T28389] ? bpf_prog_load+0x1960/0x1960 [ 390.388121][T28389] ? __kasan_check_write+0x14/0x20 [ 390.393238][T28389] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 390.398785][T28389] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 390.404077][T28389] ? wait_for_completion+0x440/0x440 [ 390.409546][T28389] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 390.415882][T28389] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 390.421352][T28389] ? do_syscall_64+0x26/0x790 [ 390.426138][T28389] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.432217][T28389] ? do_syscall_64+0x26/0x790 [ 390.436979][T28389] __x64_sys_bpf+0x73/0xb0 [ 390.441383][T28389] do_syscall_64+0xfa/0x790 [ 390.445950][T28389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.451855][T28389] RIP: 0033:0x45a909 [ 390.455735][T28389] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 390.475326][T28389] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 390.483741][T28389] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 390.491709][T28389] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 390.499671][T28389] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 390.507847][T28389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 390.515810][T28389] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e690900200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000e130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 390.570124][T28391] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:34 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, r2, 0x8) r3 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x23, 0x9, 0x40, 0xff, 0x0, 0x100, 0x800, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x800, 0x34, 0x0, 0x9, 0xfe0000, 0x8, 0x20}, r1, 0x10, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0xf, 0x0) close(r4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\xfc', 0x248800) r7 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0xffffffffffffff0c) r8 = openat$cgroup(r5, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r8, &(0x7f0000000180)='cpu.stat\x00\xfb\xf0\'\xd82(\\\xc5\xec\x92[\xe1\xed\xc0C\xb7\x15@\xe1*K^{\x1f\x03\xa8\xb1jMkd\xcc\xa7\xca^eM\xe7t\x9d\x9f\xec\x9b<\xb5\xb2D\xbe\x19\xcb\x1eUDt\n0\x94\xd2:\x1b\xa2r\t\xe9\x8a\x1c\x1e\x05\x90\xdc\xe8\xe0\xd4\xaf\xb2\xfd\xe8\x93\r\xec\x16`\xd0x\x84xf\x8bI\xf5Z\x8d\xa4\xd6\xca\xc6\x8a\xc8\x00\x00\x00\x00\x00\xe5\xd0q\xc2\xaf&2\x9a\x12f\xf9^\x05\xfeO\xf2\'\xc8\br\xfd_Ic\x19=\x85\xe2\x14\x85W,\x0fl\xa4\x8bK\xd5S[\xef\x13\"\xd1\x80\xb8\xf5\xf7PY\x81\"=\xe8\x1a\x05\x05\rB\x8a\xda]\x98\xf9\x83\xa5w&<\x86\xa5\xba\xe0\xcd\x0f\xd4\xe3F\x95o\xbe\x94\xad3\xa1\x1fGY_\x11T\x1a\xbf\x8b\x8ew\x96\x85\xb7?\xc0b\xa2\xc8\xf9A\xa6\xa3\xb7/B\xaaw\x19\xf8\xefv\xaajF\xad\xc4\xe0\x15&\xb9\xadU\xe4\x0f\x90i\xceh\xafz\xd0\xd6&C\x90\x97=d\x8c\xfa\xb1\xc2M', 0x0, 0x0) 13:58:34 executing program 1 (fault-call:2 fault-nth:35): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000a00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000f130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 390.823079][T28406] FAULT_INJECTION: forcing a failure. [ 390.823079][T28406] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 390.861410][T28411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 390.879177][T28406] CPU: 1 PID: 28406 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 390.887898][T28406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.897968][T28406] Call Trace: [ 390.897994][T28406] dump_stack+0x197/0x210 [ 390.898013][T28406] should_fail.cold+0xa/0x15 [ 390.898029][T28406] ? fault_create_debugfs_attr+0x180/0x180 [ 390.898044][T28406] ? ___might_sleep+0x163/0x2c0 [ 390.898067][T28406] should_fail_alloc_page+0x50/0x60 [ 390.926070][T28406] __alloc_pages_nodemask+0x1a1/0x910 [ 390.931469][T28406] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 390.937021][T28406] ? __alloc_pages_slowpath+0x2920/0x2920 [ 390.942753][T28406] ? kasan_unpoison_shadow+0x35/0x50 [ 390.948045][T28406] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 390.954299][T28406] alloc_pages_current+0x107/0x210 [ 390.959415][T28406] ? ___might_sleep+0x163/0x2c0 [ 390.964274][T28406] __vmalloc_node_range+0x4f8/0x810 [ 390.969491][T28406] ? bpf_map_area_alloc+0x20/0x30 [ 390.974528][T28406] __vmalloc_node_flags_caller+0x71/0x90 [ 390.980168][T28406] ? bpf_map_area_alloc+0x20/0x30 [ 390.985205][T28406] __bpf_map_area_alloc+0xde/0xf0 [ 390.990233][T28406] bpf_map_area_alloc+0x20/0x30 [ 390.990251][T28406] htab_map_alloc+0x8d3/0x11c0 [ 390.990279][T28406] ? htab_map_update_elem+0xca0/0xca0 [ 390.990294][T28406] __do_sys_bpf+0x478/0x3610 [ 390.990312][T28406] ? bpf_prog_load+0x1960/0x1960 [ 390.990326][T28406] ? __kasan_check_write+0x14/0x20 [ 390.990338][T28406] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 390.990357][T28406] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 390.999945][T28406] ? wait_for_completion+0x440/0x440 [ 390.999970][T28406] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 390.999997][T28406] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 391.000011][T28406] ? do_syscall_64+0x26/0x790 [ 391.000029][T28406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.009956][T28406] ? do_syscall_64+0x26/0x790 [ 391.009979][T28406] __x64_sys_bpf+0x73/0xb0 [ 391.009995][T28406] do_syscall_64+0xfa/0x790 [ 391.010015][T28406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.010026][T28406] RIP: 0033:0x45a909 [ 391.010044][T28406] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 391.020067][T28406] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 391.020083][T28406] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 391.020092][T28406] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:58:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:35 executing program 1 (fault-call:2 fault-nth:36): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000c00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 391.020100][T28406] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 391.020113][T28406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 391.020122][T28406] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:35 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000010130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'ip6tnl0\x00', 0x800}) [ 391.325486][T28417] device nr0 entered promiscuous mode [ 391.339138][T28426] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 391.358487][T28435] FAULT_INJECTION: forcing a failure. [ 391.358487][T28435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000e00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 391.443446][T28435] CPU: 0 PID: 28435 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 391.452180][T28435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.452187][T28435] Call Trace: [ 391.452210][T28435] dump_stack+0x197/0x210 [ 391.452232][T28435] should_fail.cold+0xa/0x15 [ 391.452251][T28435] ? fault_create_debugfs_attr+0x180/0x180 [ 391.452268][T28435] ? ___might_sleep+0x163/0x2c0 [ 391.452293][T28435] should_fail_alloc_page+0x50/0x60 [ 391.452306][T28435] __alloc_pages_nodemask+0x1a1/0x910 [ 391.452323][T28435] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 391.452338][T28435] ? __alloc_pages_slowpath+0x2920/0x2920 [ 391.452359][T28435] ? kasan_unpoison_shadow+0x35/0x50 [ 391.452377][T28435] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 391.452395][T28435] alloc_pages_current+0x107/0x210 [ 391.452407][T28435] ? ___might_sleep+0x163/0x2c0 [ 391.452426][T28435] __vmalloc_node_range+0x4f8/0x810 [ 391.452448][T28435] ? bpf_map_area_alloc+0x20/0x30 [ 391.452467][T28435] __vmalloc_node_flags_caller+0x71/0x90 [ 391.518625][T28435] ? bpf_map_area_alloc+0x20/0x30 [ 391.518644][T28435] __bpf_map_area_alloc+0xde/0xf0 [ 391.518663][T28435] bpf_map_area_alloc+0x20/0x30 [ 391.559285][T28435] htab_map_alloc+0x8d3/0x11c0 [ 391.564071][T28435] ? htab_map_update_elem+0xca0/0xca0 [ 391.569453][T28435] __do_sys_bpf+0x478/0x3610 [ 391.574052][T28435] ? bpf_prog_load+0x1960/0x1960 [ 391.578995][T28435] ? __kasan_check_write+0x14/0x20 [ 391.584115][T28435] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 391.589660][T28435] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 391.594931][T28435] ? wait_for_completion+0x440/0x440 [ 391.600209][T28435] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 391.606445][T28435] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 391.611886][T28435] ? do_syscall_64+0x26/0x790 [ 391.616545][T28435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.622594][T28435] ? do_syscall_64+0x26/0x790 [ 391.627259][T28435] __x64_sys_bpf+0x73/0xb0 [ 391.631660][T28435] do_syscall_64+0xfa/0x790 [ 391.636152][T28435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.642027][T28435] RIP: 0033:0x45a909 [ 391.645906][T28435] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 391.665507][T28435] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 391.673901][T28435] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 391.681855][T28435] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 391.689821][T28435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 391.697792][T28435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 391.705744][T28435] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:36 executing program 1 (fault-call:2 fault-nth:37): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000f00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000060130081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:36 executing program 3: r0 = socket$kcm(0x2b, 0x5ab30a1095e4fb0d, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xbf, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000200), &(0x7f0000000100)}, 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)="ad9346999633067550ef1bed4e5684236399791e88cce3af8bed16b92926ab9daf94f2b7d599a539759e3561f2c7b7dc48a1e1b98ca441c38d81c82a61ab", 0x3e}], 0x2, &(0x7f0000000240)=[{0x70, 0x104, 0x3, "9e41dfd22cbbe97d5f51075bdf9ddf87ab30bc16bb44176ae5b911b22097c5ee4eff68fadc6bdffedaa3d8bcd263bc639f31f41fb605c85fe783c46d2b015e6ff38ffdd567636bb00b280b5c6619e29d47b7e9e6ffec482227504ef9b009d16b"}, {0x100, 0x101, 0x9, "37558f62783cd5eec08266637590052b476678d00bc2be2ad3138dd690e3168163e23216cb755700b5adab22100f5dceee49dbeee469351c69de6f1b50075382aedc62d0eff1baa6d563f29cc5bff8cf71d435106ff8109849f44c5c0689ebb9b2db95a5b0f632e814c109035fc789102dc9bc4009b3a54645b0309ea9db0ad8d2701974dbd99a36679d8f0f651646b4c2966882901c484ab8f218ee60ad75ac8814f3a2121847e1055386617d5890fdf6f7c3a50204185e7fba3ee6250c3743e3793b89f31e33166168d883b7053b1bed2d23fe8e52a12b601aa98b1a344c8df8da67e0bf606bd645a2"}, {0x10, 0x111, 0x8}], 0x180}, 0x8000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, 0x0, &(0x7f0000001440)=""/193}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000000)="3227f8fd1872c652ba3ee6f31d9e120764859bc3548568c27dc3cf3183423fad604e50d866e93da961f9d3f84c2c38ee0055d707ac6bdf7777d7213b6978177a17de904fcaa716c5ae9f2bf6594414d7949e7d2a1a502a"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0x1, &(0x7f0000000180)="51a0f371e62fed8afcbe153b6a"}, 0x20) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) 13:58:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e002000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 392.163702][T28462] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 392.173840][T28463] FAULT_INJECTION: forcing a failure. [ 392.173840][T28463] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000200081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 392.264870][T28468] device nr0 entered promiscuous mode [ 392.281237][T28463] CPU: 0 PID: 28463 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 392.289963][T28463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.300053][T28463] Call Trace: [ 392.304769][T28463] dump_stack+0x197/0x210 [ 392.309118][T28463] should_fail.cold+0xa/0x15 [ 392.313725][T28463] ? fault_create_debugfs_attr+0x180/0x180 [ 392.319645][T28463] ? ___might_sleep+0x163/0x2c0 [ 392.324522][T28463] should_fail_alloc_page+0x50/0x60 [ 392.329728][T28463] __alloc_pages_nodemask+0x1a1/0x910 [ 392.335115][T28463] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 392.340670][T28463] ? __alloc_pages_slowpath+0x2920/0x2920 [ 392.346567][T28463] ? kasan_unpoison_shadow+0x35/0x50 [ 392.351868][T28463] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 392.358121][T28463] alloc_pages_current+0x107/0x210 [ 392.363259][T28463] ? ___might_sleep+0x163/0x2c0 [ 392.368120][T28463] __vmalloc_node_range+0x4f8/0x810 [ 392.370924][T28478] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 392.373329][T28463] ? bpf_map_area_alloc+0x20/0x30 [ 392.373347][T28463] __vmalloc_node_flags_caller+0x71/0x90 [ 392.373362][T28463] ? bpf_map_area_alloc+0x20/0x30 [ 392.373383][T28463] __bpf_map_area_alloc+0xde/0xf0 [ 392.403306][T28463] bpf_map_area_alloc+0x20/0x30 13:58:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e003f00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 392.406814][T28479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 392.410680][T28463] htab_map_alloc+0x8d3/0x11c0 [ 392.410711][T28463] ? htab_map_update_elem+0xca0/0xca0 [ 392.410728][T28463] __do_sys_bpf+0x478/0x3610 [ 392.410746][T28463] ? bpf_prog_load+0x1960/0x1960 [ 392.410759][T28463] ? __kasan_check_write+0x14/0x20 [ 392.410773][T28463] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 392.410787][T28463] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 392.410802][T28463] ? wait_for_completion+0x440/0x440 [ 392.410825][T28463] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 392.410852][T28463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.470594][T28463] ? do_syscall_64+0x26/0x790 [ 392.475286][T28463] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.481365][T28463] ? do_syscall_64+0x26/0x790 [ 392.486039][T28463] __x64_sys_bpf+0x73/0xb0 [ 392.490441][T28463] do_syscall_64+0xfa/0x790 [ 392.494948][T28463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.500827][T28463] RIP: 0033:0x45a909 [ 392.504711][T28463] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 392.524300][T28463] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 392.532697][T28463] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 392.540655][T28463] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 392.548619][T28463] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 392.556745][T28463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 13:58:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000250081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 392.564786][T28463] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 392.893164][T28492] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 392.905662][T28493] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. 13:58:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:58:37 executing program 1 (fault-call:2 fault-nth:38): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e004000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000400081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 393.193335][T28503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000006f0081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e004800200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 393.327105][T28517] FAULT_INJECTION: forcing a failure. [ 393.327105][T28517] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 393.377352][T28517] CPU: 1 PID: 28517 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 393.386089][T28517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.392780][T28510] device nr0 entered promiscuous mode [ 393.396143][T28517] Call Trace: [ 393.396171][T28517] dump_stack+0x197/0x210 [ 393.396192][T28517] should_fail.cold+0xa/0x15 [ 393.396211][T28517] ? fault_create_debugfs_attr+0x180/0x180 [ 393.419650][T28517] ? ___might_sleep+0x163/0x2c0 [ 393.424521][T28517] should_fail_alloc_page+0x50/0x60 [ 393.429873][T28517] __alloc_pages_nodemask+0x1a1/0x910 [ 393.435253][T28517] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 393.440807][T28517] ? __alloc_pages_slowpath+0x2920/0x2920 [ 393.446560][T28517] ? kasan_unpoison_shadow+0x35/0x50 [ 393.451855][T28517] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 393.458110][T28517] alloc_pages_current+0x107/0x210 [ 393.463224][T28517] ? ___might_sleep+0x163/0x2c0 [ 393.468169][T28517] __vmalloc_node_range+0x4f8/0x810 [ 393.473381][T28517] ? bpf_map_area_alloc+0x20/0x30 [ 393.478412][T28517] __vmalloc_node_flags_caller+0x71/0x90 [ 393.484925][T28517] ? bpf_map_area_alloc+0x20/0x30 [ 393.490049][T28517] __bpf_map_area_alloc+0xde/0xf0 [ 393.495177][T28517] bpf_map_area_alloc+0x20/0x30 [ 393.500660][T28517] htab_map_alloc+0x8d3/0x11c0 [ 393.505434][T28517] ? htab_map_update_elem+0xca0/0xca0 [ 393.510810][T28517] __do_sys_bpf+0x478/0x3610 [ 393.514326][T28524] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 393.515408][T28517] ? bpf_prog_load+0x1960/0x1960 [ 393.515424][T28517] ? __kasan_check_write+0x14/0x20 [ 393.515443][T28517] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 393.538275][T28517] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 393.543567][T28517] ? wait_for_completion+0x440/0x440 [ 393.548866][T28517] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 393.555126][T28517] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 393.560591][T28517] ? do_syscall_64+0x26/0x790 [ 393.565276][T28517] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.571347][T28517] ? do_syscall_64+0x26/0x790 13:58:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e004c00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 393.576060][T28517] __x64_sys_bpf+0x73/0xb0 [ 393.580497][T28517] do_syscall_64+0xfa/0x790 [ 393.585008][T28517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.590904][T28517] RIP: 0033:0x45a909 [ 393.594803][T28517] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 393.614412][T28517] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:58:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x2710, @reserved}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)="09a3d0db58feccfba1cae2d9dda0bf758e2fd7b57dbe53d37278f23b1b9b73c03e1b3d25a9eadcca639fc25b7c5871890f44c7fb3d46cebe64fb8a17498b778f7142ce6bb2699febb5a5ad7cce3808f24f3209ac99adcf2503c9751c261792fb9f82519e702b46d740b46e4ab374fbdd1d52212a940c828396e1fe73e5d176c4f1d19bb66529b2c8b94e299d4c2e7258c29e83935dc4496c2241b9a835190ec23e4842a9f3d463d5ff6d7bae38d3f50229c0a162931109e7c6a8ede92df01d1f3aabbaa79db64f0c52", 0xc9}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000240)="c648aacca2c0030149360eb116308d3a83386c21aff0e820897c4cb354bd5631bfe566420c44313250055ed05d08c38740d0112e8295f0956467f9efa23dbd82b27456e31e4544ec64e1ebaeb49adf15c8972fac4dd214bf5c2d06df04edac714c661e18acb0a1fefe5fd500f31bab07e742294545e50f66d3f5a93bd97662fa65b2db381b80a9e99d9a9ce97c6e56db932b7416ce8645339398d2bb32931bcee3920097415a390f9f67495179f0f4418b3774044ea65f2d0c4d11af3eccab9dfa", 0xc1}, {&(0x7f0000000340)="626357d9cb533c83500ba865adcfba6bc5aa8315fdf2ec79caa73cbb8b56db54f30f4a94091e0284498c71fb42ab5f2a5d41ee02ad5b9f4364c3eb1e1f556bb67c9f22d1971cc94ac8e4c8721da2f6bc0eb91fc788c039a7b1a971a1b2a5892c97fbf892c19118b0fbb419ddcb2bbe249213bed8b3d6a4f3e45af8e5bf3ec69a64d7b9542f", 0x85}, {&(0x7f00000000c0)="b2526b8df82e2f35dc8a1ebcc6e10c0480473e56f86742371d68c91a917e2adf447c12dbd4", 0x25}], 0x5, &(0x7f0000001600)=[{0x1010, 0x0, 0x5, "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"}, {0xf8, 0x0, 0x179, "35af584a47ceb26025a2972644712b14ddd8f50dd97350e87140fad63660e813e6bc39697acb15e2929f05b4c893518d8e81998fc6cc7592ebffe19e511f764004e9d92f0b4503235f3bcdec9aa1afd26ae56cde6adf8bb88c84f8e2cf0c32d9d54e07a1d41f94c950f45cab06da377cfa657f55e8ecda72afc64c59fa195cdb7ad4a0b9b506419ddf04e9e212ab1ebcb8754b444fc716e177fb6fb168bd2eff983292c9b2fe581d21a0144cdc1503e8057682642f685ab6067647a59e285679d1cfc11f6f8244be069c7aad185575b962dfcf2f86133591a6b616e7b29c8886972634158ea68582"}, {0xd0, 0x0, 0x7, "0c457a5ed28d6456e9e0654e75b375cfcadc89f8fa2f6fda14497e97029b8e029dc359584cd61483bf88111323a3f48d0f3247f8611345b36f9cea7c98e5a0da312a56446a82e28e4abfd5e6a4262cbc0f90c08ca1a8bfcea6cadbd3f6c853b9ce0c963df6b6855e2ffd167b75cc98268604b01599501a3660a77993f60351c15282cf5dccb3c74378102a55f09db6426e46234d7707256b5be09d808967f1a0cd01a8206963dbb9000a12356e0444675afafa79be217ff0788f93b4911f55"}], 0x11d8}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) openat$cgroup_ro(r2, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = perf_event_open$cgroup(&(0x7f0000000500)={0x66dedba83a57b5ed, 0x70, 0x6, 0x6, 0x8, 0x1, 0x0, 0x3, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xc965, 0x6, @perf_bp={&(0x7f00000004c0), 0x2}, 0x9020, 0x80000000, 0x10000, 0x8c1c1de9ea84db5a, 0x1, 0x1, 0x4}, r3, 0x5, r1, 0x554bb6f7168c46f4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) [ 393.614426][T28517] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 393.614434][T28517] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 393.614442][T28517] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 393.614450][T28517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 393.614457][T28517] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 393.941969][T28534] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:38 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r1, &(0x7f0000002a40)={&(0x7f0000002880)=@xdp, 0x80, &(0x7f0000002900), 0x0, &(0x7f0000002940)=""/204, 0xcc}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={&(0x7f0000004500)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004580)=""/111, 0x6f}, {&(0x7f0000004600)=""/133, 0x85}], 0x2, &(0x7f0000004700)=""/4096, 0x1000}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\xfc', 0x248800) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\xfc', 0x248800) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000005840)={r5, 0x10, &(0x7f0000005800)={&(0x7f00000057c0)=""/6, 0x6, 0xffffffffffffffff}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000005880)={0x10, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00'], &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x48, &(0x7f0000000080)=""/72, 0x41000, 0x4, [], r3, 0x14, r4, 0x8, &(0x7f0000005740)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000005780)={0x1, 0xd, 0x9, 0x3}, 0x10, r6}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x0, 0x3, 0x10, 0x1, 0x0, [], r8, r7}, 0x415) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x5, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3612ee43fe38d9a1, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x8001, 0x0, 0x0, 0x40f00, 0x2, [], r8, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x1, 0x9c6, 0x4}, 0x10, r9}, 0x78) sendmsg$kcm(r4, &(0x7f0000000540)={&(0x7f0000000140)=@xdp={0x2c, 0x1, r8, 0x24}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)="a525a2741e14b9af83e509", 0xb}, {&(0x7f0000000200)="7072d2595f2c405d1f80816ea13b15924a10e56098", 0x15}, {&(0x7f0000000240)="f8864419ac609b30e5d51303208b", 0xe}, {&(0x7f0000000280)="8147250d0698c0a2f3d6917c7ace100f6cbaf0acb8", 0x15}, {&(0x7f00000002c0)="c070512061528d02ce90cadce94341b4ccda7634c1e45fdc67596bafcdaa6d", 0x1f}, {&(0x7f0000000300)="ba1a129f6ca17615ea32497e7185675dbd4e11fdbcd9b828a22777ae0143fd907b1b52672f5188684c32a73295dc6a196423b843f783035cdcb26101a889e45ac6adbfbc25ae0381a8bf02787a5b00e78616cf15ec3c2713be1b236be39da610aae32932ce03ee7ea83e95b1c16005", 0x6f}, {&(0x7f0000000380)="e0c8886b2a7da00553a65cb3954b36a99c050fa5435e15ee25713f603fe32acdadf61d84829c52a417707b3d84a0c2c543ca5b64daa92d45e45a12d64d77b4d2a88f9ed6e125832ca4b9718a57f3c3ec1e3634d5b1875a96cfeb29de3aeecb596bad80f4d4638935ffdcb2aba31be9f690800476d510e66142e1099ee9937030b6cc4f1e3780a525232ff75e0ff7a05a6a0ed55903f5beeb5155f80f6fdce9772efa163c950dce", 0xa7}, {&(0x7f0000000440)="9a0db4eaf7e7d24f97b65d0fabdff032de8a305ab0b26826146a072ca2b879e4b02a721031e370450535aa08e5d90af0904627b9e7ddb1fbe1cf09f7c5679131c54f3297753c2bc583287a5cf1d0a253b3964391b6cbec01", 0x58}], 0x8, &(0x7f0000000600)=[{0xe0, 0x10a, 0x21f2, "8936359a113e2798b426507e0968c2d22ca625748b9f5cb5645be4b1663c19022d2833344e9df09a771078d182bcb11e981f0973441b3c29d6209a06bbb136f66b7e9dd7103aa4646abdc4b97a50caa4163104a003e33734547bae934beef826574ce17000f33000bd50c8bd5e14a439b4f9ba1aa7ed58527c7043f29d7113ebcf9fa522e13bb57a08436f90583678065c9e1ca21e87813bce2373fc758046109883ba1ad535cdfb8de3456771b5e25f03714ebc641e94519efb827a1104f529e3fbd2088cfcba987d04e844f3c7cf22"}, {0x1010, 0x112, 0xe0000000, "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"}, {0x90, 0x103, 0x9, "a7e0850a84e19f7808d3dcbc6e247ce94a8ab3f6fe452fd89277223a091598475eb8f5a25e79439ab390ad8a903ea2bbee5f9087ed38bf26f7e9a0c2d300346c3b6f04e6b2945423fd1556053ed87687086196bff213439abd1ee50c0937ef162dc1e6f41c6d911f7b6687d514503a200d4208dd6ff729539457dc1d9e"}, {0x20, 0x112, 0x8, "bc2367339649e909e4"}, {0x1010, 0x100, 0x6733, "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"}, {0x50, 0x107, 0x4, "9092d7482b1e1eab57207ef36a442f8d1a9cb9a2776b492f6a384701ce92cd33c51bf54511037cf101be3ba4429b7531eccefdb0e7479d6dccf3eac7166740"}, {0x68, 0x109, 0xe2e9, "d9aaf55abd0aceb51033e5b2d385a0c2ee19663ea01a2021692e38357786ee68e55ecaa589e8349a48d5431894c78dd1d0155bdea09d27ee23bbc08e1442802707fe4ad92a9da2adae800f5f5baf2a5f2a"}], 0x2268}, 0x40) 13:58:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e655800200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:38 executing program 1 (fault-call:2 fault-nth:39): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000000f0081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 394.197112][T28546] FAULT_INJECTION: forcing a failure. [ 394.197112][T28546] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 394.233106][T28549] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 394.276212][T28546] CPU: 1 PID: 28546 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 394.284965][T28546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.295030][T28546] Call Trace: [ 394.298329][T28546] dump_stack+0x197/0x210 [ 394.298350][T28546] should_fail.cold+0xa/0x15 [ 394.298370][T28546] ? fault_create_debugfs_attr+0x180/0x180 [ 394.313087][T28546] ? ___might_sleep+0x163/0x2c0 [ 394.317962][T28546] should_fail_alloc_page+0x50/0x60 [ 394.323179][T28546] __alloc_pages_nodemask+0x1a1/0x910 [ 394.328551][T28546] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 394.328568][T28546] ? __alloc_pages_slowpath+0x2920/0x2920 [ 394.328590][T28546] ? kasan_unpoison_shadow+0x35/0x50 [ 394.328606][T28546] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 394.328626][T28546] alloc_pages_current+0x107/0x210 [ 394.356519][T28546] ? ___might_sleep+0x163/0x2c0 [ 394.361389][T28546] __vmalloc_node_range+0x4f8/0x810 [ 394.366600][T28546] ? bpf_map_area_alloc+0x20/0x30 [ 394.366618][T28546] __vmalloc_node_flags_caller+0x71/0x90 [ 394.366632][T28546] ? bpf_map_area_alloc+0x20/0x30 [ 394.366652][T28546] __bpf_map_area_alloc+0xde/0xf0 [ 394.387307][T28546] bpf_map_area_alloc+0x20/0x30 [ 394.392169][T28546] htab_map_alloc+0x8d3/0x11c0 [ 394.396956][T28546] ? htab_map_update_elem+0xca0/0xca0 [ 394.396974][T28546] __do_sys_bpf+0x478/0x3610 [ 394.396993][T28546] ? bpf_prog_load+0x1960/0x1960 [ 394.406957][T28546] ? __kasan_check_write+0x14/0x20 [ 394.406974][T28546] ? __mutex_unlock_slowpath+0xf0/0x6a0 13:58:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 394.406990][T28546] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 394.407006][T28546] ? wait_for_completion+0x440/0x440 [ 394.407028][T28546] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 394.407056][T28546] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 394.417064][T28546] ? do_syscall_64+0x26/0x790 [ 394.417082][T28546] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.417096][T28546] ? do_syscall_64+0x26/0x790 [ 394.417117][T28546] __x64_sys_bpf+0x73/0xb0 [ 394.417135][T28546] do_syscall_64+0xfa/0x790 [ 394.427933][T28546] entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:58:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000250081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 394.427946][T28546] RIP: 0033:0x45a909 [ 394.427963][T28546] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 394.427971][T28546] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 394.427983][T28546] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 394.427996][T28546] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 394.439571][T28546] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 394.439580][T28546] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 394.439588][T28546] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 394.552794][T28560] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e586500200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:38 executing program 1 (fault-call:2 fault-nth:40): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 394.761111][T28562] device nr0 entered promiscuous mode [ 394.779819][T28572] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. [ 394.802797][T28582] FAULT_INJECTION: forcing a failure. [ 394.802797][T28582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 394.824883][T28582] CPU: 0 PID: 28582 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 394.833602][T28582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.843658][T28582] Call Trace: [ 394.846954][T28582] dump_stack+0x197/0x210 [ 394.846976][T28582] should_fail.cold+0xa/0x15 [ 394.846997][T28582] ? fault_create_debugfs_attr+0x180/0x180 [ 394.861711][T28582] ? ___might_sleep+0x163/0x2c0 [ 394.866593][T28582] should_fail_alloc_page+0x50/0x60 [ 394.871801][T28582] __alloc_pages_nodemask+0x1a1/0x910 [ 394.877196][T28582] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 394.882773][T28582] ? __alloc_pages_slowpath+0x2920/0x2920 [ 394.888518][T28582] ? kasan_unpoison_shadow+0x35/0x50 [ 394.893815][T28582] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 394.900070][T28582] alloc_pages_current+0x107/0x210 [ 394.905193][T28582] ? ___might_sleep+0x163/0x2c0 13:58:38 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r3, r4}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETLINK(r5, 0x400454cd, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x400000, 0xffffffffffffffff, 0x0) close(r6) [ 394.910065][T28582] __vmalloc_node_range+0x4f8/0x810 [ 394.915278][T28582] ? bpf_map_area_alloc+0x20/0x30 [ 394.920305][T28582] __vmalloc_node_flags_caller+0x71/0x90 [ 394.925938][T28582] ? bpf_map_area_alloc+0x20/0x30 [ 394.930966][T28582] __bpf_map_area_alloc+0xde/0xf0 [ 394.935993][T28582] bpf_map_area_alloc+0x20/0x30 [ 394.940869][T28582] htab_map_alloc+0x8d3/0x11c0 [ 394.945644][T28582] ? htab_map_update_elem+0xca0/0xca0 [ 394.951023][T28582] __do_sys_bpf+0x478/0x3610 [ 394.955623][T28582] ? bpf_prog_load+0x1960/0x1960 [ 394.960569][T28582] ? __kasan_check_write+0x14/0x20 [ 394.965685][T28582] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 394.971262][T28582] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 394.976553][T28582] ? wait_for_completion+0x440/0x440 [ 394.981852][T28582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 394.988229][T28582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 394.993703][T28582] ? do_syscall_64+0x26/0x790 [ 394.998392][T28582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.004470][T28582] ? do_syscall_64+0x26/0x790 [ 395.009168][T28582] __x64_sys_bpf+0x73/0xb0 [ 395.013591][T28582] do_syscall_64+0xfa/0x790 [ 395.018102][T28582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.023992][T28582] RIP: 0033:0x45a909 [ 395.027890][T28582] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 395.047728][T28582] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:58:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000006f0081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 395.056246][T28582] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 395.064355][T28582] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 395.072337][T28582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 395.080313][T28582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 395.088409][T28582] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 395.149020][T28584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:39 executing program 1 (fault-call:2 fault-nth:41): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130281c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x1, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x4, 0x20, 0x3, 0x0, 0x80, 0x14000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2045cc8b9f508134, @perf_bp={&(0x7f0000000040), 0xc}, 0x10009, 0x8001, 0x800, 0x5, 0x7fff, 0x5, 0xff}, r2, 0xa, r3, 0x8) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\xfc', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x1000, 0x32, &(0x7f0000000600)="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", &(0x7f0000000140)=""/50, 0x3, 0x0, 0x0, 0x6d, &(0x7f0000000180), &(0x7f00000001c0)="4a5604620a56604daf6c72d430d73f25475031feeb078b8625e447921367a93ed86e19ec1340179c0c6434afb3bc9ec4d5dffa7fa29d14ddaf6b2735b35652bce4b7c84e7b0d25395ef79a754eef5e15f37e8a2ab791980223ee7856ff0e39b82c2641a5a3015612c6bb5352e4"}, 0x40) 13:58:39 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006800200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130381c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 395.453520][T28610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 395.460816][T28611] FAULT_INJECTION: forcing a failure. [ 395.460816][T28611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 395.499537][T28611] CPU: 0 PID: 28611 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 395.508260][T28611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.508272][T28611] Call Trace: [ 395.521635][T28611] dump_stack+0x197/0x210 [ 395.525979][T28611] should_fail.cold+0xa/0x15 [ 395.530578][T28611] ? fault_create_debugfs_attr+0x180/0x180 [ 395.536389][T28611] ? ___might_sleep+0x163/0x2c0 [ 395.541257][T28611] should_fail_alloc_page+0x50/0x60 [ 395.546460][T28611] __alloc_pages_nodemask+0x1a1/0x910 [ 395.551852][T28611] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 395.557397][T28611] ? __alloc_pages_slowpath+0x2920/0x2920 [ 395.563128][T28611] ? kasan_unpoison_shadow+0x35/0x50 [ 395.568422][T28611] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 395.574671][T28611] alloc_pages_current+0x107/0x210 [ 395.579785][T28611] ? ___might_sleep+0x163/0x2c0 [ 395.584646][T28611] __vmalloc_node_range+0x4f8/0x810 [ 395.589401][T28614] device nr0 entered promiscuous mode 13:58:39 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e096900200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 395.589852][T28611] ? bpf_map_area_alloc+0x20/0x30 [ 395.589870][T28611] __vmalloc_node_flags_caller+0x71/0x90 [ 395.589884][T28611] ? bpf_map_area_alloc+0x20/0x30 [ 395.589906][T28611] __bpf_map_area_alloc+0xde/0xf0 [ 395.616036][T28611] bpf_map_area_alloc+0x20/0x30 [ 395.621059][T28611] htab_map_alloc+0x8d3/0x11c0 [ 395.625850][T28611] ? htab_map_update_elem+0xca0/0xca0 [ 395.631382][T28611] __do_sys_bpf+0x478/0x3610 [ 395.635990][T28611] ? bpf_prog_load+0x1960/0x1960 [ 395.640934][T28611] ? __kasan_check_write+0x14/0x20 [ 395.646047][T28611] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 395.651598][T28611] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 395.656888][T28611] ? wait_for_completion+0x440/0x440 [ 395.662176][T28611] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 395.662203][T28611] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 395.662216][T28611] ? do_syscall_64+0x26/0x790 [ 395.662230][T28611] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.662248][T28611] ? do_syscall_64+0x26/0x790 [ 395.662267][T28611] __x64_sys_bpf+0x73/0xb0 [ 395.693733][T28611] do_syscall_64+0xfa/0x790 [ 395.698273][T28611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.704174][T28611] RIP: 0033:0x45a909 [ 395.708077][T28611] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 395.727781][T28611] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 395.736205][T28611] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 13:58:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x60000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:39 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002980)=[{&(0x7f00000016c0)=""/46, 0x2e}, {&(0x7f0000001700)=""/169, 0xa9}, {&(0x7f00000017c0)=""/111, 0x6f}, {0x0}, {&(0x7f0000002840)=""/27, 0x1b}, {&(0x7f0000002880)=""/225, 0xe1}], 0x6, &(0x7f0000002a00)=""/48, 0x30}, 0x2000) bpf$MAP_CREATE(0x0, &(0x7f0000002a80)={0x0, 0x3a, 0x0, 0x9, 0x4, 0xffffffffffffffff, 0x1, [], r0, 0xffffffffffffffff, 0x4}, 0x3c) socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="87", 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x0, 0x3, 0x10, 0x1, 0x0, [], r3, r2}, 0x415) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x5, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3612ee43fe38d9a1, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x8001, 0x0, 0x0, 0x40f00, 0x2, [], r3, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x1, 0x9c6, 0x4}, 0x10, r4}, 0x78) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r4, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r7, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x3, 0x9, 0x80000000, 0xdc}, &(0x7f00000044c0)=0x1b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=0x4}}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='\b\x00', 0x1430c2, 0x0) write$cgroup_subtree(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r10, 0x0, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[@ANYBLOB="3cd1c555f4b61a028704038157"], 0x1) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r11, 0x0, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000f080)={&(0x7f000000de40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000380)=ANY=[@ANYRESOCT=r9], &(0x7f0000001a40)='syzkaller\x00', 0x80, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000001a80), 0x10}, 0x78) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000047c0)={0x1, 0xd, &(0x7f0000004640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xae5, 0x0, 0x0, 0x0, 0x1}, [@func, @map={0x18, 0x1, 0x1, 0x0, r10}, @map={0x18, 0x0, 0x1, 0x0, r11}, @call={0x85, 0x0, 0x0, 0x66}, @jmp={0x5, 0x1, 0x5, 0x2, 0x6, 0x10, 0xfffffffffffffff0}, @exit, @map={0x18, 0x8}]}, &(0x7f0000004700)='GPL\x00', 0xfffffff8, 0x0, 0x0, 0x40f00, 0x2, [], r12, 0x2, r1, 0x8, &(0x7f0000004740)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004780)={0x5, 0xa, 0x6, 0xffffad2c}, 0x10, 0x0, r13}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x0, 0x0, &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, r5, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000043c0)={0x1, 0xe, 0x0, 0xd3de}, 0x10, r8, r14}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0xfff, 0x19, &(0x7f0000000240)=""/25, 0x0, 0x1, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xa, 0xe8, 0x200}, 0x10, r8}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r8, 0x4) r15 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r16) [ 395.744252][T28611] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 395.752204][T28611] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 395.760160][T28611] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 395.768111][T28611] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:39 executing program 1 (fault-call:2 fault-nth:42): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 396.037293][T28636] FAULT_INJECTION: forcing a failure. [ 396.037293][T28636] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 396.056920][T28630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 396.065709][T28636] CPU: 0 PID: 28636 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 396.074402][T28636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.084445][T28636] Call Trace: [ 396.087736][T28636] dump_stack+0x197/0x210 [ 396.092058][T28636] should_fail.cold+0xa/0x15 [ 396.096645][T28636] ? fault_create_debugfs_attr+0x180/0x180 [ 396.102530][T28636] ? ___might_sleep+0x163/0x2c0 [ 396.107405][T28636] should_fail_alloc_page+0x50/0x60 [ 396.112597][T28636] __alloc_pages_nodemask+0x1a1/0x910 [ 396.118002][T28636] ? preempt_schedule_irq+0xf3/0x160 [ 396.123320][T28636] ? __alloc_pages_slowpath+0x2920/0x2920 [ 396.129072][T28636] ? vmap_page_range_noflush+0x50a/0xa80 [ 396.134695][T28636] ? vmap_page_range_noflush+0x523/0xa80 [ 396.140317][T28636] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 396.146552][T28636] alloc_pages_current+0x107/0x210 [ 396.151657][T28636] __get_free_pages+0xc/0x40 [ 396.156233][T28636] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 396.161859][T28636] apply_to_page_range+0x445/0x700 [ 396.166957][T28636] ? memset+0x40/0x40 [ 396.171060][T28636] kasan_populate_vmalloc+0x68/0x90 [ 396.176253][T28636] __vmalloc_node_range+0x47e/0x810 [ 396.181449][T28636] ? bpf_map_area_alloc+0x20/0x30 [ 396.186467][T28636] __vmalloc_node_flags_caller+0x71/0x90 [ 396.192090][T28636] ? bpf_map_area_alloc+0x20/0x30 [ 396.197132][T28636] __bpf_map_area_alloc+0xde/0xf0 [ 396.202146][T28636] bpf_map_area_alloc+0x20/0x30 [ 396.206988][T28636] htab_map_alloc+0x8d3/0x11c0 [ 396.211762][T28636] ? htab_map_update_elem+0xca0/0xca0 [ 396.217127][T28636] __do_sys_bpf+0x478/0x3610 [ 396.221707][T28636] ? bpf_prog_load+0x1960/0x1960 [ 396.226629][T28636] ? debug_smp_processor_id+0x33/0x18a [ 396.232249][T28636] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 396.238428][T28636] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 396.243964][T28636] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 396.249946][T28636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.256192][T28636] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 396.261731][T28636] ? do_syscall_64+0x26/0x790 [ 396.266399][T28636] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.272454][T28636] ? do_syscall_64+0x26/0x790 [ 396.277123][T28636] __x64_sys_bpf+0x73/0xb0 [ 396.281527][T28636] do_syscall_64+0xfa/0x790 [ 396.286015][T28636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.291890][T28636] RIP: 0033:0x45a909 [ 396.295773][T28636] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.315362][T28636] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 396.323757][T28636] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 13:58:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130481c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 396.331728][T28636] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 396.339681][T28636] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 396.347654][T28636] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 396.355629][T28636] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x65580000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006c00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:40 executing program 1 (fault-call:2 fault-nth:43): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130681c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:40 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = perf_event_open(&(0x7f0000000040)={0x663a45c47c32b0c0, 0x70, 0x80, 0x7, 0x0, 0x7, 0x0, 0x0, 0x4400, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4871, 0x2, @perf_bp, 0x2000, 0x0, 0x9, 0x6, 0x2, 0x7f, 0x55be}, 0x0, 0x5, r2, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000000c0)=0xff) close(r1) [ 396.682431][T28652] FAULT_INJECTION: forcing a failure. [ 396.682431][T28652] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 396.746378][T28654] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 396.769674][T28652] CPU: 1 PID: 28652 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 396.778389][T28652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.778396][T28652] Call Trace: [ 396.778420][T28652] dump_stack+0x197/0x210 [ 396.778448][T28652] should_fail.cold+0xa/0x15 [ 396.800716][T28652] ? fault_create_debugfs_attr+0x180/0x180 [ 396.806528][T28652] ? ___might_sleep+0x163/0x2c0 [ 396.811383][T28652] should_fail_alloc_page+0x50/0x60 [ 396.811397][T28652] __alloc_pages_nodemask+0x1a1/0x910 [ 396.811415][T28652] ? find_held_lock+0x35/0x130 [ 396.821948][T28652] ? __alloc_pages_slowpath+0x2920/0x2920 [ 396.821970][T28652] ? lock_downgrade+0x920/0x920 [ 396.821986][T28652] ? rwlock_bug.part.0+0x90/0x90 [ 396.822003][T28652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 396.822021][T28652] alloc_pages_current+0x107/0x210 [ 396.822042][T28652] __get_free_pages+0xc/0x40 [ 396.837354][T28652] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 396.837376][T28652] apply_to_page_range+0x445/0x700 [ 396.837393][T28652] ? memset+0x40/0x40 [ 396.837412][T28652] kasan_populate_vmalloc+0x68/0x90 [ 396.863881][T28652] __vmalloc_node_range+0x47e/0x810 [ 396.863906][T28652] ? bpf_map_area_alloc+0x20/0x30 [ 396.863923][T28652] __vmalloc_node_flags_caller+0x71/0x90 [ 396.878185][T28652] ? bpf_map_area_alloc+0x20/0x30 [ 396.878204][T28652] __bpf_map_area_alloc+0xde/0xf0 [ 396.878221][T28652] bpf_map_area_alloc+0x20/0x30 [ 396.878234][T28652] htab_map_alloc+0x8d3/0x11c0 [ 396.878262][T28652] ? htab_map_update_elem+0xca0/0xca0 [ 396.894191][T28652] __do_sys_bpf+0x478/0x3610 [ 396.894213][T28652] ? bpf_prog_load+0x1960/0x1960 [ 396.894233][T28652] ? __kasan_check_write+0x14/0x20 [ 396.904257][T28652] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 396.904273][T28652] ? rcu_read_lock_bh_held+0xb0/0xb0 13:58:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e007400200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 396.904288][T28652] ? wait_for_completion+0x440/0x440 [ 396.904312][T28652] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.904342][T28652] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 396.919284][T28652] ? do_syscall_64+0x26/0x790 [ 396.919298][T28652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.919316][T28652] ? do_syscall_64+0x26/0x790 [ 396.933925][T28652] __x64_sys_bpf+0x73/0xb0 [ 396.933945][T28652] do_syscall_64+0xfa/0x790 [ 396.933968][T28652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.944758][T28652] RIP: 0033:0x45a909 [ 396.944774][T28652] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.944782][T28652] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 396.944797][T28652] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 396.944805][T28652] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:58:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130a81c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 396.944812][T28652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 396.944825][T28652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 396.956321][T28652] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:41 executing program 1 (fault-call:2 fault-nth:44): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 397.202134][T28663] device nr0 entered promiscuous mode [ 397.220176][T28670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e007a00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130c81c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 397.251925][T28680] FAULT_INJECTION: forcing a failure. [ 397.251925][T28680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 397.415377][T28680] CPU: 1 PID: 28680 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 397.424105][T28680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.434164][T28680] Call Trace: [ 397.437462][T28680] dump_stack+0x197/0x210 [ 397.441816][T28680] should_fail.cold+0xa/0x15 [ 397.446419][T28680] ? fault_create_debugfs_attr+0x180/0x180 [ 397.452232][T28680] ? ___might_sleep+0x163/0x2c0 [ 397.457092][T28680] should_fail_alloc_page+0x50/0x60 [ 397.462295][T28680] __alloc_pages_nodemask+0x1a1/0x910 [ 397.467676][T28680] ? find_held_lock+0x35/0x130 [ 397.472455][T28680] ? __alloc_pages_slowpath+0x2920/0x2920 [ 397.478181][T28680] ? lock_downgrade+0x920/0x920 [ 397.483039][T28680] ? rwlock_bug.part.0+0x90/0x90 [ 397.487980][T28680] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 397.494229][T28680] alloc_pages_current+0x107/0x210 [ 397.499520][T28680] __get_free_pages+0xc/0x40 [ 397.504113][T28680] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 397.509750][T28680] apply_to_page_range+0x445/0x700 [ 397.514866][T28680] ? memset+0x40/0x40 [ 397.518854][T28680] kasan_populate_vmalloc+0x68/0x90 [ 397.524129][T28680] __vmalloc_node_range+0x47e/0x810 [ 397.529343][T28680] ? bpf_map_area_alloc+0x20/0x30 [ 397.534367][T28680] __vmalloc_node_flags_caller+0x71/0x90 [ 397.540000][T28680] ? bpf_map_area_alloc+0x20/0x30 [ 397.545208][T28680] __bpf_map_area_alloc+0xde/0xf0 [ 397.550249][T28680] bpf_map_area_alloc+0x20/0x30 [ 397.555102][T28680] htab_map_alloc+0x8d3/0x11c0 [ 397.559879][T28680] ? htab_map_update_elem+0xca0/0xca0 [ 397.565428][T28680] __do_sys_bpf+0x478/0x3610 [ 397.570041][T28680] ? bpf_prog_load+0x1960/0x1960 [ 397.574979][T28680] ? __kasan_check_write+0x14/0x20 [ 397.580090][T28680] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 397.585638][T28680] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 397.590922][T28680] ? wait_for_completion+0x440/0x440 [ 397.596205][T28680] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 397.602459][T28680] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 397.608033][T28680] ? do_syscall_64+0x26/0x790 [ 397.612769][T28680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.618843][T28680] ? do_syscall_64+0x26/0x790 [ 397.623520][T28680] __x64_sys_bpf+0x73/0xb0 [ 397.627931][T28680] do_syscall_64+0xfa/0x790 [ 397.632423][T28680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.638341][T28680] RIP: 0033:0x45a909 [ 397.642226][T28680] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 397.661838][T28680] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 397.670238][T28680] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 397.678232][T28680] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 397.686183][T28680] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 397.694154][T28680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 397.702130][T28680] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:42 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x9, 0x0, 0x5, 0x5, 0x0, 0x19a, 0x11000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1100, 0x2, @perf_config_ext={0x0, 0x7fffffff}, 0x10, 0xff, 0x2, 0x6, 0x16, 0xa, 0x3}, r2, 0xb, 0xffffffffffffffff, 0xbaa257552454007a) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) 13:58:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:42 executing program 1 (fault-call:2 fault-nth:45): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130e81c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:42 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e008100200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130f81c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 398.158305][T28703] FAULT_INJECTION: forcing a failure. [ 398.158305][T28703] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 398.159103][T28712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 398.196124][T28703] CPU: 0 PID: 28703 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 398.205021][T28703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.215087][T28703] Call Trace: [ 398.218394][T28703] dump_stack+0x197/0x210 [ 398.222743][T28703] should_fail.cold+0xa/0x15 [ 398.227342][T28703] ? fault_create_debugfs_attr+0x180/0x180 [ 398.233150][T28703] ? ___might_sleep+0x163/0x2c0 [ 398.238015][T28703] should_fail_alloc_page+0x50/0x60 [ 398.243213][T28703] __alloc_pages_nodemask+0x1a1/0x910 [ 398.243229][T28703] ? find_held_lock+0x35/0x130 [ 398.243244][T28703] ? __alloc_pages_slowpath+0x2920/0x2920 [ 398.243262][T28703] ? lock_downgrade+0x920/0x920 [ 398.243275][T28703] ? rwlock_bug.part.0+0x90/0x90 [ 398.243290][T28703] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 398.243309][T28703] alloc_pages_current+0x107/0x210 [ 398.275338][T28703] __get_free_pages+0xc/0x40 [ 398.285039][T28703] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 398.290695][T28703] apply_to_page_range+0x445/0x700 [ 398.290714][T28703] ? memset+0x40/0x40 [ 398.290734][T28703] kasan_populate_vmalloc+0x68/0x90 [ 398.290749][T28703] __vmalloc_node_range+0x47e/0x810 [ 398.290772][T28703] ? bpf_map_area_alloc+0x20/0x30 [ 398.290785][T28703] __vmalloc_node_flags_caller+0x71/0x90 [ 398.290798][T28703] ? bpf_map_area_alloc+0x20/0x30 [ 398.290814][T28703] __bpf_map_area_alloc+0xde/0xf0 [ 398.290830][T28703] bpf_map_area_alloc+0x20/0x30 [ 398.290846][T28703] htab_map_alloc+0x8d3/0x11c0 [ 398.290870][T28703] ? htab_map_update_elem+0xca0/0xca0 [ 398.290889][T28703] __do_sys_bpf+0x478/0x3610 [ 398.305250][T28703] ? bpf_prog_load+0x1960/0x1960 [ 398.305264][T28703] ? __kasan_check_write+0x14/0x20 [ 398.305282][T28703] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 398.315512][T28703] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 398.315533][T28703] ? wait_for_completion+0x440/0x440 [ 398.315555][T28703] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 398.326365][T28703] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 398.326379][T28703] ? do_syscall_64+0x26/0x790 [ 398.326399][T28703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.336256][T28703] ? do_syscall_64+0x26/0x790 [ 398.336279][T28703] __x64_sys_bpf+0x73/0xb0 [ 398.336295][T28703] do_syscall_64+0xfa/0x790 [ 398.336316][T28703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.351010][T28703] RIP: 0033:0x45a909 [ 398.351025][T28703] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 398.351033][T28703] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:58:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000131081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:42 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00f000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 398.351046][T28703] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 398.351053][T28703] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 398.351061][T28703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 398.351068][T28703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 398.351076][T28703] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 398.534964][T28722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:42 executing program 1 (fault-call:2 fault-nth:46): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:42 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) close(r1) [ 398.710071][T28717] device nr0 entered promiscuous mode [ 398.761238][T28740] FAULT_INJECTION: forcing a failure. [ 398.761238][T28740] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 398.782035][T28740] CPU: 0 PID: 28740 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 398.790871][T28740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.800924][T28740] Call Trace: [ 398.804209][T28740] dump_stack+0x197/0x210 [ 398.808666][T28740] should_fail.cold+0xa/0x15 [ 398.813247][T28740] ? fault_create_debugfs_attr+0x180/0x180 [ 398.819045][T28740] ? ___might_sleep+0x163/0x2c0 [ 398.823918][T28740] should_fail_alloc_page+0x50/0x60 [ 398.829134][T28740] __alloc_pages_nodemask+0x1a1/0x910 [ 398.834497][T28740] ? __alloc_pages_slowpath+0x2920/0x2920 [ 398.840221][T28740] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 398.846447][T28740] ? find_next_bit+0x107/0x130 [ 398.851198][T28740] pcpu_populate_chunk+0xf8/0x940 [ 398.856221][T28740] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 398.861925][T28740] ? find_next_bit+0xc7/0x130 [ 398.866592][T28740] pcpu_alloc+0xd5b/0x1380 [ 398.870996][T28740] ? pcpu_alloc_area+0x820/0x820 [ 398.875950][T28740] ? bpf_map_area_alloc+0x20/0x30 [ 398.880963][T28740] __alloc_percpu_gfp+0x28/0x30 [ 398.885812][T28740] htab_map_alloc+0xdb9/0x11c0 [ 398.890581][T28740] ? htab_map_update_elem+0xca0/0xca0 [ 398.895938][T28740] __do_sys_bpf+0x478/0x3610 [ 398.900540][T28740] ? bpf_prog_load+0x1960/0x1960 [ 398.905471][T28740] ? __kasan_check_write+0x14/0x20 [ 398.910569][T28740] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 398.916099][T28740] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 398.921380][T28740] ? wait_for_completion+0x440/0x440 [ 398.926669][T28740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 398.932912][T28740] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 398.938351][T28740] ? do_syscall_64+0x26/0x790 [ 398.943024][T28740] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.949081][T28740] ? do_syscall_64+0x26/0x790 [ 398.953743][T28740] __x64_sys_bpf+0x73/0xb0 [ 398.958143][T28740] do_syscall_64+0xfa/0x790 [ 398.962634][T28740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.968518][T28740] RIP: 0033:0x45a909 [ 398.972408][T28740] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 398.992011][T28740] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 399.000406][T28740] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 399.008377][T28740] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 399.016333][T28740] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 399.024307][T28740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 399.032273][T28740] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:43 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000250081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000136081c5e4050cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:43 executing program 1 (fault-call:2 fault-nth:47): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x98000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth0_to_bridge\x00', 0xd89fa0a3bf1cc6d5}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 13:58:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4060cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 399.516282][T28756] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 399.531801][T28751] FAULT_INJECTION: forcing a failure. [ 399.531801][T28751] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 399.541431][T28758] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 13:58:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x81000000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 399.585279][T28751] CPU: 1 PID: 28751 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 399.594002][T28751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.604061][T28751] Call Trace: [ 399.607371][T28751] dump_stack+0x197/0x210 [ 399.611715][T28751] should_fail.cold+0xa/0x15 [ 399.616320][T28751] ? fault_create_debugfs_attr+0x180/0x180 [ 399.622122][T28751] ? ___might_sleep+0x163/0x2c0 [ 399.622215][T28751] should_fail_alloc_page+0x50/0x60 [ 399.622229][T28751] __alloc_pages_nodemask+0x1a1/0x910 [ 399.622249][T28751] ? __alloc_pages_slowpath+0x2920/0x2920 [ 399.622270][T28751] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.622287][T28751] ? find_next_bit+0x107/0x130 [ 399.632330][T28751] pcpu_populate_chunk+0xf8/0x940 [ 399.632347][T28751] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 399.632360][T28751] ? find_next_bit+0xc7/0x130 [ 399.632382][T28751] pcpu_alloc+0xd5b/0x1380 [ 399.632415][T28751] ? pcpu_alloc_area+0x820/0x820 [ 399.643468][T28751] ? bpf_map_area_alloc+0x20/0x30 [ 399.643495][T28751] __alloc_percpu_gfp+0x28/0x30 [ 399.643512][T28751] htab_map_alloc+0xdb9/0x11c0 [ 399.643538][T28751] ? htab_map_update_elem+0xca0/0xca0 [ 399.643556][T28751] __do_sys_bpf+0x478/0x3610 [ 399.654547][T28751] ? bpf_prog_load+0x1960/0x1960 [ 399.654564][T28751] ? __kasan_check_write+0x14/0x20 [ 399.654577][T28751] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 399.654596][T28751] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 399.724635][T28751] ? wait_for_completion+0x440/0x440 [ 399.729943][T28751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 399.736211][T28751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 399.741666][T28751] ? do_syscall_64+0x26/0x790 [ 399.746344][T28751] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.752404][T28751] ? do_syscall_64+0x26/0x790 [ 399.757067][T28751] __x64_sys_bpf+0x73/0xb0 [ 399.761609][T28751] do_syscall_64+0xfa/0x790 [ 399.766143][T28751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.772013][T28751] RIP: 0033:0x45a909 [ 399.775889][T28751] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 399.795472][T28751] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 399.803874][T28751] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 399.811825][T28751] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 399.819870][T28751] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 399.828012][T28751] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 13:58:43 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000002f0081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 399.835963][T28751] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:43 executing program 1 (fault-call:2 fault-nth:48): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:44 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x0, 0x3, 0x10, 0x1, 0x0, [], r3, r2}, 0x415) sendmsg(r0, &(0x7f0000000540)={&(0x7f0000000040)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x80, &(0x7f0000000940)=[{&(0x7f00000000c0)="cc05e75fcc3eb62a04b5a20458d0c6c44f76353fd820976a9e01f342b874059518df628c628280e017ace2345e302a7afeda1e311e022d074bda0f6890d92ac38ccb804aa7bfe7d4dbec8357abcb65a1ac26f39e35488368ddbdbba5cac57cf6677e3f46f68389562277fc9f8be287deb4e62348ed5613861c3e52a6c3507929c8ba783a8d604e752ddf39b406f7fb116400690d0d40439c6e2fbbe72ab08377f5b680313515b7a9c318f3b4077edcec8a55cb4d4bada0947c6d41e4ac6e7e2134f2a6ac254e559f28a2", 0xca}, {&(0x7f0000000380)="f1b25be980ecfc7b029ba80e4d53b07f0c6b837ba95a986943757f2ad4b2a0e3837e0ae28f91586f0e384a62fa8db39d59e5a1784854eeda4973ab03f65ba8bf98eca1dc8b667effb238905cf69802d94d426b9c258b9d94eff14a17ca3774da37ad741ef81a3335462040fd7b7fa1357f8c5c014548b6999973e5d8d16c03823ae1305a3f0f871d3a9c581f14ee9918ed7dbbbab03fd64b7d3cf2ba879d78190375b947172599b142ec9b16ce37f854c196cfdb494b069bccb2eb07379a1e1c15", 0xc1}, {&(0x7f00000001c0)="0e38f3e590e1ce921548e1974d", 0xd}, {&(0x7f0000000200)="212343f20195b8185f34af1204229aed1e0ecd640efe3e557afab66f57e956b865f4977bbdc20011884d642d1bed6d860898cb13eccfb2bf1f1ef0b65084f3a0f78c864f9fd91b6901a100c238171f1e12c40c879b47aaba20c9f31cedccdb9c0561ae0c967992396f9c6bd03992ea", 0x6f}, {&(0x7f0000000600)="eb8be5546e9ef07e225070b35fad4f3bee28aa739dc7cad130e2f7bff1aff78e583265ddd71f11285b2df23ed136b2c403e2493bdcd35f9e68ca9261aac222306845e286f6f919baca171105ad36419edcc6d365a00ec21946", 0x59}, {&(0x7f0000000680)="cd32f0f018f6e2e7dbf4adca56ec1f988e99a9a4881b32220447f80295297e3c94aaf97b6908c8d3fdc617a02bf746d9c7628e59e0b3cd65bdba166df3acfdeec9a262c0588b756a7275d405ff758efb89192d650451ee6420b651198599f6369d3cdbade2ed8f44df3e642f11b5a744b628ff42262b6162fc91f9d424e8b262e8f309059ac7933c484b24e9cbb045af0dd69f43f9223f440bc3aed4d172f9d956306853ad5bac2af5007a5348da4e5ac7", 0xb1}, {&(0x7f0000000480)="7f3ae1847c105cd33f1403cc9ddf9a4bb7f1c45282eb1a7a503d4e7a3a9a0a90f89ca8e508acd1", 0x27}, {&(0x7f0000000740)="abfc2061c70a34111a939ed661133cc2b033daf216100bb2b98d8aec54c1796204b2e2389cc09e8efe64c297a6c4f394ac4b4df2bd8e8407e82dffa62b22a58d9a93b786b4ddd9cf3b731f7fc7993715b5da3edaf3b014037caeacce321b2266d87733077215761b4f2584d2a9b086e02ab9a97ae1390bd5c86824f9134d1e02eb4842a13fc616473d8a7aeeed4a6e472fc612e788e249aea07b4b16d9824b26f03e52c560f228b60d30f511dada6c71042ed109174df79b5c4b54a780d4fcd0d3e09d2be56da808207e9985bd6444285b4f92bb25ffcf6a1eac3b7e4ddf", 0xde}, {&(0x7f0000000840)="bce1cf76a23a6c0993449b2e4c8a8f98f66c946c209b56cae0bc848d1a3d88556e984d5e161894e353a02975c4cef9ab879826c37616ca8aaccd0e73cce375549b64554c029cf106272c7b6a7712ea15636031748be849029c2b8c68d7a6ea539dfb458116c0eae5c04c10ce864f97cb6cc9694ab7c0220b18477f1e2f64c9765f9c600b5bf6f78a72a8c589fc33336b86ae75a64edb4a81ef3347ebf01a6592f7eb996afa30eebda35dd2c4693a3d9b79e1ec45c7e2496942d273f18373ec83c4710c62f1ea11", 0xc7}], 0x9}, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x5, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) mkdir(&(0x7f0000000a00)='./file0\x00', 0x5b) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3612ee43fe38d9a1, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x8001, 0x0, 0x0, 0x40f00, 0x2, [], r3, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x1, 0x9c6, 0x4}, 0x10, r4}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) close(r1) 13:58:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x88a8ffff, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 400.000611][T28764] device nr0 entered promiscuous mode [ 400.021870][T28774] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 400.098070][T28780] FAULT_INJECTION: forcing a failure. [ 400.098070][T28780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 400.188482][T28780] CPU: 1 PID: 28780 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 400.197214][T28780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.207368][T28780] Call Trace: [ 400.210662][T28780] dump_stack+0x197/0x210 [ 400.215005][T28780] should_fail.cold+0xa/0x15 [ 400.219723][T28780] ? fault_create_debugfs_attr+0x180/0x180 [ 400.225525][T28780] ? ___might_sleep+0x163/0x2c0 [ 400.230398][T28780] should_fail_alloc_page+0x50/0x60 [ 400.235639][T28780] __alloc_pages_nodemask+0x1a1/0x910 [ 400.241026][T28780] ? __alloc_pages_slowpath+0x2920/0x2920 [ 400.246750][T28780] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.253086][T28780] ? find_next_bit+0x107/0x130 [ 400.257854][T28780] pcpu_populate_chunk+0xf8/0x940 [ 400.262905][T28780] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 400.268625][T28780] ? find_next_bit+0xc7/0x130 [ 400.273312][T28780] pcpu_alloc+0xd5b/0x1380 [ 400.277738][T28780] ? pcpu_alloc_area+0x820/0x820 [ 400.282676][T28780] ? bpf_map_area_alloc+0x20/0x30 [ 400.287722][T28780] __alloc_percpu_gfp+0x28/0x30 [ 400.292583][T28780] htab_map_alloc+0xdb9/0x11c0 [ 400.297360][T28780] ? htab_map_update_elem+0xca0/0xca0 [ 400.302730][T28780] __do_sys_bpf+0x478/0x3610 [ 400.307424][T28780] ? bpf_prog_load+0x1960/0x1960 [ 400.312365][T28780] ? __kasan_check_write+0x14/0x20 [ 400.317573][T28780] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 400.323134][T28780] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 400.328430][T28780] ? wait_for_completion+0x440/0x440 [ 400.333730][T28780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 400.339990][T28780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.345582][T28780] ? do_syscall_64+0x26/0x790 [ 400.350263][T28780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.356331][T28780] ? do_syscall_64+0x26/0x790 [ 400.361021][T28780] __x64_sys_bpf+0x73/0xb0 [ 400.365446][T28780] do_syscall_64+0xfa/0x790 [ 400.369955][T28780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.375854][T28780] RIP: 0033:0x45a909 [ 400.379751][T28780] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.399493][T28780] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 400.407908][T28780] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 400.415878][T28780] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 400.423847][T28780] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 400.431822][T28780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 400.439792][T28780] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 400.464244][T28786] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'rdma'}]}, 0x6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4250cecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:44 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000600081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:44 executing program 1 (fault-call:2 fault-nth:49): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:44 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/19, 0x13}], 0x1, &(0x7f0000000240)=""/110, 0x6e}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x48e91, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8000000}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0xf, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair(0x37, 0x4, 0x1f, &(0x7f0000000000)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\xfc', 0x248800) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000080)={r4, r6}) close(r6) [ 400.784198][T28800] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa1090000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 400.834588][T28803] FAULT_INJECTION: forcing a failure. [ 400.834588][T28803] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 400.880387][T28803] CPU: 0 PID: 28803 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 400.889083][T28803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.899141][T28803] Call Trace: [ 400.899176][T28803] dump_stack+0x197/0x210 [ 400.906781][T28803] should_fail.cold+0xa/0x15 [ 400.911388][T28803] ? fault_create_debugfs_attr+0x180/0x180 [ 400.917200][T28803] ? ___might_sleep+0x163/0x2c0 [ 400.922071][T28803] should_fail_alloc_page+0x50/0x60 [ 400.927275][T28803] __alloc_pages_nodemask+0x1a1/0x910 [ 400.932654][T28803] ? __alloc_pages_slowpath+0x2920/0x2920 [ 400.932682][T28803] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.944616][T28803] ? find_next_bit+0x107/0x130 [ 400.949390][T28803] pcpu_populate_chunk+0xf8/0x940 [ 400.954413][T28803] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 400.954428][T28803] ? find_next_bit+0xc7/0x130 [ 400.954450][T28803] pcpu_alloc+0xd5b/0x1380 [ 400.969230][T28803] ? pcpu_alloc_area+0x820/0x820 [ 400.974178][T28803] ? bpf_map_area_alloc+0x20/0x30 [ 400.979221][T28803] __alloc_percpu_gfp+0x28/0x30 [ 400.984077][T28803] htab_map_alloc+0xdb9/0x11c0 [ 400.988885][T28803] ? htab_map_update_elem+0xca0/0xca0 [ 400.994262][T28803] __do_sys_bpf+0x478/0x3610 [ 400.994284][T28803] ? bpf_prog_load+0x1960/0x1960 [ 400.994303][T28803] ? __kasan_check_write+0x14/0x20 [ 401.008911][T28803] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 401.014467][T28803] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 401.019762][T28803] ? wait_for_completion+0x440/0x440 [ 401.025060][T28803] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 401.031319][T28803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 401.036780][T28803] ? do_syscall_64+0x26/0x790 [ 401.041454][T28803] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.041469][T28803] ? do_syscall_64+0x26/0x790 [ 401.041488][T28803] __x64_sys_bpf+0x73/0xb0 [ 401.041505][T28803] do_syscall_64+0xfa/0x790 [ 401.041523][T28803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.041534][T28803] RIP: 0033:0x45a909 [ 401.041550][T28803] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.041558][T28803] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 401.041573][T28803] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 401.041581][T28803] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 401.041589][T28803] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 401.041597][T28803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 13:58:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e40507ecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r2, 0x0, 0x8}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r2, 0x5, 0x10}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000040)="7fe3665096e327076cc72eff26700e7a1bbf91c2e2f34168b20d81710b486e7d7fc7d407a8544d9d684182ccde939dac61477415cc46fc43f35b4c42b0ce0d428a8750bd57107cedd764ddd530692eee1927cc1589954ae19316ad99dc650936acac5980adacbea4cda7f574f9112a25ee969773e740a42e02b9088fb143baca5e124322e5d45d9ccd7bf246"}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) 13:58:45 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 401.041611][T28803] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 401.153237][T28814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:45 executing program 1 (fault-call:2 fault-nth:50): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc3ffffff, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 401.347862][T28812] device nr0 entered promiscuous mode [ 401.360109][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 401.376509][T28834] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 401.405785][T28835] FAULT_INJECTION: forcing a failure. [ 401.405785][T28835] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 401.460021][T28835] CPU: 0 PID: 28835 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 401.468747][T28835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.478831][T28835] Call Trace: [ 401.482138][T28835] dump_stack+0x197/0x210 [ 401.486483][T28835] should_fail.cold+0xa/0x15 [ 401.491089][T28835] ? fault_create_debugfs_attr+0x180/0x180 [ 401.496902][T28835] ? ___might_sleep+0x163/0x2c0 [ 401.501772][T28835] should_fail_alloc_page+0x50/0x60 [ 401.506983][T28835] __alloc_pages_nodemask+0x1a1/0x910 [ 401.512381][T28835] ? __alloc_pages_slowpath+0x2920/0x2920 [ 401.518119][T28835] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.524366][T28835] ? find_next_bit+0x107/0x130 [ 401.529145][T28835] pcpu_populate_chunk+0xf8/0x940 [ 401.534183][T28835] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 401.540084][T28835] ? find_next_bit+0xc7/0x130 [ 401.544769][T28835] pcpu_alloc+0xd5b/0x1380 [ 401.549207][T28835] ? pcpu_alloc_area+0x820/0x820 [ 401.554160][T28835] __alloc_percpu_gfp+0x28/0x30 [ 401.559020][T28835] htab_map_alloc+0xdb9/0x11c0 [ 401.563798][T28835] ? htab_map_update_elem+0xca0/0xca0 [ 401.569184][T28835] __do_sys_bpf+0x478/0x3610 [ 401.573787][T28835] ? bpf_prog_load+0x1960/0x1960 [ 401.578729][T28835] ? __kasan_check_write+0x14/0x20 [ 401.583839][T28835] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 401.589385][T28835] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 401.594673][T28835] ? wait_for_completion+0x440/0x440 [ 401.599969][T28835] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 401.606222][T28835] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 401.611679][T28835] ? do_syscall_64+0x26/0x790 [ 401.616360][T28835] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.622421][T28835] ? do_syscall_64+0x26/0x790 [ 401.627109][T28835] __x64_sys_bpf+0x73/0xb0 [ 401.631525][T28835] do_syscall_64+0xfa/0x790 [ 401.636036][T28835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.641925][T28835] RIP: 0033:0x45a909 [ 401.645818][T28835] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.665421][T28835] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 401.673849][T28835] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 401.681823][T28835] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 401.689792][T28835] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 401.697758][T28835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 401.705732][T28835] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'rdma'}]}, 0x6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e40508ecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xbf, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000200), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r2, 0x0, &(0x7f0000001440)=""/193}, 0x20) close(r2) 13:58:45 executing program 1 (fault-call:2 fault-nth:51): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:45 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000006f0081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e40525ecdb4cb9040a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:46 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000780081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 402.035765][T28850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 402.039398][T28847] FAULT_INJECTION: forcing a failure. [ 402.039398][T28847] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfcffffff, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 402.130027][T28847] CPU: 0 PID: 28847 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 402.138850][T28847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.148905][T28847] Call Trace: [ 402.148933][T28847] dump_stack+0x197/0x210 [ 402.148955][T28847] should_fail.cold+0xa/0x15 [ 402.148976][T28847] ? fault_create_debugfs_attr+0x180/0x180 [ 402.161170][T28847] ? ___might_sleep+0x163/0x2c0 [ 402.161199][T28847] should_fail_alloc_page+0x50/0x60 [ 402.161210][T28847] __alloc_pages_nodemask+0x1a1/0x910 [ 402.161227][T28847] ? __alloc_pages_slowpath+0x2920/0x2920 [ 402.161250][T28847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.161262][T28847] ? find_next_bit+0x107/0x130 [ 402.161280][T28847] pcpu_populate_chunk+0xf8/0x940 [ 402.161298][T28847] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 402.209881][T28847] ? find_next_bit+0xc7/0x130 [ 402.214574][T28847] pcpu_alloc+0xd5b/0x1380 [ 402.219008][T28847] ? pcpu_alloc_area+0x820/0x820 [ 402.223955][T28847] ? bpf_map_area_alloc+0x20/0x30 [ 402.228997][T28847] __alloc_percpu_gfp+0x28/0x30 [ 402.233862][T28847] htab_map_alloc+0xdb9/0x11c0 [ 402.238649][T28847] ? htab_map_update_elem+0xca0/0xca0 [ 402.244031][T28847] __do_sys_bpf+0x478/0x3610 [ 402.248635][T28847] ? bpf_prog_load+0x1960/0x1960 [ 402.253573][T28847] ? __kasan_check_write+0x14/0x20 [ 402.258671][T28847] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 402.264216][T28847] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 402.269488][T28847] ? wait_for_completion+0x440/0x440 [ 402.274764][T28847] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 402.281002][T28847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.286445][T28847] ? do_syscall_64+0x26/0x790 [ 402.291103][T28847] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.297153][T28847] ? do_syscall_64+0x26/0x790 [ 402.301818][T28847] __x64_sys_bpf+0x73/0xb0 [ 402.306221][T28847] do_syscall_64+0xfa/0x790 [ 402.310711][T28847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.316601][T28847] RIP: 0033:0x45a909 [ 402.320485][T28847] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.340094][T28847] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.348507][T28847] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 402.356461][T28847] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 402.364415][T28847] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 402.372368][T28847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 402.380330][T28847] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 402.407950][T28862] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:46 executing program 1 (fault-call:2 fault-nth:52): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:46 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000200200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffa888, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 402.557484][T28867] device nr0 entered promiscuous mode [ 402.698188][T28884] FAULT_INJECTION: forcing a failure. [ 402.698188][T28884] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 402.723289][T28884] CPU: 1 PID: 28884 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 402.731998][T28884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.742052][T28884] Call Trace: [ 402.745349][T28884] dump_stack+0x197/0x210 [ 402.749684][T28884] should_fail.cold+0xa/0x15 [ 402.754276][T28884] ? fault_create_debugfs_attr+0x180/0x180 [ 402.760170][T28884] ? ___might_sleep+0x163/0x2c0 [ 402.765032][T28884] should_fail_alloc_page+0x50/0x60 [ 402.770249][T28884] __alloc_pages_nodemask+0x1a1/0x910 [ 402.775629][T28884] ? __alloc_pages_slowpath+0x2920/0x2920 [ 402.781359][T28884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.787597][T28884] ? find_next_bit+0x107/0x130 [ 402.792370][T28884] pcpu_populate_chunk+0xf8/0x940 [ 402.797391][T28884] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 402.803105][T28884] ? find_next_bit+0xc7/0x130 [ 402.807790][T28884] pcpu_alloc+0xd5b/0x1380 [ 402.812222][T28884] ? pcpu_alloc_area+0x820/0x820 [ 402.817157][T28884] ? bpf_map_area_alloc+0x20/0x30 [ 402.822292][T28884] __alloc_percpu_gfp+0x28/0x30 [ 402.827143][T28884] htab_map_alloc+0xdb9/0x11c0 [ 402.831917][T28884] ? htab_map_update_elem+0xca0/0xca0 [ 402.837335][T28884] __do_sys_bpf+0x478/0x3610 [ 402.841943][T28884] ? bpf_prog_load+0x1960/0x1960 [ 402.846896][T28884] ? __kasan_check_write+0x14/0x20 [ 402.852002][T28884] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 402.857719][T28884] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 402.862989][T28884] ? wait_for_completion+0x440/0x440 [ 402.868269][T28884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 402.874503][T28884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 402.879960][T28884] ? do_syscall_64+0x26/0x790 [ 402.884619][T28884] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.890864][T28884] ? do_syscall_64+0x26/0x790 [ 402.895532][T28884] __x64_sys_bpf+0x73/0xb0 [ 402.899943][T28884] do_syscall_64+0xfa/0x790 [ 402.904444][T28884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.910316][T28884] RIP: 0033:0x45a909 [ 402.914198][T28884] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.933787][T28884] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.942329][T28884] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 402.950298][T28884] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 402.958382][T28884] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 402.966364][T28884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 402.974319][T28884] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 403.007742][T28883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'rdma'}]}, 0x6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9020a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, r3, 0x8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1, 0x4, 0x80, 0x80, 0x0, 0x54f, 0x4000, 0xb, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x821, 0x2, @perf_config_ext={0xa322000000000000, 0x81}, 0x100, 0x7fff, 0x7e1f, 0x5, 0x5, 0xdf3c, 0x7fff}, r2, 0xb, r1, 0x1) 13:58:47 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000300200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:47 executing program 1 (fault-call:2 fault-nth:53): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 403.312158][T28898] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 403.326977][T28900] FAULT_INJECTION: forcing a failure. [ 403.326977][T28900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 403.342048][T28900] CPU: 0 PID: 28900 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 403.350753][T28900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:58:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 403.360816][T28900] Call Trace: [ 403.364133][T28900] dump_stack+0x197/0x210 [ 403.368504][T28900] should_fail.cold+0xa/0x15 [ 403.373115][T28900] ? fault_create_debugfs_attr+0x180/0x180 [ 403.378953][T28900] ? ___might_sleep+0x163/0x2c0 [ 403.383815][T28900] should_fail_alloc_page+0x50/0x60 [ 403.383828][T28900] __alloc_pages_nodemask+0x1a1/0x910 [ 403.383845][T28900] ? __alloc_pages_slowpath+0x2920/0x2920 [ 403.383866][T28900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.383881][T28900] ? find_next_bit+0x107/0x130 [ 403.383900][T28900] pcpu_populate_chunk+0xf8/0x940 [ 403.383912][T28900] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 403.383922][T28900] ? find_next_bit+0xc7/0x130 [ 403.383942][T28900] pcpu_alloc+0xd5b/0x1380 [ 403.383965][T28900] ? pcpu_alloc_area+0x820/0x820 [ 403.435951][T28900] ? bpf_map_area_alloc+0x20/0x30 [ 403.441002][T28900] __alloc_percpu_gfp+0x28/0x30 [ 403.445865][T28900] htab_map_alloc+0xdb9/0x11c0 [ 403.450652][T28900] ? htab_map_update_elem+0xca0/0xca0 [ 403.456023][T28900] __do_sys_bpf+0x478/0x3610 [ 403.460603][T28900] ? bpf_prog_load+0x1960/0x1960 [ 403.465524][T28900] ? __kasan_check_write+0x14/0x20 [ 403.470647][T28900] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 403.476178][T28900] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 403.481463][T28900] ? wait_for_completion+0x440/0x440 [ 403.486738][T28900] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 403.492975][T28900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.498416][T28900] ? do_syscall_64+0x26/0x790 [ 403.503101][T28900] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.509196][T28900] ? do_syscall_64+0x26/0x790 [ 403.513877][T28900] __x64_sys_bpf+0x73/0xb0 [ 403.518288][T28900] do_syscall_64+0xfa/0x790 [ 403.522791][T28900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.528669][T28900] RIP: 0033:0x45a909 [ 403.532552][T28900] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 403.552172][T28900] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 403.560581][T28900] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 403.568535][T28900] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 403.576505][T28900] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 403.584485][T28900] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 403.592462][T28900] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:47 executing program 1 (fault-call:2 fault-nth:54): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:47 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000400200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 403.625522][T28907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9030a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='io.stat\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socketpair(0x11, 0x6, 0x1, &(0x7f0000000040)) [ 403.823890][T28903] device nr0 entered promiscuous mode [ 403.836693][T28918] FAULT_INJECTION: forcing a failure. [ 403.836693][T28918] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 403.892313][T28918] CPU: 1 PID: 28918 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 403.901047][T28918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.901056][T28918] Call Trace: [ 403.901083][T28918] dump_stack+0x197/0x210 [ 403.901103][T28918] should_fail.cold+0xa/0x15 [ 403.901124][T28918] ? fault_create_debugfs_attr+0x180/0x180 [ 403.901142][T28918] ? ___might_sleep+0x163/0x2c0 [ 403.901171][T28918] should_fail_alloc_page+0x50/0x60 [ 403.901187][T28918] __alloc_pages_nodemask+0x1a1/0x910 [ 403.901208][T28918] ? __alloc_pages_slowpath+0x2920/0x2920 [ 403.901234][T28918] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.901246][T28918] ? find_next_bit+0x107/0x130 [ 403.901268][T28918] pcpu_populate_chunk+0xf8/0x940 [ 403.929326][T28918] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 403.929343][T28918] ? find_next_bit+0xc7/0x130 [ 403.929366][T28918] pcpu_alloc+0xd5b/0x1380 [ 403.981252][T28918] ? pcpu_alloc_area+0x820/0x820 [ 403.986192][T28918] ? bpf_map_area_alloc+0x20/0x30 [ 403.991229][T28918] __alloc_percpu_gfp+0x28/0x30 [ 403.996083][T28918] htab_map_alloc+0xdb9/0x11c0 [ 404.000870][T28918] ? htab_map_update_elem+0xca0/0xca0 [ 404.006245][T28918] __do_sys_bpf+0x478/0x3610 [ 404.010848][T28918] ? bpf_prog_load+0x1960/0x1960 [ 404.015788][T28918] ? __kasan_check_write+0x14/0x20 [ 404.020904][T28918] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 404.026447][T28918] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 404.031733][T28918] ? wait_for_completion+0x440/0x440 [ 404.037026][T28918] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 404.043280][T28918] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 404.048749][T28918] ? do_syscall_64+0x26/0x790 [ 404.053523][T28918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.059589][T28918] ? do_syscall_64+0x26/0x790 [ 404.064280][T28918] __x64_sys_bpf+0x73/0xb0 [ 404.068700][T28918] do_syscall_64+0xfa/0x790 [ 404.073216][T28918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.079108][T28918] RIP: 0033:0x45a909 [ 404.083003][T28918] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.102607][T28918] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 404.111023][T28918] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 404.118995][T28918] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 404.127400][T28918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 404.135373][T28918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 404.143344][T28918] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 404.215782][T28923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000500200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:48 executing program 1 (fault-call:2 fault-nth:55): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9050a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:48 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, r3, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\xfc', 0x248800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r4, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000)='threaded\xfc', 0x248800) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x7, 0x80, 0xfd, 0x0, 0x0, 0x6, 0x4043, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x800, 0x5}, 0x0, 0x0, 0x3, 0x6, 0xff, 0x1d2c}, r5, 0x9, r6, 0x1) close(r1) [ 404.502079][T28943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 404.507704][T28944] FAULT_INJECTION: forcing a failure. [ 404.507704][T28944] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000600200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9060a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 404.547908][T28944] CPU: 0 PID: 28944 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 404.556630][T28944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.566997][T28944] Call Trace: [ 404.570309][T28944] dump_stack+0x197/0x210 [ 404.574657][T28944] should_fail.cold+0xa/0x15 [ 404.579263][T28944] ? fault_create_debugfs_attr+0x180/0x180 [ 404.585072][T28944] ? ___might_sleep+0x163/0x2c0 [ 404.589935][T28944] should_fail_alloc_page+0x50/0x60 [ 404.595146][T28944] __alloc_pages_nodemask+0x1a1/0x910 [ 404.600528][T28944] ? __alloc_pages_slowpath+0x2920/0x2920 [ 404.606267][T28944] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.612503][T28944] ? find_next_bit+0x107/0x130 [ 404.617265][T28944] pcpu_populate_chunk+0xf8/0x940 [ 404.617281][T28944] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 404.617296][T28944] ? find_next_bit+0xc7/0x130 [ 404.632696][T28944] pcpu_alloc+0xd5b/0x1380 [ 404.637122][T28944] ? pcpu_alloc_area+0x820/0x820 [ 404.637139][T28944] ? bpf_map_area_alloc+0x20/0x30 [ 404.637161][T28944] __alloc_percpu_gfp+0x28/0x30 [ 404.652304][T28944] htab_map_alloc+0xdb9/0x11c0 [ 404.652334][T28944] ? htab_map_update_elem+0xca0/0xca0 [ 404.652351][T28944] __do_sys_bpf+0x478/0x3610 [ 404.652369][T28944] ? bpf_prog_load+0x1960/0x1960 [ 404.652384][T28944] ? __kasan_check_write+0x14/0x20 [ 404.652403][T28944] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 404.662517][T28944] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 404.662535][T28944] ? wait_for_completion+0x440/0x440 [ 404.662558][T28944] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 404.662587][T28944] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 404.662605][T28944] ? do_syscall_64+0x26/0x790 [ 404.672981][T28944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.672994][T28944] ? do_syscall_64+0x26/0x790 [ 404.673016][T28944] __x64_sys_bpf+0x73/0xb0 [ 404.673034][T28944] do_syscall_64+0xfa/0x790 [ 404.673051][T28944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.673062][T28944] RIP: 0033:0x45a909 [ 404.673077][T28944] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.673084][T28944] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 404.768122][T28944] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 404.776104][T28944] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 404.784200][T28944] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 404.792309][T28944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 404.800265][T28944] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:48 executing program 1 (fault-call:2 fault-nth:56): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 404.845081][T28954] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffc, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 404.893685][T28958] device nr0 entered promiscuous mode 13:58:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000700200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 405.025170][T28971] FAULT_INJECTION: forcing a failure. [ 405.025170][T28971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 405.055523][T28971] CPU: 1 PID: 28971 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 405.064258][T28971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.074417][T28971] Call Trace: [ 405.077714][T28971] dump_stack+0x197/0x210 [ 405.082082][T28971] should_fail.cold+0xa/0x15 [ 405.086682][T28971] ? fault_create_debugfs_attr+0x180/0x180 [ 405.092499][T28971] ? ___might_sleep+0x163/0x2c0 [ 405.097371][T28971] should_fail_alloc_page+0x50/0x60 [ 405.102574][T28971] __alloc_pages_nodemask+0x1a1/0x910 [ 405.107967][T28971] ? __alloc_pages_slowpath+0x2920/0x2920 [ 405.113694][T28971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.119938][T28971] ? find_next_bit+0x107/0x130 [ 405.124712][T28971] pcpu_populate_chunk+0xf8/0x940 [ 405.129763][T28971] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 405.135484][T28971] ? find_next_bit+0xc7/0x130 [ 405.140168][T28971] pcpu_alloc+0xd5b/0x1380 [ 405.144605][T28971] ? pcpu_alloc_area+0x820/0x820 [ 405.149571][T28971] ? bpf_map_area_alloc+0x20/0x30 [ 405.154619][T28971] __alloc_percpu_gfp+0x28/0x30 [ 405.159487][T28971] htab_map_alloc+0xdb9/0x11c0 [ 405.164290][T28971] ? htab_map_update_elem+0xca0/0xca0 [ 405.169695][T28971] __do_sys_bpf+0x478/0x3610 [ 405.174306][T28971] ? bpf_prog_load+0x1960/0x1960 [ 405.179253][T28971] ? __kasan_check_write+0x14/0x20 [ 405.184371][T28971] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 405.189923][T28971] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 405.195218][T28971] ? wait_for_completion+0x440/0x440 [ 405.200518][T28971] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 405.206778][T28971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.212241][T28971] ? do_syscall_64+0x26/0x790 [ 405.216922][T28971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.222991][T28971] ? do_syscall_64+0x26/0x790 [ 405.227684][T28971] __x64_sys_bpf+0x73/0xb0 [ 405.232116][T28971] do_syscall_64+0xfa/0x790 [ 405.236660][T28971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.242763][T28971] RIP: 0033:0x45a909 [ 405.246654][T28971] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.266452][T28971] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 405.274849][T28971] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 405.282951][T28971] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 405.290911][T28971] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 405.298870][T28971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 405.307003][T28971] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 405.350491][T28973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:58:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x7f, 0x2, 0x6, 0xb2, 0x0, 0x80000000, 0x4000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc5e00000, 0xb, @perf_bp={&(0x7f0000000040), 0x1}, 0x21010, 0x6f, 0x7, 0x0, 0x5, 0x1, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 13:58:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9070a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:49 executing program 1 (fault-call:2 fault-nth:57): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000a00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) [ 405.676912][T28990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 405.691999][T28991] FAULT_INJECTION: forcing a failure. [ 405.691999][T28991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 405.712909][T28991] CPU: 0 PID: 28991 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 13:58:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000c00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 405.721714][T28991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.721722][T28991] Call Trace: [ 405.721748][T28991] dump_stack+0x197/0x210 [ 405.721769][T28991] should_fail.cold+0xa/0x15 [ 405.721787][T28991] ? fault_create_debugfs_attr+0x180/0x180 [ 405.721803][T28991] ? ___might_sleep+0x163/0x2c0 [ 405.721826][T28991] should_fail_alloc_page+0x50/0x60 [ 405.721843][T28991] __alloc_pages_nodemask+0x1a1/0x910 [ 405.754816][T28991] ? __alloc_pages_slowpath+0x2920/0x2920 [ 405.771068][T28991] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.777322][T28991] ? find_next_bit+0x107/0x130 [ 405.782099][T28991] pcpu_populate_chunk+0xf8/0x940 [ 405.787128][T28991] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 405.792852][T28991] ? find_next_bit+0xc7/0x130 [ 405.797540][T28991] pcpu_alloc+0xd5b/0x1380 [ 405.801977][T28991] ? pcpu_alloc_area+0x820/0x820 [ 405.806945][T28991] ? bpf_map_area_alloc+0x20/0x30 [ 405.811982][T28991] __alloc_percpu_gfp+0x28/0x30 [ 405.816838][T28991] htab_map_alloc+0xdb9/0x11c0 [ 405.821763][T28991] ? htab_map_update_elem+0xca0/0xca0 [ 405.827145][T28991] __do_sys_bpf+0x478/0x3610 [ 405.831752][T28991] ? bpf_prog_load+0x1960/0x1960 [ 405.836694][T28991] ? __kasan_check_write+0x14/0x20 [ 405.841815][T28991] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 405.847367][T28991] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 405.853270][T28991] ? wait_for_completion+0x440/0x440 [ 405.858571][T28991] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 405.864812][T28991] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.870268][T28991] ? do_syscall_64+0x26/0x790 [ 405.875046][T28991] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.881103][T28991] ? do_syscall_64+0x26/0x790 [ 405.885779][T28991] __x64_sys_bpf+0x73/0xb0 [ 405.890194][T28991] do_syscall_64+0xfa/0x790 [ 405.894692][T28991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.900686][T28991] RIP: 0033:0x45a909 [ 405.904572][T28991] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:58:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="0a000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 405.924250][T28991] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 405.932646][T28991] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 405.940603][T28991] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 405.948558][T28991] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 405.956511][T28991] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 405.964467][T28991] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:50 executing program 1 (fault-call:2 fault-nth:58): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9080a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000e00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x4700, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000080)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000000c0)) close(r1) 13:58:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="0f000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 406.284053][T29025] FAULT_INJECTION: forcing a failure. [ 406.284053][T29025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 406.322782][T29025] CPU: 0 PID: 29025 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 13:58:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="10000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 406.331511][T29025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.341574][T29025] Call Trace: [ 406.344894][T29025] dump_stack+0x197/0x210 [ 406.349344][T29025] should_fail.cold+0xa/0x15 [ 406.353981][T29025] ? fault_create_debugfs_attr+0x180/0x180 [ 406.359790][T29025] ? ___might_sleep+0x163/0x2c0 [ 406.364646][T29025] should_fail_alloc_page+0x50/0x60 [ 406.364659][T29025] __alloc_pages_nodemask+0x1a1/0x910 [ 406.364675][T29025] ? __alloc_pages_slowpath+0x2920/0x2920 [ 406.364697][T29025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.364710][T29025] ? find_next_bit+0x107/0x130 [ 406.364731][T29025] pcpu_populate_chunk+0xf8/0x940 [ 406.364745][T29025] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 406.364758][T29025] ? find_next_bit+0xc7/0x130 [ 406.364782][T29025] pcpu_alloc+0xd5b/0x1380 [ 406.411841][T29025] ? pcpu_alloc_area+0x820/0x820 [ 406.416786][T29025] ? bpf_map_area_alloc+0x20/0x30 [ 406.421827][T29025] __alloc_percpu_gfp+0x28/0x30 [ 406.426687][T29025] htab_map_alloc+0xdb9/0x11c0 13:58:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="25000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 406.431472][T29025] ? htab_map_update_elem+0xca0/0xca0 [ 406.436857][T29025] __do_sys_bpf+0x478/0x3610 [ 406.441463][T29025] ? bpf_prog_load+0x1960/0x1960 [ 406.446405][T29025] ? __kasan_check_write+0x14/0x20 [ 406.451525][T29025] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 406.457072][T29025] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 406.462359][T29025] ? wait_for_completion+0x440/0x440 [ 406.467662][T29025] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 406.473922][T29025] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 406.479386][T29025] ? do_syscall_64+0x26/0x790 [ 406.484066][T29025] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.490141][T29025] ? do_syscall_64+0x26/0x790 [ 406.494831][T29025] __x64_sys_bpf+0x73/0xb0 [ 406.499253][T29025] do_syscall_64+0xfa/0x790 [ 406.503768][T29025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.509661][T29025] RIP: 0033:0x45a909 [ 406.513559][T29025] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.533338][T29025] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 406.541757][T29025] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 406.549723][T29025] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 406.557797][T29025] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 406.565754][T29025] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 406.573835][T29025] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 406.587035][T29000] device nr0 entered promiscuous mode 13:58:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000f00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:50 executing program 1 (fault-call:2 fault-nth:59): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 406.780789][T29044] FAULT_INJECTION: forcing a failure. [ 406.780789][T29044] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 406.814976][T29044] CPU: 0 PID: 29044 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 406.823701][T29044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.833858][T29044] Call Trace: [ 406.833885][T29044] dump_stack+0x197/0x210 [ 406.833906][T29044] should_fail.cold+0xa/0x15 [ 406.833926][T29044] ? fault_create_debugfs_attr+0x180/0x180 [ 406.833944][T29044] ? ___might_sleep+0x163/0x2c0 [ 406.833972][T29044] should_fail_alloc_page+0x50/0x60 [ 406.833985][T29044] __alloc_pages_nodemask+0x1a1/0x910 [ 406.834002][T29044] ? __alloc_pages_slowpath+0x2920/0x2920 [ 406.834023][T29044] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.834037][T29044] ? find_next_bit+0x107/0x130 [ 406.834055][T29044] pcpu_populate_chunk+0xf8/0x940 [ 406.834075][T29044] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 406.846248][T29044] ? find_next_bit+0xc7/0x130 [ 406.846275][T29044] pcpu_alloc+0xd5b/0x1380 [ 406.846302][T29044] ? pcpu_alloc_area+0x820/0x820 [ 406.846324][T29044] ? bpf_map_area_alloc+0x20/0x30 [ 406.846348][T29044] __alloc_percpu_gfp+0x28/0x30 [ 406.857244][T29044] htab_map_alloc+0xdb9/0x11c0 [ 406.873595][T29044] ? htab_map_update_elem+0xca0/0xca0 [ 406.873614][T29044] __do_sys_bpf+0x478/0x3610 [ 406.873631][T29044] ? bpf_prog_load+0x1960/0x1960 [ 406.873644][T29044] ? __kasan_check_write+0x14/0x20 [ 406.873659][T29044] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 406.873674][T29044] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 406.873690][T29044] ? wait_for_completion+0x440/0x440 [ 406.873712][T29044] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 406.873738][T29044] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 406.873753][T29044] ? do_syscall_64+0x26/0x790 [ 406.873767][T29044] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.873779][T29044] ? do_syscall_64+0x26/0x790 [ 406.873799][T29044] __x64_sys_bpf+0x73/0xb0 [ 406.873814][T29044] do_syscall_64+0xfa/0x790 [ 406.873830][T29044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.873847][T29044] RIP: 0033:0x45a909 [ 406.889874][T29044] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.889883][T29044] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 406.889898][T29044] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 406.889907][T29044] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 406.889916][T29044] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 406.889925][T29044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 406.889935][T29044] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 407.079245][T29034] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:58:51 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:51 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)=')GPL\x00') close(r1) 13:58:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="30000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb90a0a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:51 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e001000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:51 executing program 1 (fault-call:2 fault-nth:60): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:51 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e004800200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 407.411140][T29062] FAULT_INJECTION: forcing a failure. [ 407.411140][T29062] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 407.431825][T29062] CPU: 0 PID: 29062 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 407.440516][T29062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.450570][T29062] Call Trace: [ 407.453858][T29062] dump_stack+0x197/0x210 [ 407.458190][T29062] should_fail.cold+0xa/0x15 [ 407.462777][T29062] ? fault_create_debugfs_attr+0x180/0x180 [ 407.468569][T29062] ? ___might_sleep+0x163/0x2c0 [ 407.473414][T29062] should_fail_alloc_page+0x50/0x60 [ 407.478597][T29062] __alloc_pages_nodemask+0x1a1/0x910 [ 407.483957][T29062] ? __alloc_pages_slowpath+0x2920/0x2920 [ 407.489663][T29062] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.495887][T29062] ? find_next_bit+0x107/0x130 [ 407.500640][T29062] pcpu_populate_chunk+0xf8/0x940 [ 407.505647][T29062] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 407.511349][T29062] ? find_next_bit+0xc7/0x130 [ 407.516027][T29062] pcpu_alloc+0xd5b/0x1380 [ 407.520463][T29062] ? pcpu_alloc_area+0x820/0x820 [ 407.525384][T29062] ? bpf_map_area_alloc+0x20/0x30 [ 407.530400][T29062] __alloc_percpu_gfp+0x28/0x30 [ 407.535233][T29062] htab_map_alloc+0xdb9/0x11c0 [ 407.539988][T29062] ? htab_map_update_elem+0xca0/0xca0 [ 407.545341][T29062] __do_sys_bpf+0x478/0x3610 [ 407.549918][T29062] ? bpf_prog_load+0x1960/0x1960 [ 407.554854][T29062] ? __kasan_check_write+0x14/0x20 [ 407.559966][T29062] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 407.565492][T29062] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 407.570783][T29062] ? wait_for_completion+0x440/0x440 [ 407.576057][T29062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 407.582290][T29062] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 407.587731][T29062] ? do_syscall_64+0x26/0x790 [ 407.592394][T29062] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.598454][T29062] ? do_syscall_64+0x26/0x790 [ 407.603121][T29062] __x64_sys_bpf+0x73/0xb0 [ 407.607528][T29062] do_syscall_64+0xfa/0x790 [ 407.612018][T29062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.617894][T29062] RIP: 0033:0x45a909 [ 407.621774][T29062] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.641359][T29062] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 407.649752][T29062] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 407.657707][T29062] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 407.668527][T29062] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 407.676514][T29062] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 407.684482][T29062] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:51 executing program 1 (fault-call:2 fault-nth:61): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb90b0a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="51000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:51 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="71099d94d0f4f95426a26c2b63adb69ca7d360d373ed44e88c4a29d86db4964faa3ac2b78b0f6647de9f68d387355c5d681c743407f1a60c04e3c385119c3673be881bb2df91f5e8c90acc23eca7ab5433f757a4081089", 0x57}, {&(0x7f0000000080)="115435aa8e07617b0eb3f4a64d24f84d8637980c51756b9eccb8c60be49fa19e7f060ef511caf52cf60f90c973dc88c1e37613c7af4211f25b12a434eec79db0d657ff24c5f20e8536deb59f6527cdda40bfcf5f160748ce3ee007f2413a215f758ef3bff1bd1c5ac0d1ed96a857059b09829ea97efe51975d9be3e134ab3423028539e91516c8b3bf48833d998c03a9bf41cee912c88e26000543641894a74282bba80202c013324c553f7fede51bbd1ee9bc67b098540decd27e1f50", 0xbd}, {&(0x7f0000000600)="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", 0x1000}], 0x3, &(0x7f0000000180)=[{0xb8, 0x10b, 0x1, "16c1f6aeeaa72a5a290f333eca25cb4bd2263c7f52f8898c4eab7f25d148d79ec1bc3be24aa5072f0848fb731a210bc3865116497756044fd5c03b2714468ab4711c175fa6c3f732df9b68fc682fd96724784aff3cdf9b6a1c1d928d289d833f84a4893401d96b7b105cdbf2aa079fadc174678641ab68ec3fcdc190b490f78e22592c4c7e37555c27de27c73c367810a8ef0c9ec56d6aed2ebf28a8881cc25528e5749c77"}], 0xb8}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 13:58:51 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e004c00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 407.929679][T29081] FAULT_INJECTION: forcing a failure. [ 407.929679][T29081] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 408.002621][T29081] CPU: 1 PID: 29081 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 408.011352][T29081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.021451][T29081] Call Trace: [ 408.024778][T29081] dump_stack+0x197/0x210 [ 408.029135][T29081] should_fail.cold+0xa/0x15 [ 408.033746][T29081] ? fault_create_debugfs_attr+0x180/0x180 [ 408.039563][T29081] ? ___might_sleep+0x163/0x2c0 [ 408.044453][T29081] should_fail_alloc_page+0x50/0x60 [ 408.049681][T29081] __alloc_pages_nodemask+0x1a1/0x910 [ 408.055066][T29081] ? __alloc_pages_slowpath+0x2920/0x2920 [ 408.060834][T29081] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.067109][T29081] ? find_next_bit+0x107/0x130 [ 408.071916][T29081] pcpu_populate_chunk+0xf8/0x940 [ 408.076947][T29081] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 408.082676][T29081] ? find_next_bit+0xc7/0x130 [ 408.087375][T29081] pcpu_alloc+0xd5b/0x1380 [ 408.091812][T29081] ? pcpu_alloc_area+0x820/0x820 [ 408.096768][T29081] ? bpf_map_area_alloc+0x20/0x30 [ 408.101809][T29081] __alloc_percpu_gfp+0x28/0x30 [ 408.106671][T29081] htab_map_alloc+0xdb9/0x11c0 [ 408.111655][T29081] ? htab_map_update_elem+0xca0/0xca0 [ 408.117063][T29081] __do_sys_bpf+0x478/0x3610 [ 408.121675][T29081] ? bpf_prog_load+0x1960/0x1960 [ 408.126644][T29081] ? __kasan_check_write+0x14/0x20 [ 408.131764][T29081] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 408.137332][T29081] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 408.142700][T29081] ? wait_for_completion+0x440/0x440 [ 408.148018][T29081] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 408.154278][T29081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 408.159889][T29081] ? do_syscall_64+0x26/0x790 [ 408.164702][T29081] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.170830][T29081] ? do_syscall_64+0x26/0x790 [ 408.175549][T29081] __x64_sys_bpf+0x73/0xb0 [ 408.179985][T29081] do_syscall_64+0xfa/0x790 [ 408.184497][T29081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.190407][T29081] RIP: 0033:0x45a909 [ 408.194348][T29081] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.213958][T29081] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 408.222368][T29081] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 408.230344][T29081] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 408.238321][T29081] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 408.246369][T29081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 408.254326][T29081] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 408.287677][T29067] device nr0 entered promiscuous mode 13:58:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="c0000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:52 executing program 1 (fault-call:2 fault-nth:62): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb90c0a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:52 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, r3, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\xfc', 0x248800) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000)='threaded\xfc', 0x248800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r5, 0x0, 0x3, &(0x7f0000000040)='@$\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r4, 0x0, 0x1, &(0x7f0000000000)='\x00', r6}, 0x30) 13:58:52 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="b3010000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 408.809248][T29110] FAULT_INJECTION: forcing a failure. [ 408.809248][T29110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 408.845435][T29110] CPU: 1 PID: 29110 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 13:58:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb90d0a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:52 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006800200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 408.854182][T29110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.864241][T29110] Call Trace: [ 408.867555][T29110] dump_stack+0x197/0x210 [ 408.871905][T29110] should_fail.cold+0xa/0x15 [ 408.876513][T29110] ? fault_create_debugfs_attr+0x180/0x180 [ 408.882332][T29110] ? ___might_sleep+0x163/0x2c0 [ 408.887207][T29110] should_fail_alloc_page+0x50/0x60 [ 408.892416][T29110] __alloc_pages_nodemask+0x1a1/0x910 [ 408.897787][T29110] ? __alloc_pages_slowpath+0x2920/0x2920 [ 408.903622][T29110] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.910742][T29110] ? find_next_bit+0x107/0x130 [ 408.915521][T29110] pcpu_populate_chunk+0xf8/0x940 [ 408.920549][T29110] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 408.920566][T29110] ? find_next_bit+0xc7/0x130 [ 408.920593][T29110] pcpu_alloc+0xd5b/0x1380 [ 408.920615][T29110] ? pcpu_alloc_area+0x820/0x820 [ 408.920635][T29110] ? bpf_map_area_alloc+0x20/0x30 [ 408.935446][T29110] __alloc_percpu_gfp+0x28/0x30 [ 408.935468][T29110] htab_map_alloc+0xdb9/0x11c0 13:58:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="c00e0000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 408.955002][T29110] ? htab_map_update_elem+0xca0/0xca0 [ 408.960389][T29110] __do_sys_bpf+0x478/0x3610 [ 408.964994][T29110] ? bpf_prog_load+0x1960/0x1960 [ 408.969936][T29110] ? __kasan_check_write+0x14/0x20 [ 408.975057][T29110] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 408.980625][T29110] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 408.985930][T29110] ? wait_for_completion+0x440/0x440 [ 408.991233][T29110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 408.997489][T29110] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 409.002949][T29110] ? do_syscall_64+0x26/0x790 [ 409.007632][T29110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.013800][T29110] ? do_syscall_64+0x26/0x790 [ 409.013821][T29110] __x64_sys_bpf+0x73/0xb0 [ 409.022898][T29110] do_syscall_64+0xfa/0x790 [ 409.022917][T29110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.022929][T29110] RIP: 0033:0x45a909 [ 409.022943][T29110] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:58:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="e03f0300130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 409.022956][T29110] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 409.065221][T29110] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 409.073198][T29110] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 409.081176][T29110] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 409.089159][T29110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 409.097145][T29110] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:53 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006c00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 409.252451][T29124] device nr0 entered promiscuous mode 13:58:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:53 executing program 1 (fault-call:2 fault-nth:63): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:53 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3800000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:58:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e040020130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb90f0a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:53 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e007400200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="00f0ff7f130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 409.871079][T29156] FAULT_INJECTION: forcing a failure. [ 409.871079][T29156] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 409.891691][T29156] CPU: 1 PID: 29156 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 409.900559][T29156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.910621][T29156] Call Trace: [ 409.913928][T29156] dump_stack+0x197/0x210 13:58:53 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e007a00200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 409.918272][T29156] should_fail.cold+0xa/0x15 [ 409.922870][T29156] ? fault_create_debugfs_attr+0x180/0x180 [ 409.928688][T29156] ? ___might_sleep+0x163/0x2c0 [ 409.933560][T29156] should_fail_alloc_page+0x50/0x60 [ 409.938765][T29156] __alloc_pages_nodemask+0x1a1/0x910 [ 409.944151][T29156] ? __alloc_pages_slowpath+0x2920/0x2920 [ 409.949894][T29156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.956140][T29156] ? find_next_bit+0x107/0x130 [ 409.960920][T29156] pcpu_populate_chunk+0xf8/0x940 [ 409.965953][T29156] ? __sanitizer_cov_trace_cmp8+0x18/0x20 13:58:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="effdffff130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 409.971781][T29156] ? find_next_bit+0xc7/0x130 [ 409.976478][T29156] pcpu_alloc+0xd5b/0x1380 [ 409.981079][T29156] ? pcpu_alloc_area+0x820/0x820 [ 409.986237][T29156] ? bpf_map_area_alloc+0x20/0x30 [ 409.991288][T29156] __alloc_percpu_gfp+0x28/0x30 [ 409.996148][T29156] htab_map_alloc+0xdb9/0x11c0 [ 410.000935][T29156] ? htab_map_update_elem+0xca0/0xca0 [ 410.000952][T29156] __do_sys_bpf+0x478/0x3610 [ 410.000970][T29156] ? bpf_prog_load+0x1960/0x1960 [ 410.000988][T29156] ? __kasan_check_write+0x14/0x20 [ 410.016006][T29156] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 410.016024][T29156] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 410.016044][T29156] ? wait_for_completion+0x440/0x440 [ 410.037245][T29156] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 410.037277][T29156] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.048962][T29156] ? do_syscall_64+0x26/0x790 [ 410.053651][T29156] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.059720][T29156] ? do_syscall_64+0x26/0x790 [ 410.059745][T29156] __x64_sys_bpf+0x73/0xb0 [ 410.059760][T29156] do_syscall_64+0xfa/0x790 [ 410.059780][T29156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.079330][T29156] RIP: 0033:0x45a909 [ 410.079346][T29156] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.079354][T29156] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 410.079369][T29156] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 13:58:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e0000000f0081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9100a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 410.079378][T29156] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 410.079391][T29156] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 410.102994][T29156] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 410.103004][T29156] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:54 executing program 1 (fault-call:2 fault-nth:64): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 410.327585][T29170] device nr0 entered promiscuous mode [ 410.405848][T29184] FAULT_INJECTION: forcing a failure. [ 410.405848][T29184] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 410.459258][T29184] CPU: 1 PID: 29184 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 410.467996][T29184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.478096][T29184] Call Trace: [ 410.481400][T29184] dump_stack+0x197/0x210 [ 410.485742][T29184] should_fail.cold+0xa/0x15 [ 410.490344][T29184] ? fault_create_debugfs_attr+0x180/0x180 [ 410.496162][T29184] ? ___might_sleep+0x163/0x2c0 [ 410.501035][T29184] should_fail_alloc_page+0x50/0x60 [ 410.506243][T29184] __alloc_pages_nodemask+0x1a1/0x910 [ 410.511626][T29184] ? __alloc_pages_slowpath+0x2920/0x2920 [ 410.517354][T29184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.523595][T29184] ? find_next_bit+0x107/0x130 [ 410.528368][T29184] pcpu_populate_chunk+0xf8/0x940 [ 410.533391][T29184] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 410.539110][T29184] ? find_next_bit+0xc7/0x130 [ 410.543793][T29184] pcpu_alloc+0xd5b/0x1380 [ 410.548222][T29184] ? pcpu_alloc_area+0x820/0x820 [ 410.553161][T29184] ? bpf_map_area_alloc+0x20/0x30 [ 410.558197][T29184] __alloc_percpu_gfp+0x28/0x30 [ 410.563049][T29184] htab_map_alloc+0xdb9/0x11c0 [ 410.567826][T29184] ? htab_map_update_elem+0xca0/0xca0 [ 410.573202][T29184] __do_sys_bpf+0x478/0x3610 [ 410.577798][T29184] ? bpf_prog_load+0x1960/0x1960 [ 410.582745][T29184] ? __kasan_check_write+0x14/0x20 [ 410.587859][T29184] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 410.593407][T29184] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 410.598691][T29184] ? wait_for_completion+0x440/0x440 [ 410.604079][T29184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 410.610339][T29184] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.615835][T29184] ? do_syscall_64+0x26/0x790 [ 410.620513][T29184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.626581][T29184] ? do_syscall_64+0x26/0x790 [ 410.631296][T29184] __x64_sys_bpf+0x73/0xb0 [ 410.635719][T29184] do_syscall_64+0xfa/0x790 [ 410.640229][T29184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.646115][T29184] RIP: 0033:0x45a909 [ 410.650011][T29184] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.669878][T29184] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 410.678326][T29184] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 410.686288][T29184] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 410.694264][T29184] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 410.702215][T29184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 410.710163][T29184] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:54 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x5) close(0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) 13:58:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00f000200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9130a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e020000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:54 executing program 1 (fault-call:2 fault-nth:65): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 410.985103][T29194] FAULT_INJECTION: forcing a failure. [ 410.985103][T29194] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 411.012947][T29194] CPU: 1 PID: 29194 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 411.021681][T29194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.031739][T29194] Call Trace: 13:58:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e030000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 411.035042][T29194] dump_stack+0x197/0x210 [ 411.039390][T29194] should_fail.cold+0xa/0x15 [ 411.044105][T29194] ? fault_create_debugfs_attr+0x180/0x180 [ 411.049919][T29194] ? ___might_sleep+0x163/0x2c0 [ 411.054792][T29194] should_fail_alloc_page+0x50/0x60 [ 411.059998][T29194] __alloc_pages_nodemask+0x1a1/0x910 [ 411.065490][T29194] ? __alloc_pages_slowpath+0x2920/0x2920 [ 411.071222][T29194] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.077462][T29194] ? find_next_bit+0x107/0x130 13:58:55 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, r3, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x3, 0x82, 0x2, 0xc7, 0x0, 0x40, 0x20000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x19d4000, 0x0, @perf_config_ext={0x2, 0x5}, 0x1007, 0x40, 0x3, 0x8, 0x8, 0x8001, 0x7}) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x5, 0x6, 0x8, 0x8, 0x0, 0xfffffffffffffff8, 0x90405, 0xe, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0xfffffffffffff000}, 0x1022, 0x3, 0x6, 0x6, 0x3f, 0x0, 0x401}, r2, 0x7, r4, 0x1e) 13:58:55 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000003200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 411.082240][T29194] pcpu_populate_chunk+0xf8/0x940 [ 411.087277][T29194] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 411.093012][T29194] ? find_next_bit+0xc7/0x130 [ 411.097710][T29194] pcpu_alloc+0xd5b/0x1380 [ 411.102146][T29194] ? pcpu_alloc_area+0x820/0x820 [ 411.107246][T29194] ? bpf_map_area_alloc+0x20/0x30 [ 411.112281][T29194] __alloc_percpu_gfp+0x28/0x30 [ 411.112299][T29194] htab_map_alloc+0xdb9/0x11c0 [ 411.112352][T29194] ? htab_map_update_elem+0xca0/0xca0 [ 411.112371][T29194] __do_sys_bpf+0x478/0x3610 [ 411.131919][T29194] ? bpf_prog_load+0x1960/0x1960 [ 411.136879][T29194] ? __kasan_check_write+0x14/0x20 [ 411.142009][T29194] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 411.147734][T29194] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 411.147750][T29194] ? wait_for_completion+0x440/0x440 [ 411.147778][T29194] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 411.164699][T29194] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.170181][T29194] ? do_syscall_64+0x26/0x790 [ 411.174880][T29194] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.180958][T29194] ? do_syscall_64+0x26/0x790 [ 411.185782][T29194] __x64_sys_bpf+0x73/0xb0 [ 411.190227][T29194] do_syscall_64+0xfa/0x790 [ 411.194745][T29194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.200639][T29194] RIP: 0033:0x45a909 [ 411.204542][T29194] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 411.224165][T29194] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:58:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9140a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 411.224183][T29194] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 411.224192][T29194] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 411.224201][T29194] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 411.224214][T29194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 411.224222][T29194] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e040000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:55 executing program 1 (fault-call:2 fault-nth:66): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 411.421667][T29233] FAULT_INJECTION: forcing a failure. [ 411.421667][T29233] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 411.476139][T29233] CPU: 1 PID: 29233 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 411.484871][T29233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.494931][T29233] Call Trace: [ 411.498353][T29233] dump_stack+0x197/0x210 [ 411.502700][T29233] should_fail.cold+0xa/0x15 [ 411.507308][T29233] ? fault_create_debugfs_attr+0x180/0x180 [ 411.513131][T29233] ? ___might_sleep+0x163/0x2c0 [ 411.517990][T29233] should_fail_alloc_page+0x50/0x60 [ 411.523176][T29233] __alloc_pages_nodemask+0x1a1/0x910 [ 411.523193][T29233] ? __alloc_pages_slowpath+0x2920/0x2920 [ 411.523215][T29233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.523229][T29233] ? find_next_bit+0x107/0x130 [ 411.523250][T29233] pcpu_populate_chunk+0xf8/0x940 [ 411.550564][T29233] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 411.556290][T29233] ? find_next_bit+0xc7/0x130 [ 411.560986][T29233] pcpu_alloc+0xd5b/0x1380 [ 411.565406][T29233] ? pcpu_alloc_area+0x820/0x820 [ 411.570346][T29233] ? bpf_map_area_alloc+0x20/0x30 [ 411.575359][T29233] __alloc_percpu_gfp+0x28/0x30 [ 411.580194][T29233] htab_map_alloc+0xdb9/0x11c0 [ 411.584996][T29233] ? htab_map_update_elem+0xca0/0xca0 [ 411.590494][T29233] __do_sys_bpf+0x478/0x3610 [ 411.595072][T29233] ? bpf_prog_load+0x1960/0x1960 [ 411.600012][T29233] ? __kasan_check_write+0x14/0x20 [ 411.605108][T29233] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 411.610637][T29233] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 411.616003][T29233] ? wait_for_completion+0x440/0x440 [ 411.621281][T29233] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 411.627525][T29233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 411.632985][T29233] ? do_syscall_64+0x26/0x790 [ 411.637646][T29233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.643749][T29233] ? do_syscall_64+0x26/0x790 [ 411.648412][T29233] __x64_sys_bpf+0x73/0xb0 [ 411.652925][T29233] do_syscall_64+0xfa/0x790 [ 411.657431][T29233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.663309][T29233] RIP: 0033:0x45a909 [ 411.667251][T29233] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 411.686862][T29233] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 411.695273][T29233] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 411.703227][T29233] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 411.711181][T29233] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 411.719131][T29233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 411.727094][T29233] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 411.758309][T29206] device nr0 entered promiscuous mode 13:58:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9150a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000005200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e050000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:56 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30b) close(r1) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xbf, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r4, &(0x7f0000000200), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r4, 0x0, &(0x7f0000001440)=""/193}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5b}, [@map_val={0x18, 0x2, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x73}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f0000000040)='GPL\x00', 0xffff, 0xf8, &(0x7f0000000080)=""/248, 0x41000, 0x1, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xe, 0x2, 0x7fff}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000280)={r3, r5}) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xbf, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r6, &(0x7f0000000200), &(0x7f0000000100)}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000)='threaded\xfc', 0x248800) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r6, 0x0, &(0x7f0000001440)=""/193}, 0x20) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x3, 0x4, 0xd0b, 0x5, 0xba2, r6, 0x38, [], 0x0, r8, 0x2}, 0x3c) 13:58:56 executing program 1 (fault-call:2 fault-nth:67): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000006200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e060000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 412.266633][T29248] FAULT_INJECTION: forcing a failure. [ 412.266633][T29248] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 412.284531][T29248] CPU: 1 PID: 29248 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 412.293257][T29248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.305841][T29248] Call Trace: [ 412.309160][T29248] dump_stack+0x197/0x210 13:58:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9160a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 412.313516][T29248] should_fail.cold+0xa/0x15 [ 412.318134][T29248] ? fault_create_debugfs_attr+0x180/0x180 [ 412.323958][T29248] ? ___might_sleep+0x163/0x2c0 [ 412.328920][T29248] should_fail_alloc_page+0x50/0x60 [ 412.334127][T29248] __alloc_pages_nodemask+0x1a1/0x910 [ 412.339511][T29248] ? __alloc_pages_slowpath+0x2920/0x2920 [ 412.345276][T29248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 412.351525][T29248] ? find_next_bit+0x107/0x130 [ 412.356298][T29248] pcpu_populate_chunk+0xf8/0x940 [ 412.361332][T29248] ? __sanitizer_cov_trace_cmp8+0x18/0x20 13:58:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e070000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 412.367064][T29248] ? find_next_bit+0xc7/0x130 [ 412.371765][T29248] pcpu_alloc+0xd5b/0x1380 [ 412.376199][T29248] ? pcpu_alloc_area+0x820/0x820 [ 412.381147][T29248] ? bpf_map_area_alloc+0x20/0x30 [ 412.386452][T29248] __alloc_percpu_gfp+0x28/0x30 [ 412.391307][T29248] htab_map_alloc+0xdb9/0x11c0 [ 412.396074][T29248] ? htab_map_update_elem+0xca0/0xca0 [ 412.401451][T29248] __do_sys_bpf+0x478/0x3610 [ 412.401469][T29248] ? bpf_prog_load+0x1960/0x1960 [ 412.401484][T29248] ? __kasan_check_write+0x14/0x20 [ 412.401498][T29248] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 412.401513][T29248] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 412.401525][T29248] ? wait_for_completion+0x440/0x440 [ 412.401546][T29248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 412.401574][T29248] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 412.443834][T29248] ? do_syscall_64+0x26/0x790 [ 412.448498][T29248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.454548][T29248] ? do_syscall_64+0x26/0x790 [ 412.459229][T29248] __x64_sys_bpf+0x73/0xb0 [ 412.463633][T29248] do_syscall_64+0xfa/0x790 [ 412.468126][T29248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.474002][T29248] RIP: 0033:0x45a909 [ 412.477969][T29248] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.497558][T29248] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 412.505952][T29248] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 412.513930][T29248] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 412.521883][T29248] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 412.529839][T29248] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 412.537796][T29248] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000007200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:56 executing program 1 (fault-call:2 fault-nth:68): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 412.848839][T29261] device nr0 entered promiscuous mode [ 412.936289][T29282] FAULT_INJECTION: forcing a failure. [ 412.936289][T29282] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 412.958192][T29282] CPU: 1 PID: 29282 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 412.966918][T29282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.976989][T29282] Call Trace: [ 412.980303][T29282] dump_stack+0x197/0x210 [ 412.984647][T29282] should_fail.cold+0xa/0x15 [ 412.989247][T29282] ? fault_create_debugfs_attr+0x180/0x180 [ 412.995076][T29282] ? ___might_sleep+0x163/0x2c0 [ 412.999943][T29282] should_fail_alloc_page+0x50/0x60 [ 413.005142][T29282] __alloc_pages_nodemask+0x1a1/0x910 [ 413.010519][T29282] ? __alloc_pages_slowpath+0x2920/0x2920 [ 413.016246][T29282] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.022484][T29282] ? find_next_bit+0x107/0x130 [ 413.027270][T29282] pcpu_populate_chunk+0xf8/0x940 [ 413.032647][T29282] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 413.038363][T29282] ? find_next_bit+0xc7/0x130 [ 413.043076][T29282] pcpu_alloc+0xd5b/0x1380 [ 413.047503][T29282] ? pcpu_alloc_area+0x820/0x820 [ 413.052439][T29282] ? bpf_map_area_alloc+0x20/0x30 [ 413.057473][T29282] __alloc_percpu_gfp+0x28/0x30 [ 413.062470][T29282] htab_map_alloc+0xdb9/0x11c0 [ 413.067286][T29282] ? htab_map_update_elem+0xca0/0xca0 [ 413.072648][T29282] __do_sys_bpf+0x478/0x3610 [ 413.077228][T29282] ? bpf_prog_load+0x1960/0x1960 [ 413.082170][T29282] ? __kasan_check_write+0x14/0x20 [ 413.087279][T29282] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 413.092827][T29282] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 413.098250][T29282] ? wait_for_completion+0x440/0x440 [ 413.103565][T29282] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 413.109803][T29282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.115398][T29282] ? do_syscall_64+0x26/0x790 [ 413.120064][T29282] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.126209][T29282] ? do_syscall_64+0x26/0x790 [ 413.130973][T29282] __x64_sys_bpf+0x73/0xb0 [ 413.135438][T29282] do_syscall_64+0xfa/0x790 [ 413.139950][T29282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.145886][T29282] RIP: 0033:0x45a909 [ 413.149765][T29282] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.169362][T29282] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 413.177816][T29282] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 413.186024][T29282] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 413.194046][T29282] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 413.202080][T29282] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 413.210101][T29282] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9180a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:57 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:58:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e0a0000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:57 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006909200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:57 executing program 1 (fault-call:2 fault-nth:69): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 413.506287][T29291] FAULT_INJECTION: forcing a failure. [ 413.506287][T29291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb91b0a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:57 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x2a1, 0x3e2, 0x1f, 0x0, 0x0, 0x0, 0x200000000000, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xaf8959c53e0dd358}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) socket$kcm(0x29, 0x3, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='eth1\x00') [ 413.548523][T29291] CPU: 1 PID: 29291 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 413.557253][T29291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.567310][T29291] Call Trace: [ 413.570620][T29291] dump_stack+0x197/0x210 [ 413.574974][T29291] should_fail.cold+0xa/0x15 [ 413.579581][T29291] ? fault_create_debugfs_attr+0x180/0x180 [ 413.585393][T29291] ? ___might_sleep+0x163/0x2c0 [ 413.590250][T29291] should_fail_alloc_page+0x50/0x60 13:58:57 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000a200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 413.590263][T29291] __alloc_pages_nodemask+0x1a1/0x910 [ 413.590280][T29291] ? __alloc_pages_slowpath+0x2920/0x2920 [ 413.590301][T29291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.590321][T29291] ? find_next_bit+0x107/0x130 [ 413.617586][T29291] pcpu_populate_chunk+0xf8/0x940 [ 413.622616][T29291] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 413.628325][T29291] ? find_next_bit+0xc7/0x130 [ 413.633007][T29291] pcpu_alloc+0xd5b/0x1380 [ 413.637449][T29291] ? pcpu_alloc_area+0x820/0x820 [ 413.642561][T29291] ? bpf_map_area_alloc+0x20/0x30 [ 413.647591][T29291] __alloc_percpu_gfp+0x28/0x30 [ 413.652439][T29291] htab_map_alloc+0xdb9/0x11c0 [ 413.652465][T29291] ? htab_map_update_elem+0xca0/0xca0 [ 413.652486][T29291] __do_sys_bpf+0x478/0x3610 [ 413.667208][T29291] ? bpf_prog_load+0x1960/0x1960 [ 413.672160][T29291] ? __kasan_check_write+0x14/0x20 [ 413.677287][T29291] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 413.682852][T29291] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 413.688147][T29291] ? wait_for_completion+0x440/0x440 [ 413.693452][T29291] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 413.693483][T29291] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.693497][T29291] ? do_syscall_64+0x26/0x790 [ 413.693512][T29291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.693529][T29291] ? do_syscall_64+0x26/0x790 [ 413.720581][T29291] __x64_sys_bpf+0x73/0xb0 [ 413.725014][T29291] do_syscall_64+0xfa/0x790 [ 413.729535][T29291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.735432][T29291] RIP: 0033:0x45a909 [ 413.739332][T29291] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.758937][T29291] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 413.767346][T29291] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 413.775300][T29291] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 413.783409][T29291] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 413.791501][T29291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 13:58:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e0c0000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 413.799560][T29291] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:57 executing program 1 (fault-call:2 fault-nth:70): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:57 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000340)=0xab79) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000040)=@nl, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)="15d3ad42bb0b52c58e17c7e31700c679c431452f3156d2a5477869af7a6c122ddefacdd710f1614bcc693b7aff9c4bb53e9e3af5cc8770797e02cd674bb39adc7414f536a9ef9d49d54cc09a207ca9f01df49754d962851423727e2b1bb7ef65411c869d2c01f0", 0x67}, {&(0x7f0000000140)="327050d8cbcc390c7513a16da0d798063d7dd29816c7daf52c8587449e137a2a89a52d2f37573845944647f97d60be83f6689289d1a2ef8b2a5815751dc2e8ac9bc3bbc74568618a80e73be9bf2d087fd824f1da44d032d133a2889d0dae28057a4b0ceb17398e0712649621686cb238b5dcc7cd96df8db23ed0f401a14f3045f89a29ab153de4d82fd7d3cccb63509d45c752236ea79b6db4152269e387809d2e7b7178b66b4b5e76874da1827b6cd43d54ed0264f00aeccf3062a456523f19c65f241a9771e2a084742512b3dd1b2e5b729e45c982ff5136f545585022b2291652c69039b26b46fae211c6e1", 0xed}, {&(0x7f0000000240)="6b89f4acbdb95ddd6432b9bd8b96a53a68e02502595f1e9aeea069d78e5b9e2961454ebb17f108c2892a4f5bbcf218a3086343f895ff655e4f2d19d07c66ee0a658f55653f3e80fc380729b21119c4cf", 0x50}], 0x3}, 0x40819) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x8100, 0x0) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f00000003c0)) socket$kcm(0x29, 0x5, 0x0) close(r3) [ 414.068901][T29310] device nr0 entered promiscuous mode [ 414.079178][T29328] FAULT_INJECTION: forcing a failure. [ 414.079178][T29328] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 414.095001][T29328] CPU: 0 PID: 29328 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 414.103700][T29328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.113768][T29328] Call Trace: [ 414.117071][T29328] dump_stack+0x197/0x210 [ 414.121417][T29328] should_fail.cold+0xa/0x15 [ 414.126034][T29328] ? fault_create_debugfs_attr+0x180/0x180 [ 414.131840][T29328] ? ___might_sleep+0x163/0x2c0 [ 414.131864][T29328] should_fail_alloc_page+0x50/0x60 [ 414.131877][T29328] __alloc_pages_nodemask+0x1a1/0x910 [ 414.131894][T29328] ? __alloc_pages_slowpath+0x2920/0x2920 [ 414.131916][T29328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.131929][T29328] ? find_next_bit+0x107/0x130 [ 414.131950][T29328] pcpu_populate_chunk+0xf8/0x940 [ 414.131964][T29328] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 414.131980][T29328] ? find_next_bit+0xc7/0x130 [ 414.147391][T29328] pcpu_alloc+0xd5b/0x1380 [ 414.147427][T29328] ? pcpu_alloc_area+0x820/0x820 [ 414.147448][T29328] ? bpf_map_area_alloc+0x20/0x30 [ 414.194429][T29328] __alloc_percpu_gfp+0x28/0x30 [ 414.199294][T29328] htab_map_alloc+0xdb9/0x11c0 [ 414.204083][T29328] ? htab_map_update_elem+0xca0/0xca0 [ 414.209466][T29328] __do_sys_bpf+0x478/0x3610 [ 414.214077][T29328] ? bpf_prog_load+0x1960/0x1960 [ 414.219023][T29328] ? __kasan_check_write+0x14/0x20 [ 414.224139][T29328] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 414.229815][T29328] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 414.235104][T29328] ? wait_for_completion+0x440/0x440 [ 414.240506][T29328] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 414.246935][T29328] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 414.252392][T29328] ? do_syscall_64+0x26/0x790 [ 414.257067][T29328] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.263216][T29328] ? do_syscall_64+0x26/0x790 [ 414.268041][T29328] __x64_sys_bpf+0x73/0xb0 [ 414.272459][T29328] do_syscall_64+0xfa/0x790 [ 414.276970][T29328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.283002][T29328] RIP: 0033:0x45a909 [ 414.286904][T29328] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.306755][T29328] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 414.315154][T29328] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 414.323125][T29328] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 414.331105][T29328] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 414.339160][T29328] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 414.347123][T29328] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:58:58 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000c200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb91e0a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e0e0000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:58 executing program 1 (fault-call:2 fault-nth:71): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:58:58 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xbf, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000200), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, 0x0, &(0x7f0000001440)=""/193}, 0x20) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)=')posix_acl_access\xd6-\x00') close(r1) 13:58:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e0f0000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 414.811509][T29342] FAULT_INJECTION: forcing a failure. [ 414.811509][T29342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:58:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9250a485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 414.900310][T29342] CPU: 1 PID: 29342 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 414.909156][T29342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.919225][T29342] Call Trace: [ 414.922528][T29342] dump_stack+0x197/0x210 [ 414.926991][T29342] should_fail.cold+0xa/0x15 [ 414.931588][T29342] ? fault_create_debugfs_attr+0x180/0x180 [ 414.931604][T29342] ? ___might_sleep+0x163/0x2c0 [ 414.931626][T29342] should_fail_alloc_page+0x50/0x60 [ 414.931638][T29342] __alloc_pages_nodemask+0x1a1/0x910 [ 414.931655][T29342] ? __alloc_pages_slowpath+0x2920/0x2920 [ 414.931676][T29342] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.931693][T29342] ? find_next_bit+0x107/0x130 [ 414.931712][T29342] pcpu_populate_chunk+0xf8/0x940 [ 414.931724][T29342] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 414.931740][T29342] ? find_next_bit+0xc7/0x130 [ 414.965143][T29342] pcpu_alloc+0xd5b/0x1380 [ 414.965171][T29342] ? pcpu_alloc_area+0x820/0x820 [ 414.965195][T29342] ? bpf_map_area_alloc+0x20/0x30 [ 415.001128][T29342] __alloc_percpu_gfp+0x28/0x30 [ 415.001146][T29342] htab_map_alloc+0xdb9/0x11c0 [ 415.001172][T29342] ? htab_map_update_elem+0xca0/0xca0 [ 415.001193][T29342] __do_sys_bpf+0x478/0x3610 [ 415.001213][T29342] ? bpf_prog_load+0x1960/0x1960 [ 415.001227][T29342] ? __kasan_check_write+0x14/0x20 [ 415.001242][T29342] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 415.001255][T29342] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 415.001271][T29342] ? wait_for_completion+0x440/0x440 [ 415.047166][T29342] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 415.053437][T29342] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.058906][T29342] ? do_syscall_64+0x26/0x790 [ 415.063590][T29342] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.069771][T29342] ? do_syscall_64+0x26/0x790 [ 415.074454][T29342] __x64_sys_bpf+0x73/0xb0 [ 415.078890][T29342] do_syscall_64+0xfa/0x790 [ 415.083411][T29342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.089305][T29342] RIP: 0033:0x45a909 [ 415.093208][T29342] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.112913][T29342] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 415.121326][T29342] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 415.129306][T29342] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 415.137275][T29342] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:58:58 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000e200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:59 executing program 1 (fault-call:2 fault-nth:72): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 415.145246][T29342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 415.153226][T29342] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:58:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e100000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:58:59 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002980)=[{&(0x7f00000016c0)=""/46, 0x2e}, {&(0x7f0000001700)=""/169, 0xa9}, {&(0x7f00000017c0)=""/111, 0x6f}, {0x0}, {&(0x7f0000002840)=""/27, 0x1b}, {&(0x7f0000002880)=""/225, 0xe1}], 0x6, &(0x7f0000002a00)=""/48, 0x30}, 0x2000) bpf$MAP_CREATE(0x0, &(0x7f0000002a80)={0x0, 0x3a, 0x0, 0x9, 0x4, 0xffffffffffffffff, 0x1, [], r2, 0xffffffffffffffff, 0x4}, 0x3c) socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="87", 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x0, 0x3, 0x10, 0x1, 0x0, [], r5, r4}, 0x415) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x5, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3612ee43fe38d9a1, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x8001, 0x0, 0x0, 0x40f00, 0x2, [], r5, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x1, 0x9c6, 0x4}, 0x10, r6}, 0x78) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r6, 0x4) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r9, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x3, 0x9, 0x80000000, 0xdc}, &(0x7f00000044c0)=0x1b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=0x4}}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='\b\x00', 0x1430c2, 0x0) write$cgroup_subtree(r11, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r12, 0x0, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[@ANYBLOB="3cd1c555f4b61a028704038157"], 0x1) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r13, 0x0, 0x0) write$cgroup_subtree(r13, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000f080)={&(0x7f000000de40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000380)=ANY=[@ANYRESOCT=r11], &(0x7f0000001a40)='syzkaller\x00', 0x80, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000001a80), 0x10}, 0x78) r16 = bpf$PROG_LOAD(0x5, &(0x7f00000047c0)={0x1, 0xd, &(0x7f0000004640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xae5, 0x0, 0x0, 0x0, 0x1}, [@func, @map={0x18, 0x1, 0x1, 0x0, r12}, @map={0x18, 0x0, 0x1, 0x0, r13}, @call={0x85, 0x0, 0x0, 0x66}, @jmp={0x5, 0x1, 0x5, 0x2, 0x6, 0x10, 0xfffffffffffffff0}, @exit, @map={0x18, 0x8}]}, &(0x7f0000004700)='GPL\x00', 0xfffffff8, 0x0, 0x0, 0x40f00, 0x2, [], r14, 0x2, r3, 0x8, &(0x7f0000004740)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004780)={0x5, 0xa, 0x6, 0xffffad2c}, 0x10, 0x0, r15}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x0, 0x0, &(0x7f0000001740)='syzkaller\x00', 0xd39, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, r7, 0x8, &(0x7f0000004380)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000043c0)={0x1, 0x3, 0x0, 0xd3de}, 0x10, r10, r16}, 0xffffffffffffff6e) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0xfff, 0x19, &(0x7f0000000240)=""/25, 0x0, 0x1, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xa, 0xe8, 0x200}, 0x10, r10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r10, 0x4) [ 415.404092][T29369] FAULT_INJECTION: forcing a failure. [ 415.404092][T29369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 415.464560][T29369] CPU: 0 PID: 29369 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 415.473317][T29369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.483382][T29369] Call Trace: [ 415.486690][T29369] dump_stack+0x197/0x210 [ 415.491039][T29369] should_fail.cold+0xa/0x15 [ 415.495635][T29369] ? fault_create_debugfs_attr+0x180/0x180 [ 415.501446][T29369] ? ___might_sleep+0x163/0x2c0 [ 415.506315][T29369] should_fail_alloc_page+0x50/0x60 [ 415.511508][T29369] __alloc_pages_nodemask+0x1a1/0x910 [ 415.511527][T29369] ? __alloc_pages_slowpath+0x2920/0x2920 [ 415.511547][T29369] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 415.511564][T29369] ? find_next_bit+0x107/0x130 [ 415.528875][T29369] pcpu_populate_chunk+0xf8/0x940 [ 415.528892][T29369] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 415.528907][T29369] ? find_next_bit+0xc7/0x130 [ 415.528932][T29369] pcpu_alloc+0xd5b/0x1380 [ 415.553573][T29369] ? pcpu_alloc_area+0x820/0x820 [ 415.558521][T29369] ? bpf_map_area_alloc+0x20/0x30 [ 415.563647][T29369] __alloc_percpu_gfp+0x28/0x30 [ 415.568496][T29369] htab_map_alloc+0xdb9/0x11c0 [ 415.575259][T29369] ? htab_map_update_elem+0xca0/0xca0 [ 415.580626][T29369] __do_sys_bpf+0x478/0x3610 [ 415.585207][T29369] ? bpf_prog_load+0x1960/0x1960 [ 415.590141][T29369] ? __kasan_check_write+0x14/0x20 [ 415.595255][T29369] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 415.600806][T29369] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 415.606214][T29369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.612502][T29369] ? debug_smp_processor_id+0x33/0x18a [ 415.618165][T29369] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 415.624335][T29369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.629790][T29369] ? do_syscall_64+0x26/0x790 [ 415.634462][T29369] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.640529][T29369] ? do_syscall_64+0x26/0x790 [ 415.645193][T29369] __x64_sys_bpf+0x73/0xb0 [ 415.649594][T29369] do_syscall_64+0xfa/0x790 [ 415.654086][T29369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.659970][T29369] RIP: 0033:0x45a909 [ 415.663848][T29369] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.683437][T29369] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 415.691845][T29369] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 415.699800][T29369] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 415.707754][T29369] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 415.715706][T29369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 415.723657][T29369] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 415.743412][T29358] device nr0 entered promiscuous mode 13:59:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e480000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:00 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000f200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:00 executing program 1 (fault-call:2 fault-nth:73): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb90425485e431b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:00 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unlink(&(0x7f0000000000)='./file0\x00') r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 13:59:00 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000020200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e4c0000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 416.248362][T29392] FAULT_INJECTION: forcing a failure. [ 416.248362][T29392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 416.287309][T29392] CPU: 1 PID: 29392 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 416.296038][T29392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.296047][T29392] Call Trace: [ 416.296077][T29392] dump_stack+0x197/0x210 [ 416.296098][T29392] should_fail.cold+0xa/0x15 [ 416.296115][T29392] ? fault_create_debugfs_attr+0x180/0x180 [ 416.296131][T29392] ? ___might_sleep+0x163/0x2c0 [ 416.296155][T29392] should_fail_alloc_page+0x50/0x60 [ 416.296168][T29392] __alloc_pages_nodemask+0x1a1/0x910 [ 416.296185][T29392] ? __alloc_pages_slowpath+0x2920/0x2920 [ 416.296206][T29392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.296218][T29392] ? find_next_bit+0x107/0x130 [ 416.296239][T29392] pcpu_populate_chunk+0xf8/0x940 [ 416.296253][T29392] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 416.296266][T29392] ? find_next_bit+0xc7/0x130 [ 416.296288][T29392] pcpu_alloc+0xd5b/0x1380 [ 416.296312][T29392] ? pcpu_alloc_area+0x820/0x820 [ 416.296325][T29392] ? bpf_map_area_alloc+0x20/0x30 [ 416.296347][T29392] __alloc_percpu_gfp+0x28/0x30 [ 416.351879][T29392] htab_map_alloc+0xdb9/0x11c0 [ 416.351910][T29392] ? htab_map_update_elem+0xca0/0xca0 [ 416.351924][T29392] __do_sys_bpf+0x478/0x3610 [ 416.351941][T29392] ? bpf_prog_load+0x1960/0x1960 [ 416.351957][T29392] ? __kasan_check_write+0x14/0x20 [ 416.351970][T29392] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 416.351997][T29392] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 416.361770][T29392] ? wait_for_completion+0x440/0x440 [ 416.361796][T29392] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 416.361824][T29392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 416.361838][T29392] ? do_syscall_64+0x26/0x790 13:59:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e600000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 416.361851][T29392] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.361864][T29392] ? do_syscall_64+0x26/0x790 [ 416.361883][T29392] __x64_sys_bpf+0x73/0xb0 [ 416.361898][T29392] do_syscall_64+0xfa/0x790 [ 416.361915][T29392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.361935][T29392] RIP: 0033:0x45a909 [ 416.372292][T29392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:59:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e680000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:00 executing program 1 (fault-call:2 fault-nth:74): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 416.372301][T29392] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 416.372315][T29392] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 416.372325][T29392] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 416.372332][T29392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 416.372340][T29392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 416.372348][T29392] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:00 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x0) gettid() close(r1) [ 416.624417][T29401] device nr0 entered promiscuous mode [ 416.646417][T29412] FAULT_INJECTION: forcing a failure. [ 416.646417][T29412] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 416.695140][T29412] CPU: 1 PID: 29412 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 416.703867][T29412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.703875][T29412] Call Trace: [ 416.703899][T29412] dump_stack+0x197/0x210 [ 416.703919][T29412] should_fail.cold+0xa/0x15 [ 416.703936][T29412] ? fault_create_debugfs_attr+0x180/0x180 [ 416.703955][T29412] ? ___might_sleep+0x163/0x2c0 [ 416.703980][T29412] should_fail_alloc_page+0x50/0x60 [ 416.703995][T29412] __alloc_pages_nodemask+0x1a1/0x910 [ 416.704014][T29412] ? __alloc_pages_slowpath+0x2920/0x2920 [ 416.704057][T29412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.704074][T29412] ? find_next_bit+0x107/0x130 [ 416.704095][T29412] pcpu_populate_chunk+0xf8/0x940 [ 416.704109][T29412] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 416.704122][T29412] ? find_next_bit+0xc7/0x130 [ 416.704143][T29412] pcpu_alloc+0xd5b/0x1380 [ 416.704166][T29412] ? pcpu_alloc_area+0x820/0x820 [ 416.769457][T29412] ? bpf_map_area_alloc+0x20/0x30 [ 416.769490][T29412] __alloc_percpu_gfp+0x28/0x30 [ 416.799057][T29412] htab_map_alloc+0xdb9/0x11c0 [ 416.803846][T29412] ? htab_map_update_elem+0xca0/0xca0 [ 416.809259][T29412] __do_sys_bpf+0x478/0x3610 [ 416.813861][T29412] ? bpf_prog_load+0x1960/0x1960 [ 416.818806][T29412] ? __kasan_check_write+0x14/0x20 [ 416.823925][T29412] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 416.829486][T29412] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 416.834786][T29412] ? wait_for_completion+0x440/0x440 [ 416.840194][T29412] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 416.846460][T29412] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 416.851934][T29412] ? do_syscall_64+0x26/0x790 [ 416.856624][T29412] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.862698][T29412] ? do_syscall_64+0x26/0x790 [ 416.867390][T29412] __x64_sys_bpf+0x73/0xb0 [ 416.871815][T29412] do_syscall_64+0xfa/0x790 [ 416.876507][T29412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.882401][T29412] RIP: 0033:0x45a909 [ 416.886299][T29412] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 416.905906][T29412] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 416.914326][T29412] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 416.922298][T29412] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 416.930275][T29412] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 416.938251][T29412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 416.946225][T29412] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e091b00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00003f200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e6c0000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x6, 0x18}, 0xc) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000005840)={&(0x7f0000004340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000005700)=[{&(0x7f00000043c0)=""/219, 0xdb}, {&(0x7f00000044c0)=""/20, 0x14}, {&(0x7f0000004500)=""/4096, 0x1000}, {&(0x7f0000005500)=""/219, 0xdb}, {&(0x7f0000005600)=""/37, 0x25}, {&(0x7f0000005640)=""/99, 0x63}, {&(0x7f00000056c0)=""/16, 0x10}], 0x7, &(0x7f0000005780)=""/148, 0x94}, 0x2100) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000005880)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000058c0)={0x6, 0x0, 0x1c, 0x9, 0x0, r1, 0x5, [], r3, r4, 0x5}, 0x3c) socket$kcm(0x29, 0xc, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 13:59:01 executing program 1 (fault-call:2 fault-nth:75): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e740000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 417.392265][T29428] FAULT_INJECTION: forcing a failure. [ 417.392265][T29428] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:59:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000040200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 417.460248][T29428] CPU: 0 PID: 29428 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 417.469095][T29428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.479179][T29428] Call Trace: [ 417.482521][T29428] dump_stack+0x197/0x210 [ 417.486881][T29428] should_fail.cold+0xa/0x15 [ 417.491491][T29428] ? fault_create_debugfs_attr+0x180/0x180 [ 417.497299][T29428] ? ___might_sleep+0x163/0x2c0 [ 417.497324][T29428] should_fail_alloc_page+0x50/0x60 [ 417.497336][T29428] __alloc_pages_nodemask+0x1a1/0x910 [ 417.497353][T29428] ? __alloc_pages_slowpath+0x2920/0x2920 [ 417.518562][T29428] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.524815][T29428] ? find_next_bit+0x107/0x130 [ 417.524842][T29428] pcpu_populate_chunk+0xf8/0x940 [ 417.524858][T29428] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 417.524875][T29428] ? find_next_bit+0xc7/0x130 [ 417.545034][T29428] pcpu_alloc+0xd5b/0x1380 [ 417.549477][T29428] ? pcpu_alloc_area+0x820/0x820 [ 417.554430][T29428] ? bpf_map_area_alloc+0x20/0x30 [ 417.554458][T29428] __alloc_percpu_gfp+0x28/0x30 [ 417.554477][T29428] htab_map_alloc+0xdb9/0x11c0 [ 417.554503][T29428] ? htab_map_update_elem+0xca0/0xca0 [ 417.574491][T29428] __do_sys_bpf+0x478/0x3610 [ 417.574515][T29428] ? bpf_prog_load+0x1960/0x1960 [ 417.574531][T29428] ? __kasan_check_write+0x14/0x20 [ 417.574551][T29428] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 417.594712][T29428] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 417.600045][T29428] ? wait_for_completion+0x440/0x440 [ 417.605369][T29428] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 417.611641][T29428] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 417.617118][T29428] ? do_syscall_64+0x26/0x790 [ 417.621809][T29428] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.627889][T29428] ? do_syscall_64+0x26/0x790 [ 417.632593][T29428] __x64_sys_bpf+0x73/0xb0 [ 417.637639][T29428] do_syscall_64+0xfa/0x790 [ 417.642163][T29428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.648063][T29428] RIP: 0033:0x45a909 13:59:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e7a0000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 417.651970][T29428] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.671589][T29428] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 417.680020][T29428] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 417.688004][T29428] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 417.695987][T29428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 417.703986][T29428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 417.711952][T29428] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:01 executing program 1 (fault-call:2 fault-nth:76): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2ef00000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 417.878086][T29442] device nr0 entered promiscuous mode [ 418.170526][T29470] FAULT_INJECTION: forcing a failure. [ 418.170526][T29470] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 418.199989][T29470] CPU: 0 PID: 29470 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 418.208708][T29470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.218850][T29470] Call Trace: [ 418.222149][T29470] dump_stack+0x197/0x210 [ 418.226488][T29470] should_fail.cold+0xa/0x15 [ 418.231089][T29470] ? fault_create_debugfs_attr+0x180/0x180 [ 418.237018][T29470] ? ___might_sleep+0x163/0x2c0 [ 418.241895][T29470] should_fail_alloc_page+0x50/0x60 [ 418.247117][T29470] __alloc_pages_nodemask+0x1a1/0x910 [ 418.252495][T29470] ? __alloc_pages_slowpath+0x2920/0x2920 [ 418.258281][T29470] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 418.264522][T29470] ? find_next_bit+0x107/0x130 [ 418.269304][T29470] pcpu_populate_chunk+0xf8/0x940 [ 418.274361][T29470] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 418.280082][T29470] ? find_next_bit+0xc7/0x130 [ 418.284772][T29470] pcpu_alloc+0xd5b/0x1380 [ 418.289203][T29470] ? pcpu_alloc_area+0x820/0x820 [ 418.294145][T29470] ? bpf_map_area_alloc+0x20/0x30 [ 418.299302][T29470] __alloc_percpu_gfp+0x28/0x30 [ 418.304166][T29470] htab_map_alloc+0xdb9/0x11c0 [ 418.308960][T29470] ? htab_map_update_elem+0xca0/0xca0 [ 418.314670][T29470] __do_sys_bpf+0x478/0x3610 [ 418.319395][T29470] ? bpf_prog_load+0x1960/0x1960 [ 418.324317][T29470] ? __kasan_check_write+0x14/0x20 [ 418.329501][T29470] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 418.335035][T29470] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 418.340331][T29470] ? wait_for_completion+0x440/0x440 [ 418.345611][T29470] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 418.351853][T29470] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 418.357310][T29470] ? do_syscall_64+0x26/0x790 [ 418.361975][T29470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.368037][T29470] ? do_syscall_64+0x26/0x790 [ 418.372714][T29470] __x64_sys_bpf+0x73/0xb0 [ 418.377124][T29470] do_syscall_64+0xfa/0x790 [ 418.381610][T29470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.387583][T29470] RIP: 0033:0x45a909 [ 418.391461][T29470] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 418.411050][T29470] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 418.419479][T29470] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 418.427460][T29470] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 418.435434][T29470] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 418.443394][T29470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 418.451505][T29470] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000048200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e432500000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:02 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000000)={0xf, 0x70, 0x1, 0x8, 0x64, 0x2, 0x0, 0xe000000000000, 0x18000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, @perf_config_ext={0xff, 0xd7}, 0x3e04762b420adeb, 0x1, 0x1, 0x6, 0x100, 0x1000, 0x6}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r3, 0xffffffffffffffff, r4, 0x8) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x45, 0x5, 0x8, 0x3, 0x0, 0xed4, 0x18821, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x280, 0x0, @perf_config_ext={0xffffffffffffff81, 0x6}, 0x4000, 0x2, 0xffffff00, 0xd61dab2c8897d41f, 0x4, 0x3, 0xff58}, r3, 0xffffffffffffffff, r2, 0x2) close(r2) 13:59:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000300130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:02 executing program 1 (fault-call:2 fault-nth:77): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 418.792168][T29484] FAULT_INJECTION: forcing a failure. [ 418.792168][T29484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:59:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000500130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000001ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00004c200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 418.839010][T29484] CPU: 0 PID: 29484 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 418.847749][T29484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.857815][T29484] Call Trace: [ 418.861118][T29484] dump_stack+0x197/0x210 [ 418.865450][T29484] should_fail.cold+0xa/0x15 [ 418.870051][T29484] ? fault_create_debugfs_attr+0x180/0x180 [ 418.875888][T29484] ? ___might_sleep+0x163/0x2c0 [ 418.880770][T29484] should_fail_alloc_page+0x50/0x60 [ 418.886008][T29484] __alloc_pages_nodemask+0x1a1/0x910 [ 418.886026][T29484] ? __alloc_pages_slowpath+0x2920/0x2920 [ 418.886049][T29484] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 418.903360][T29484] ? find_next_bit+0x107/0x130 [ 418.908143][T29484] pcpu_populate_chunk+0xf8/0x940 [ 418.913188][T29484] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 418.918910][T29484] ? find_next_bit+0xc7/0x130 [ 418.923614][T29484] pcpu_alloc+0xd5b/0x1380 [ 418.928104][T29484] ? pcpu_alloc_area+0x820/0x820 [ 418.933075][T29484] ? bpf_map_area_alloc+0x20/0x30 [ 418.938142][T29484] __alloc_percpu_gfp+0x28/0x30 [ 418.938179][T29484] htab_map_alloc+0xdb9/0x11c0 [ 418.948025][T29484] ? htab_map_update_elem+0xca0/0xca0 [ 418.953408][T29484] __do_sys_bpf+0x478/0x3610 [ 418.958017][T29484] ? bpf_prog_load+0x1960/0x1960 [ 418.962962][T29484] ? __kasan_check_write+0x14/0x20 [ 418.968084][T29484] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 418.973635][T29484] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 418.973654][T29484] ? wait_for_completion+0x440/0x440 13:59:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000600130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 418.973676][T29484] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 418.973701][T29484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 418.995922][T29484] ? do_syscall_64+0x26/0x790 [ 419.000613][T29484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.006691][T29484] ? do_syscall_64+0x26/0x790 [ 419.011400][T29484] __x64_sys_bpf+0x73/0xb0 [ 419.015834][T29484] do_syscall_64+0xfa/0x790 [ 419.020351][T29484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.026268][T29484] RIP: 0033:0x45a909 [ 419.030174][T29484] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.049784][T29484] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 419.058222][T29484] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 419.058232][T29484] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 419.058240][T29484] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 419.058249][T29484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 419.058258][T29484] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e006558200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 419.169704][T29496] device nr0 entered promiscuous mode 13:59:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000700130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2ea10900130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:03 executing program 1 (fault-call:2 fault-nth:78): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000002ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:03 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() close(r1) 13:59:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000060200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e005865200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000003ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000a00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 419.787919][T29529] FAULT_INJECTION: forcing a failure. [ 419.787919][T29529] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 419.832034][T29529] CPU: 1 PID: 29529 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 419.840759][T29529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.850832][T29529] Call Trace: [ 419.850858][T29529] dump_stack+0x197/0x210 [ 419.850881][T29529] should_fail.cold+0xa/0x15 [ 419.850900][T29529] ? fault_create_debugfs_attr+0x180/0x180 [ 419.850916][T29529] ? ___might_sleep+0x163/0x2c0 [ 419.850944][T29529] should_fail_alloc_page+0x50/0x60 [ 419.850958][T29529] __alloc_pages_nodemask+0x1a1/0x910 [ 419.850975][T29529] ? __alloc_pages_slowpath+0x2920/0x2920 [ 419.850994][T29529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 419.851007][T29529] ? find_next_bit+0x107/0x130 [ 419.851026][T29529] pcpu_populate_chunk+0xf8/0x940 [ 419.863196][T29529] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 419.911712][T29529] ? find_next_bit+0xc7/0x130 [ 419.916403][T29529] pcpu_alloc+0xd5b/0x1380 [ 419.920834][T29529] ? pcpu_alloc_area+0x820/0x820 [ 419.925781][T29529] ? bpf_map_area_alloc+0x20/0x30 [ 419.930821][T29529] __alloc_percpu_gfp+0x28/0x30 [ 419.935671][T29529] htab_map_alloc+0xdb9/0x11c0 [ 419.940459][T29529] ? htab_map_update_elem+0xca0/0xca0 [ 419.940476][T29529] __do_sys_bpf+0x478/0x3610 [ 419.940493][T29529] ? bpf_prog_load+0x1960/0x1960 [ 419.940507][T29529] ? __kasan_check_write+0x14/0x20 [ 419.940522][T29529] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 419.940535][T29529] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 419.940551][T29529] ? wait_for_completion+0x440/0x440 [ 419.976680][T29529] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 419.982938][T29529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 419.988403][T29529] ? do_syscall_64+0x26/0x790 [ 419.993084][T29529] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.999154][T29529] ? do_syscall_64+0x26/0x790 [ 420.003848][T29529] __x64_sys_bpf+0x73/0xb0 [ 420.008272][T29529] do_syscall_64+0xfa/0x790 [ 420.012790][T29529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.018702][T29529] RIP: 0033:0x45a909 13:59:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000068200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 420.022595][T29529] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.042193][T29529] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 420.050608][T29529] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 420.050617][T29529] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 420.050624][T29529] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 420.050633][T29529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 13:59:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000c00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 420.050641][T29529] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:04 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="f205bc37988b6cf30c02e2e459cb20d8874b5bc7253b9cd61f272baf167572bb2f3cbe0679d2017761ecd92208b3c9a5f211c794db81849708dacf20261b6af996e04c370689144dde1f2a03b1b85f6dabb4a61c67a24c2c9e927c35cdb8d6aaa63118ba21ec16c3af6c0aad5439083233", 0x71}, {&(0x7f0000000100)="638c5b0a8dbb7e81a52b", 0xa}], 0x2}, 0x24008062) socket$kcm(0x29, 0xd, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 420.264182][T29532] device nr0 entered promiscuous mode 13:59:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:04 executing program 1 (fault-call:2 fault-nth:79): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000e00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000004ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000969200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:04 executing program 3: 13:59:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00006c200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 13:59:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000005ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 420.917195][T29573] FAULT_INJECTION: forcing a failure. [ 420.917195][T29573] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 420.993282][T29573] CPU: 0 PID: 29573 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 421.002015][T29573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.012068][T29573] Call Trace: [ 421.012096][T29573] dump_stack+0x197/0x210 [ 421.012125][T29573] should_fail.cold+0xa/0x15 [ 421.024489][T29573] ? fault_create_debugfs_attr+0x180/0x180 [ 421.030302][T29573] ? ___might_sleep+0x163/0x2c0 [ 421.030331][T29573] should_fail_alloc_page+0x50/0x60 13:59:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000f00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 421.030344][T29573] __alloc_pages_nodemask+0x1a1/0x910 [ 421.030363][T29573] ? __alloc_pages_slowpath+0x2920/0x2920 [ 421.030385][T29573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 421.030400][T29573] ? find_next_bit+0x107/0x130 [ 421.030422][T29573] pcpu_populate_chunk+0xf8/0x940 [ 421.030435][T29573] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 421.030451][T29573] ? find_next_bit+0xc7/0x130 [ 421.078029][T29573] pcpu_alloc+0xd5b/0x1380 [ 421.082505][T29573] ? pcpu_alloc_area+0x820/0x820 [ 421.087485][T29573] ? bpf_map_area_alloc+0x20/0x30 13:59:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e002000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 421.092550][T29573] __alloc_percpu_gfp+0x28/0x30 [ 421.097426][T29573] htab_map_alloc+0xdb9/0x11c0 [ 421.102219][T29573] ? htab_map_update_elem+0xca0/0xca0 [ 421.107689][T29573] __do_sys_bpf+0x478/0x3610 [ 421.112333][T29573] ? bpf_prog_load+0x1960/0x1960 [ 421.117281][T29573] ? __kasan_check_write+0x14/0x20 [ 421.122399][T29573] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 421.127953][T29573] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 421.133253][T29573] ? wait_for_completion+0x440/0x440 [ 421.138551][T29573] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 421.144969][T29573] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 421.150468][T29573] ? do_syscall_64+0x26/0x790 [ 421.155160][T29573] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.161248][T29573] ? do_syscall_64+0x26/0x790 [ 421.165953][T29573] __x64_sys_bpf+0x73/0xb0 [ 421.170391][T29573] do_syscall_64+0xfa/0x790 [ 421.174930][T29573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.180888][T29573] RIP: 0033:0x45a909 13:59:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e003f00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 421.184801][T29573] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 421.204421][T29573] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 421.212874][T29573] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 421.220860][T29573] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 421.228927][T29573] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 421.236997][T29573] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 421.237010][T29573] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 421.435700][T29582] device nr0 entered promiscuous mode 13:59:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:05 executing program 1 (fault-call:2 fault-nth:80): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:05 executing program 3: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffff0103000000000000000000000000002100000300000000", 0x30}], 0x1}, 0x0) 13:59:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e004000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000006ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:05 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000074200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e004800130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:06 executing program 3: socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x800000000002, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'netdevsim0\x00', 0x200}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) socket$kcm(0x2, 0x3, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0xffff0001, &(0x7f0000000600)=[0x0], 0x1}, 0x20) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 421.977924][T29615] FAULT_INJECTION: forcing a failure. [ 421.977924][T29615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 422.029926][T29615] CPU: 1 PID: 29615 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 422.038666][T29615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.049157][T29615] Call Trace: [ 422.052592][T29615] dump_stack+0x197/0x210 [ 422.057144][T29615] should_fail.cold+0xa/0x15 [ 422.061742][T29615] ? fault_create_debugfs_attr+0x180/0x180 [ 422.061757][T29615] ? ___might_sleep+0x163/0x2c0 [ 422.061780][T29615] should_fail_alloc_page+0x50/0x60 [ 422.061797][T29615] __alloc_pages_nodemask+0x1a1/0x910 [ 422.061813][T29615] ? __alloc_pages_slowpath+0x2920/0x2920 [ 422.061834][T29615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 422.061847][T29615] ? find_next_bit+0x107/0x130 [ 422.061866][T29615] pcpu_populate_chunk+0xf8/0x940 [ 422.061879][T29615] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 422.061890][T29615] ? find_next_bit+0xc7/0x130 [ 422.061916][T29615] pcpu_alloc+0xd5b/0x1380 [ 422.120720][T29615] ? pcpu_alloc_area+0x820/0x820 [ 422.125948][T29615] ? bpf_map_area_alloc+0x20/0x30 [ 422.131221][T29615] __alloc_percpu_gfp+0x28/0x30 [ 422.136369][T29615] htab_map_alloc+0xdb9/0x11c0 [ 422.141169][T29615] ? htab_map_update_elem+0xca0/0xca0 [ 422.146806][T29615] __do_sys_bpf+0x478/0x3610 [ 422.151426][T29615] ? bpf_prog_load+0x1960/0x1960 [ 422.156475][T29615] ? __kasan_check_write+0x14/0x20 [ 422.161611][T29615] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 422.167338][T29615] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 422.172653][T29615] ? wait_for_completion+0x440/0x440 [ 422.177969][T29615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 422.184248][T29615] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 422.189808][T29615] ? do_syscall_64+0x26/0x790 [ 422.194520][T29615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.200813][T29615] ? do_syscall_64+0x26/0x790 [ 422.200834][T29615] __x64_sys_bpf+0x73/0xb0 [ 422.200850][T29615] do_syscall_64+0xfa/0x790 [ 422.200869][T29615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.200881][T29615] RIP: 0033:0x45a909 [ 422.200895][T29615] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.200903][T29615] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 422.200921][T29615] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 422.261030][T29615] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 422.261038][T29615] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:59:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00007a200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000007ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e004c00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 422.261045][T29615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 422.261053][T29615] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:06 executing program 1 (fault-call:2 fault-nth:81): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 422.553973][T29632] device nr0 entered promiscuous mode [ 422.572560][T29644] FAULT_INJECTION: forcing a failure. [ 422.572560][T29644] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 422.652775][T29644] CPU: 0 PID: 29644 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 422.662020][T29644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.672093][T29644] Call Trace: [ 422.675403][T29644] dump_stack+0x197/0x210 [ 422.680133][T29644] should_fail.cold+0xa/0x15 [ 422.684981][T29644] ? fault_create_debugfs_attr+0x180/0x180 [ 422.691187][T29644] ? ___might_sleep+0x163/0x2c0 [ 422.696075][T29644] should_fail_alloc_page+0x50/0x60 [ 422.701581][T29644] __alloc_pages_nodemask+0x1a1/0x910 [ 422.706978][T29644] ? __alloc_pages_slowpath+0x2920/0x2920 [ 422.712727][T29644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 422.719243][T29644] ? find_next_bit+0x107/0x130 [ 422.724035][T29644] pcpu_populate_chunk+0xf8/0x940 [ 422.729148][T29644] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 422.735012][T29644] ? find_next_bit+0xc7/0x130 [ 422.739800][T29644] pcpu_alloc+0xd5b/0x1380 [ 422.744266][T29644] ? pcpu_alloc_area+0x820/0x820 [ 422.749310][T29644] ? bpf_map_area_alloc+0x20/0x30 [ 422.754364][T29644] __alloc_percpu_gfp+0x28/0x30 [ 422.759231][T29644] htab_map_alloc+0xdb9/0x11c0 [ 422.764022][T29644] ? htab_map_update_elem+0xca0/0xca0 [ 422.769403][T29644] __do_sys_bpf+0x478/0x3610 [ 422.774007][T29644] ? bpf_prog_load+0x1960/0x1960 [ 422.778958][T29644] ? __kasan_check_write+0x14/0x20 [ 422.784081][T29644] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 422.789636][T29644] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 422.794933][T29644] ? wait_for_completion+0x440/0x440 [ 422.800242][T29644] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 422.806595][T29644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 422.812711][T29644] ? do_syscall_64+0x26/0x790 [ 422.817624][T29644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.824271][T29644] ? do_syscall_64+0x26/0x790 [ 422.829202][T29644] __x64_sys_bpf+0x73/0xb0 [ 422.833854][T29644] do_syscall_64+0xfa/0x790 [ 422.838701][T29644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.844790][T29644] RIP: 0033:0x45a909 [ 422.848773][T29644] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.868887][T29644] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 422.877729][T29644] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 422.885935][T29644] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 422.893906][T29644] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 422.902581][T29644] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 422.911085][T29644] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e655800130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000008ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 13:59:07 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000081200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:07 executing program 1 (fault-call:2 fault-nth:82): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 423.304897][T29655] FAULT_INJECTION: forcing a failure. [ 423.304897][T29655] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:59:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000009ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:07 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000f0200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 423.353725][T29655] CPU: 0 PID: 29655 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 423.362672][T29655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.373037][T29655] Call Trace: [ 423.376361][T29655] dump_stack+0x197/0x210 [ 423.380728][T29655] should_fail.cold+0xa/0x15 [ 423.385501][T29655] ? fault_create_debugfs_attr+0x180/0x180 [ 423.391337][T29655] ? ___might_sleep+0x163/0x2c0 [ 423.396303][T29655] should_fail_alloc_page+0x50/0x60 [ 423.401603][T29655] __alloc_pages_nodemask+0x1a1/0x910 [ 423.407143][T29655] ? __alloc_pages_slowpath+0x2920/0x2920 [ 423.413058][T29655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 423.419401][T29655] ? find_next_bit+0x107/0x130 [ 423.424194][T29655] pcpu_populate_chunk+0xf8/0x940 [ 423.429241][T29655] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 423.435065][T29655] ? find_next_bit+0xc7/0x130 [ 423.439836][T29655] pcpu_alloc+0xd5b/0x1380 [ 423.444375][T29655] ? pcpu_alloc_area+0x820/0x820 [ 423.449553][T29655] ? bpf_map_area_alloc+0x20/0x30 [ 423.454609][T29655] __alloc_percpu_gfp+0x28/0x30 [ 423.459484][T29655] htab_map_alloc+0xdb9/0x11c0 [ 423.459515][T29655] ? htab_map_update_elem+0xca0/0xca0 [ 423.459532][T29655] __do_sys_bpf+0x478/0x3610 [ 423.459550][T29655] ? bpf_prog_load+0x1960/0x1960 [ 423.469806][T29655] ? __kasan_check_write+0x14/0x20 [ 423.469829][T29655] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 423.469846][T29655] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 423.469860][T29655] ? wait_for_completion+0x440/0x440 [ 423.469881][T29655] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 423.469908][T29655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 423.469921][T29655] ? do_syscall_64+0x26/0x790 [ 423.469935][T29655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.469952][T29655] ? do_syscall_64+0x26/0x790 [ 423.528534][T29655] __x64_sys_bpf+0x73/0xb0 [ 423.533010][T29655] do_syscall_64+0xfa/0x790 [ 423.537546][T29655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.543458][T29655] RIP: 0033:0x45a909 [ 423.547483][T29655] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 423.567594][T29655] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 423.576110][T29655] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 423.584286][T29655] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 423.592264][T29655] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:59:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e006000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 423.600328][T29655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 423.608787][T29655] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:07 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000000a0081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:07 executing program 1 (fault-call:2 fault-nth:83): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:07 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) openat$cgroup(r1, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, r1, 0x5, 0xffffffffffffffff, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb9, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fbac141421e9", 0x0, 0x100}, 0x28) [ 423.832866][T29666] device nr0 entered promiscuous mode [ 423.946445][T29691] FAULT_INJECTION: forcing a failure. [ 423.946445][T29691] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 424.003577][T29691] CPU: 1 PID: 29691 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 424.012466][T29691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.022537][T29691] Call Trace: [ 424.025857][T29691] dump_stack+0x197/0x210 [ 424.030208][T29691] should_fail.cold+0xa/0x15 [ 424.034811][T29691] ? fault_create_debugfs_attr+0x180/0x180 [ 424.040625][T29691] ? ___might_sleep+0x163/0x2c0 [ 424.045589][T29691] should_fail_alloc_page+0x50/0x60 [ 424.050880][T29691] __alloc_pages_nodemask+0x1a1/0x910 [ 424.056368][T29691] ? __alloc_pages_slowpath+0x2920/0x2920 [ 424.062100][T29691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.068438][T29691] ? find_next_bit+0x107/0x130 [ 424.073302][T29691] pcpu_populate_chunk+0xf8/0x940 [ 424.078331][T29691] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 424.084209][T29691] ? find_next_bit+0xc7/0x130 [ 424.088911][T29691] pcpu_alloc+0xd5b/0x1380 [ 424.093357][T29691] ? pcpu_alloc_area+0x820/0x820 [ 424.098312][T29691] ? bpf_map_area_alloc+0x20/0x30 [ 424.103529][T29691] __alloc_percpu_gfp+0x28/0x30 [ 424.108392][T29691] htab_map_alloc+0xdb9/0x11c0 [ 424.113175][T29691] ? htab_map_update_elem+0xca0/0xca0 [ 424.118559][T29691] __do_sys_bpf+0x478/0x3610 [ 424.123155][T29691] ? bpf_prog_load+0x1960/0x1960 [ 424.128105][T29691] ? __kasan_check_write+0x14/0x20 [ 424.133225][T29691] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 424.138773][T29691] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 424.144188][T29691] ? wait_for_completion+0x440/0x440 [ 424.149487][T29691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 424.155739][T29691] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 424.161327][T29691] ? do_syscall_64+0x26/0x790 [ 424.166013][T29691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.172079][T29691] ? do_syscall_64+0x26/0x790 [ 424.176768][T29691] __x64_sys_bpf+0x73/0xb0 [ 424.181196][T29691] do_syscall_64+0xfa/0x790 [ 424.185836][T29691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.191727][T29691] RIP: 0033:0x45a909 [ 424.195628][T29691] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.215670][T29691] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 424.224577][T29691] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 424.232566][T29691] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 424.240555][T29691] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 424.248836][T29691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 424.256907][T29691] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e586500130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000000affffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:08 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:08 executing program 1 (fault-call:2 fault-nth:84): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000000f0081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 424.722645][T29701] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000002200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 424.783688][T29707] FAULT_INJECTION: forcing a failure. [ 424.783688][T29707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 424.839405][T29707] CPU: 1 PID: 29707 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 424.848771][T29707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.859034][T29707] Call Trace: [ 424.862358][T29707] dump_stack+0x197/0x210 [ 424.866840][T29707] should_fail.cold+0xa/0x15 [ 424.871463][T29707] ? fault_create_debugfs_attr+0x180/0x180 [ 424.877399][T29707] ? ___might_sleep+0x163/0x2c0 [ 424.882362][T29707] should_fail_alloc_page+0x50/0x60 [ 424.887829][T29707] __alloc_pages_nodemask+0x1a1/0x910 [ 424.893315][T29707] ? __alloc_pages_slowpath+0x2920/0x2920 [ 424.899054][T29707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.905635][T29707] ? find_next_bit+0x107/0x130 [ 424.905657][T29707] pcpu_populate_chunk+0xf8/0x940 [ 424.905671][T29707] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 424.905682][T29707] ? find_next_bit+0xc7/0x130 [ 424.905702][T29707] pcpu_alloc+0xd5b/0x1380 [ 424.905722][T29707] ? pcpu_alloc_area+0x820/0x820 13:59:09 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000000bffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e006800130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 424.905740][T29707] ? bpf_map_area_alloc+0x20/0x30 [ 424.905764][T29707] __alloc_percpu_gfp+0x28/0x30 [ 424.905780][T29707] htab_map_alloc+0xdb9/0x11c0 [ 424.905804][T29707] ? htab_map_update_elem+0xca0/0xca0 [ 424.905823][T29707] __do_sys_bpf+0x478/0x3610 [ 424.941253][T29707] ? bpf_prog_load+0x1960/0x1960 [ 424.941272][T29707] ? __kasan_check_write+0x14/0x20 [ 424.941291][T29707] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 424.951046][T29707] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 424.951063][T29707] ? wait_for_completion+0x440/0x440 [ 424.951086][T29707] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 424.951115][T29707] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 424.951129][T29707] ? do_syscall_64+0x26/0x790 [ 424.951143][T29707] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.951157][T29707] ? do_syscall_64+0x26/0x790 [ 424.951178][T29707] __x64_sys_bpf+0x73/0xb0 [ 424.951194][T29707] do_syscall_64+0xfa/0x790 [ 424.951211][T29707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.951221][T29707] RIP: 0033:0x45a909 13:59:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e006c00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 424.951239][T29707] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.977472][T29707] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 424.977487][T29707] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 424.977495][T29707] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 13:59:09 executing program 1 (fault-call:2 fault-nth:85): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 424.977502][T29707] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 424.977509][T29707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 424.977517][T29707] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 425.201955][T29738] FAULT_INJECTION: forcing a failure. [ 425.201955][T29738] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 425.253307][T29738] CPU: 0 PID: 29738 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 425.262227][T29738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.273216][T29738] Call Trace: [ 425.276536][T29738] dump_stack+0x197/0x210 [ 425.280986][T29738] should_fail.cold+0xa/0x15 [ 425.285930][T29738] ? fault_create_debugfs_attr+0x180/0x180 [ 425.291949][T29738] ? ___might_sleep+0x163/0x2c0 [ 425.296841][T29738] should_fail_alloc_page+0x50/0x60 [ 425.302063][T29738] __alloc_pages_nodemask+0x1a1/0x910 [ 425.308012][T29738] ? __alloc_pages_slowpath+0x2920/0x2920 [ 425.314318][T29738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.320870][T29738] ? find_next_bit+0x107/0x130 [ 425.325953][T29738] pcpu_populate_chunk+0xf8/0x940 [ 425.331251][T29738] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 425.336974][T29738] ? find_next_bit+0xc7/0x130 [ 425.341741][T29738] pcpu_alloc+0xd5b/0x1380 [ 425.346164][T29738] ? pcpu_alloc_area+0x820/0x820 [ 425.351305][T29738] ? bpf_map_area_alloc+0x20/0x30 [ 425.356617][T29738] __alloc_percpu_gfp+0x28/0x30 [ 425.361639][T29738] htab_map_alloc+0xdb9/0x11c0 [ 425.366407][T29738] ? htab_map_update_elem+0xca0/0xca0 [ 425.371783][T29738] __do_sys_bpf+0x478/0x3610 [ 425.376379][T29738] ? bpf_prog_load+0x1960/0x1960 [ 425.381538][T29738] ? __kasan_check_write+0x14/0x20 [ 425.387101][T29738] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 425.392650][T29738] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 425.398156][T29738] ? wait_for_completion+0x440/0x440 [ 425.403470][T29738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 425.409855][T29738] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 425.415436][T29738] ? do_syscall_64+0x26/0x790 [ 425.420310][T29738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.426463][T29738] ? do_syscall_64+0x26/0x790 [ 425.431234][T29738] __x64_sys_bpf+0x73/0xb0 [ 425.435655][T29738] do_syscall_64+0xfa/0x790 [ 425.440170][T29738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.446266][T29738] RIP: 0033:0x45a909 [ 425.450158][T29738] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.469923][T29738] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 425.478568][T29738] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 425.486647][T29738] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 425.494651][T29738] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 425.502864][T29738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 425.510920][T29738] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 425.549599][T29716] device nr0 entered promiscuous mode [ 425.557188][T29729] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e007400130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000000cffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:10 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000003200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:10 executing program 1 (fault-call:2 fault-nth:86): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:10 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 426.118139][T29748] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 426.124858][T29749] FAULT_INJECTION: forcing a failure. [ 426.124858][T29749] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 426.160435][T29749] CPU: 1 PID: 29749 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 426.169387][T29749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.179750][T29749] Call Trace: [ 426.183162][T29749] dump_stack+0x197/0x210 [ 426.187624][T29749] should_fail.cold+0xa/0x15 [ 426.192242][T29749] ? fault_create_debugfs_attr+0x180/0x180 [ 426.198173][T29749] ? ___might_sleep+0x163/0x2c0 [ 426.203058][T29749] should_fail_alloc_page+0x50/0x60 [ 426.208353][T29749] __alloc_pages_nodemask+0x1a1/0x910 [ 426.208371][T29749] ? __alloc_pages_slowpath+0x2920/0x2920 [ 426.208395][T29749] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 426.226231][T29749] ? find_next_bit+0x107/0x130 [ 426.231023][T29749] pcpu_populate_chunk+0xf8/0x940 [ 426.236391][T29749] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 426.242509][T29749] ? find_next_bit+0xc7/0x130 [ 426.247216][T29749] pcpu_alloc+0xd5b/0x1380 [ 426.251691][T29749] ? pcpu_alloc_area+0x820/0x820 [ 426.256908][T29749] ? bpf_map_area_alloc+0x20/0x30 [ 426.256936][T29749] __alloc_percpu_gfp+0x28/0x30 [ 426.266994][T29749] htab_map_alloc+0xdb9/0x11c0 [ 426.271878][T29749] ? htab_map_update_elem+0xca0/0xca0 [ 426.277267][T29749] __do_sys_bpf+0x478/0x3610 [ 426.277289][T29749] ? bpf_prog_load+0x1960/0x1960 [ 426.277304][T29749] ? __kasan_check_write+0x14/0x20 [ 426.277322][T29749] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 426.297828][T29749] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 426.303134][T29749] ? wait_for_completion+0x440/0x440 13:59:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e007a00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:10 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000004200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000000dffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 426.308623][T29749] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.314884][T29749] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 426.314899][T29749] ? do_syscall_64+0x26/0x790 [ 426.314914][T29749] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.314928][T29749] ? do_syscall_64+0x26/0x790 [ 426.314950][T29749] __x64_sys_bpf+0x73/0xb0 [ 426.314967][T29749] do_syscall_64+0xfa/0x790 [ 426.314983][T29749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.314994][T29749] RIP: 0033:0x45a909 13:59:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e008100130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 426.315006][T29749] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.315019][T29749] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 426.384071][T29749] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 426.384081][T29749] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 426.384088][T29749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 426.384097][T29749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 426.384106][T29749] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:10 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:10 executing program 1 (fault-call:2 fault-nth:87): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 426.568038][T29765] device nr0 entered promiscuous mode [ 426.722387][T29784] FAULT_INJECTION: forcing a failure. [ 426.722387][T29784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 426.759531][T29784] CPU: 1 PID: 29784 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 426.768763][T29784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.779199][T29784] Call Trace: [ 426.782538][T29784] dump_stack+0x197/0x210 [ 426.786889][T29784] should_fail.cold+0xa/0x15 [ 426.791493][T29784] ? fault_create_debugfs_attr+0x180/0x180 [ 426.797308][T29784] ? ___might_sleep+0x163/0x2c0 [ 426.802182][T29784] should_fail_alloc_page+0x50/0x60 [ 426.807391][T29784] __alloc_pages_nodemask+0x1a1/0x910 [ 426.812818][T29784] ? __alloc_pages_slowpath+0x2920/0x2920 [ 426.818555][T29784] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 426.824806][T29784] ? find_next_bit+0x107/0x130 [ 426.829584][T29784] pcpu_populate_chunk+0xf8/0x940 [ 426.834618][T29784] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 426.840347][T29784] ? find_next_bit+0xc7/0x130 [ 426.845053][T29784] pcpu_alloc+0xd5b/0x1380 [ 426.849511][T29784] ? pcpu_alloc_area+0x820/0x820 [ 426.854510][T29784] ? bpf_map_area_alloc+0x20/0x30 [ 426.859552][T29784] __alloc_percpu_gfp+0x28/0x30 [ 426.864413][T29784] htab_map_alloc+0xdb9/0x11c0 [ 426.869200][T29784] ? htab_map_update_elem+0xca0/0xca0 [ 426.874585][T29784] __do_sys_bpf+0x478/0x3610 [ 426.879190][T29784] ? bpf_prog_load+0x1960/0x1960 [ 426.884280][T29784] ? __kasan_check_write+0x14/0x20 [ 426.889378][T29784] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 426.895139][T29784] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 426.900416][T29784] ? wait_for_completion+0x440/0x440 [ 426.905809][T29784] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.912043][T29784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 426.917624][T29784] ? do_syscall_64+0x26/0x790 [ 426.922353][T29784] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.928406][T29784] ? do_syscall_64+0x26/0x790 [ 426.933097][T29784] __x64_sys_bpf+0x73/0xb0 [ 426.937501][T29784] do_syscall_64+0xfa/0x790 [ 426.941994][T29784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.947875][T29784] RIP: 0033:0x45a909 [ 426.951772][T29784] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.971379][T29784] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 426.979780][T29784] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 426.987742][T29784] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 426.995883][T29784] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 427.003847][T29784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 427.011823][T29784] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e09a100130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:11 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000005200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:11 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000000effffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:11 executing program 1 (fault-call:2 fault-nth:88): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 427.337635][T29797] FAULT_INJECTION: forcing a failure. [ 427.337635][T29797] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 427.378830][T29797] CPU: 0 PID: 29797 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 427.387562][T29797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.397629][T29797] Call Trace: [ 427.400939][T29797] dump_stack+0x197/0x210 [ 427.405286][T29797] should_fail.cold+0xa/0x15 [ 427.409882][T29797] ? fault_create_debugfs_attr+0x180/0x180 [ 427.409898][T29797] ? ___might_sleep+0x163/0x2c0 [ 427.409924][T29797] should_fail_alloc_page+0x50/0x60 13:59:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e00f000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:11 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 427.420561][T29797] __alloc_pages_nodemask+0x1a1/0x910 [ 427.420580][T29797] ? __alloc_pages_slowpath+0x2920/0x2920 [ 427.420611][T29797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 427.420639][T29797] ? find_next_bit+0x107/0x130 [ 427.420660][T29797] pcpu_populate_chunk+0xf8/0x940 [ 427.436907][T29797] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 427.436922][T29797] ? find_next_bit+0xc7/0x130 [ 427.436943][T29797] pcpu_alloc+0xd5b/0x1380 [ 427.452948][T29797] ? pcpu_alloc_area+0x820/0x820 [ 427.452967][T29797] ? bpf_map_area_alloc+0x20/0x30 [ 427.477857][T29797] __alloc_percpu_gfp+0x28/0x30 [ 427.482722][T29797] htab_map_alloc+0xdb9/0x11c0 [ 427.487524][T29797] ? htab_map_update_elem+0xca0/0xca0 [ 427.492912][T29797] __do_sys_bpf+0x478/0x3610 [ 427.497516][T29797] ? bpf_prog_load+0x1960/0x1960 [ 427.502468][T29797] ? __kasan_check_write+0x14/0x20 [ 427.507589][T29797] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 427.513175][T29797] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 427.518473][T29797] ? wait_for_completion+0x440/0x440 13:59:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000200081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:11 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 427.523785][T29797] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 427.530056][T29797] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 427.535526][T29797] ? do_syscall_64+0x26/0x790 [ 427.540214][T29797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.546316][T29797] ? do_syscall_64+0x26/0x790 [ 427.551010][T29797] __x64_sys_bpf+0x73/0xb0 [ 427.555443][T29797] do_syscall_64+0xfa/0x790 [ 427.559963][T29797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.565852][T29797] RIP: 0033:0x45a909 [ 427.569744][T29797] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.589350][T29797] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 427.589364][T29797] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 427.589373][T29797] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 427.589380][T29797] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:59:11 executing program 1 (fault-call:2 fault-nth:89): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b0000000fffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 427.589388][T29797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 427.589395][T29797] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 427.636195][T29808] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.5'. [ 427.662568][T29811] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 427.753082][T29819] FAULT_INJECTION: forcing a failure. [ 427.753082][T29819] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 427.800135][T29819] CPU: 1 PID: 29819 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 427.808870][T29819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.818930][T29819] Call Trace: [ 427.822231][T29819] dump_stack+0x197/0x210 [ 427.826580][T29819] should_fail.cold+0xa/0x15 [ 427.831186][T29819] ? fault_create_debugfs_attr+0x180/0x180 [ 427.837011][T29819] ? ___might_sleep+0x163/0x2c0 [ 427.841977][T29819] should_fail_alloc_page+0x50/0x60 [ 427.847189][T29819] __alloc_pages_nodemask+0x1a1/0x910 [ 427.852581][T29819] ? __alloc_pages_slowpath+0x2920/0x2920 [ 427.858337][T29819] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 427.864591][T29819] ? find_next_bit+0x107/0x130 [ 427.869374][T29819] pcpu_populate_chunk+0xf8/0x940 [ 427.874407][T29819] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 427.880134][T29819] ? find_next_bit+0xc7/0x130 [ 427.884825][T29819] pcpu_alloc+0xd5b/0x1380 [ 427.889264][T29819] ? pcpu_alloc_area+0x820/0x820 [ 427.894214][T29819] ? bpf_map_area_alloc+0x20/0x30 [ 427.899262][T29819] __alloc_percpu_gfp+0x28/0x30 [ 427.904127][T29819] htab_map_alloc+0xdb9/0x11c0 [ 427.908920][T29819] ? htab_map_update_elem+0xca0/0xca0 [ 427.914303][T29819] __do_sys_bpf+0x478/0x3610 [ 427.918900][T29819] ? bpf_prog_load+0x1960/0x1960 [ 427.923839][T29819] ? __kasan_check_write+0x14/0x20 [ 427.928952][T29819] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 427.934490][T29819] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 427.939773][T29819] ? wait_for_completion+0x440/0x440 [ 427.945081][T29819] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 427.951335][T29819] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 427.956790][T29819] ? do_syscall_64+0x26/0x790 [ 427.961467][T29819] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.967529][T29819] ? do_syscall_64+0x26/0x790 [ 427.972208][T29819] __x64_sys_bpf+0x73/0xb0 [ 427.976702][T29819] do_syscall_64+0xfa/0x790 [ 427.981214][T29819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.987099][T29819] RIP: 0033:0x45a909 [ 427.990990][T29819] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.010690][T29819] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 428.019120][T29819] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 428.027155][T29819] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 428.035128][T29819] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 428.043117][T29819] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 428.051114][T29819] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 428.083081][T29810] device nr0 entered promiscuous mode 13:59:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:12 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000006200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000010ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:12 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000400081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:12 executing program 1 (fault-call:2 fault-nth:90): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000510081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000011ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 428.548645][T29837] FAULT_INJECTION: forcing a failure. [ 428.548645][T29837] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 428.598789][T29837] CPU: 0 PID: 29837 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 428.607522][T29837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.617593][T29837] Call Trace: [ 428.621029][T29837] dump_stack+0x197/0x210 [ 428.625390][T29837] should_fail.cold+0xa/0x15 [ 428.630002][T29837] ? fault_create_debugfs_attr+0x180/0x180 [ 428.635826][T29837] ? ___might_sleep+0x163/0x2c0 [ 428.640709][T29837] should_fail_alloc_page+0x50/0x60 [ 428.645942][T29837] __alloc_pages_nodemask+0x1a1/0x910 [ 428.651345][T29837] ? __alloc_pages_slowpath+0x2920/0x2920 [ 428.657088][T29837] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 428.663397][T29837] ? find_next_bit+0x107/0x130 [ 428.668178][T29837] pcpu_populate_chunk+0xf8/0x940 [ 428.673312][T29837] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 428.673329][T29837] ? find_next_bit+0xc7/0x130 [ 428.673351][T29837] pcpu_alloc+0xd5b/0x1380 [ 428.673373][T29837] ? pcpu_alloc_area+0x820/0x820 [ 428.693103][T29837] ? bpf_map_area_alloc+0x20/0x30 13:59:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e0000006f0081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 428.693130][T29837] __alloc_percpu_gfp+0x28/0x30 [ 428.693147][T29837] htab_map_alloc+0xdb9/0x11c0 [ 428.693172][T29837] ? htab_map_update_elem+0xca0/0xca0 [ 428.693187][T29837] __do_sys_bpf+0x478/0x3610 [ 428.693205][T29837] ? bpf_prog_load+0x1960/0x1960 [ 428.693225][T29837] ? __kasan_check_write+0x14/0x20 [ 428.727992][T29837] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 428.733552][T29837] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 428.738860][T29837] ? wait_for_completion+0x440/0x440 13:59:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000200130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 428.744186][T29837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 428.750465][T29837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 428.755945][T29837] ? do_syscall_64+0x26/0x790 [ 428.760632][T29837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.766713][T29837] ? do_syscall_64+0x26/0x790 [ 428.771412][T29837] __x64_sys_bpf+0x73/0xb0 [ 428.775839][T29837] do_syscall_64+0xfa/0x790 [ 428.780348][T29837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.780359][T29837] RIP: 0033:0x45a909 [ 428.780372][T29837] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.780385][T29837] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 428.809834][T29837] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 428.809843][T29837] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 428.809851][T29837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:59:12 executing program 1 (fault-call:2 fault-nth:91): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 428.809860][T29837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 428.809869][T29837] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000300130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 428.920880][T29836] device nr0 entered promiscuous mode [ 428.936498][T29838] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 428.981972][T29860] FAULT_INJECTION: forcing a failure. [ 428.981972][T29860] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 429.035049][T29860] CPU: 1 PID: 29860 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 429.043784][T29860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.043790][T29860] Call Trace: [ 429.043814][T29860] dump_stack+0x197/0x210 [ 429.043834][T29860] should_fail.cold+0xa/0x15 [ 429.043852][T29860] ? fault_create_debugfs_attr+0x180/0x180 [ 429.043868][T29860] ? ___might_sleep+0x163/0x2c0 [ 429.043889][T29860] should_fail_alloc_page+0x50/0x60 [ 429.043909][T29860] __alloc_pages_nodemask+0x1a1/0x910 [ 429.076880][T29860] ? __alloc_pages_slowpath+0x2920/0x2920 [ 429.076909][T29860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 429.100891][T29860] ? find_next_bit+0x107/0x130 [ 429.100914][T29860] pcpu_populate_chunk+0xf8/0x940 [ 429.100928][T29860] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 429.100939][T29860] ? find_next_bit+0xc7/0x130 [ 429.100959][T29860] pcpu_alloc+0xd5b/0x1380 [ 429.100981][T29860] ? pcpu_alloc_area+0x820/0x820 [ 429.100997][T29860] ? bpf_map_area_alloc+0x20/0x30 [ 429.101021][T29860] __alloc_percpu_gfp+0x28/0x30 [ 429.101039][T29860] htab_map_alloc+0xdb9/0x11c0 [ 429.145340][T29860] ? htab_map_update_elem+0xca0/0xca0 [ 429.150735][T29860] __do_sys_bpf+0x478/0x3610 [ 429.155367][T29860] ? bpf_prog_load+0x1960/0x1960 [ 429.160316][T29860] ? __kasan_check_write+0x14/0x20 [ 429.165439][T29860] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 429.171002][T29860] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 429.176299][T29860] ? wait_for_completion+0x440/0x440 [ 429.181604][T29860] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 429.187868][T29860] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 429.193336][T29860] ? do_syscall_64+0x26/0x790 [ 429.198015][T29860] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.204111][T29860] ? do_syscall_64+0x26/0x790 [ 429.208801][T29860] __x64_sys_bpf+0x73/0xb0 [ 429.213230][T29860] do_syscall_64+0xfa/0x790 [ 429.217741][T29860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.223635][T29860] RIP: 0033:0x45a909 [ 429.227533][T29860] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.247323][T29860] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 429.255758][T29860] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 429.263752][T29860] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 429.271733][T29860] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 429.279708][T29860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 429.287685][T29860] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 13:59:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:13 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000400130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:13 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000007200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000012ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:13 executing program 1 (fault-call:2 fault-nth:92): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 429.620880][T29872] FAULT_INJECTION: forcing a failure. [ 429.620880][T29872] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 429.625404][T29873] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 429.657706][T29872] CPU: 1 PID: 29872 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 13:59:13 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000500130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 429.666440][T29872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.676507][T29872] Call Trace: [ 429.679824][T29872] dump_stack+0x197/0x210 [ 429.684169][T29872] should_fail.cold+0xa/0x15 [ 429.688790][T29872] ? fault_create_debugfs_attr+0x180/0x180 [ 429.694610][T29872] ? ___might_sleep+0x163/0x2c0 [ 429.699488][T29872] should_fail_alloc_page+0x50/0x60 [ 429.704691][T29872] __alloc_pages_nodemask+0x1a1/0x910 [ 429.710071][T29872] ? __alloc_pages_slowpath+0x2920/0x2920 13:59:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000600130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 429.715811][T29872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 429.722068][T29872] ? find_next_bit+0x107/0x130 [ 429.726851][T29872] pcpu_populate_chunk+0xf8/0x940 [ 429.731891][T29872] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 429.737317][T29882] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 429.737622][T29872] ? find_next_bit+0xc7/0x130 [ 429.751579][T29872] pcpu_alloc+0xd5b/0x1380 [ 429.756019][T29872] ? pcpu_alloc_area+0x820/0x820 [ 429.760976][T29872] ? bpf_map_area_alloc+0x20/0x30 13:59:13 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 429.767170][T29872] __alloc_percpu_gfp+0x28/0x30 [ 429.772043][T29872] htab_map_alloc+0xdb9/0x11c0 [ 429.776837][T29872] ? htab_map_update_elem+0xca0/0xca0 [ 429.782226][T29872] __do_sys_bpf+0x478/0x3610 [ 429.786839][T29872] ? bpf_prog_load+0x1960/0x1960 [ 429.791794][T29872] ? __kasan_check_write+0x14/0x20 [ 429.796937][T29872] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 429.802489][T29872] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 429.807789][T29872] ? wait_for_completion+0x440/0x440 [ 429.813097][T29872] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 13:59:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000700130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 429.819364][T29872] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 429.824836][T29872] ? do_syscall_64+0x26/0x790 [ 429.829538][T29872] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.830473][T29886] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 429.835701][T29872] ? do_syscall_64+0x26/0x790 [ 429.835725][T29872] __x64_sys_bpf+0x73/0xb0 [ 429.835740][T29872] do_syscall_64+0xfa/0x790 [ 429.835762][T29872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.864659][T29872] RIP: 0033:0x45a909 13:59:13 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 429.868569][T29872] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.888182][T29872] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 429.896620][T29872] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 429.904611][T29872] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 429.912593][T29872] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 429.920835][T29872] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 429.922857][T29890] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 429.928810][T29872] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 430.143071][T29892] device nr0 entered promiscuous mode 13:59:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000a00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000013ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:14 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000a200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:14 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:14 executing program 1 (fault-call:2 fault-nth:93): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 430.584944][T29912] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000c00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000014ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 430.645956][T29908] FAULT_INJECTION: forcing a failure. [ 430.645956][T29908] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 430.694501][T29908] CPU: 1 PID: 29908 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 430.703362][T29908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.713599][T29908] Call Trace: [ 430.716906][T29908] dump_stack+0x197/0x210 [ 430.721256][T29908] should_fail.cold+0xa/0x15 [ 430.725854][T29908] ? fault_create_debugfs_attr+0x180/0x180 [ 430.731675][T29908] ? ___might_sleep+0x163/0x2c0 [ 430.731702][T29908] should_fail_alloc_page+0x50/0x60 [ 430.731713][T29908] __alloc_pages_nodemask+0x1a1/0x910 [ 430.731730][T29908] ? __alloc_pages_slowpath+0x2920/0x2920 [ 430.731751][T29908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 430.731765][T29908] ? find_next_bit+0x107/0x130 [ 430.731785][T29908] pcpu_populate_chunk+0xf8/0x940 [ 430.731805][T29908] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 430.742123][T29908] ? find_next_bit+0xc7/0x130 [ 430.742145][T29908] pcpu_alloc+0xd5b/0x1380 [ 430.742167][T29908] ? pcpu_alloc_area+0x820/0x820 [ 430.742183][T29908] ? bpf_map_area_alloc+0x20/0x30 [ 430.742204][T29908] __alloc_percpu_gfp+0x28/0x30 [ 430.742220][T29908] htab_map_alloc+0xdb9/0x11c0 [ 430.742246][T29908] ? htab_map_update_elem+0xca0/0xca0 [ 430.742262][T29908] __do_sys_bpf+0x478/0x3610 [ 430.742280][T29908] ? bpf_prog_load+0x1960/0x1960 [ 430.742298][T29908] ? __kasan_check_write+0x14/0x20 [ 430.823705][T29908] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 430.829263][T29908] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 430.834565][T29908] ? wait_for_completion+0x440/0x440 [ 430.839877][T29908] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 430.846143][T29908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 430.851639][T29908] ? do_syscall_64+0x26/0x790 [ 430.856331][T29908] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.862413][T29908] ? do_syscall_64+0x26/0x790 [ 430.867118][T29908] __x64_sys_bpf+0x73/0xb0 [ 430.871557][T29908] do_syscall_64+0xfa/0x790 [ 430.876073][T29908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.881972][T29908] RIP: 0033:0x45a909 13:59:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000e00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:14 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:14 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000c200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 430.881991][T29908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.881999][T29908] RSP: 002b:00007f947a37dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 430.882010][T29908] RAX: ffffffffffffffda RBX: 00007f947a37dc90 RCX: 000000000045a909 [ 430.882018][T29908] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 430.882024][T29908] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:59:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000f00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 430.882032][T29908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a37e6d4 [ 430.882040][T29908] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 430.982687][T29929] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:15 executing program 1 (fault-call:2 fault-nth:94): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:15 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000e200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:15 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000015ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e001000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 431.258095][T29949] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e004800130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:15 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000f200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000016ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 431.321260][T29958] FAULT_INJECTION: forcing a failure. [ 431.321260][T29958] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.389975][T29958] CPU: 1 PID: 29958 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 431.398738][T29958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.408916][T29958] Call Trace: [ 431.412231][T29958] dump_stack+0x197/0x210 [ 431.416585][T29958] should_fail.cold+0xa/0x15 [ 431.421194][T29958] ? fault_create_debugfs_attr+0x180/0x180 [ 431.427020][T29958] ? ___might_sleep+0x163/0x2c0 [ 431.431901][T29958] should_fail_alloc_page+0x50/0x60 [ 431.437111][T29958] __alloc_pages_nodemask+0x1a1/0x910 [ 431.442497][T29958] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 431.442512][T29958] ? __alloc_pages_slowpath+0x2920/0x2920 [ 431.442539][T29958] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 431.442557][T29958] alloc_pages_current+0x107/0x210 [ 431.442571][T29958] ? ___might_sleep+0x163/0x2c0 [ 431.442591][T29958] __vmalloc_node_range+0x4f8/0x810 [ 431.442614][T29958] __vmalloc+0x44/0x50 [ 431.442628][T29958] ? pcpu_mem_zalloc+0x8a/0xf0 [ 431.442644][T29958] pcpu_mem_zalloc+0x8a/0xf0 [ 431.488800][T29958] pcpu_create_chunk+0x12d/0x7f0 [ 431.493754][T29958] pcpu_alloc+0x10f3/0x1380 [ 431.498286][T29958] ? pcpu_alloc_area+0x820/0x820 [ 431.503250][T29958] __alloc_percpu_gfp+0x28/0x30 [ 431.508116][T29958] htab_map_alloc+0xdb9/0x11c0 [ 431.512994][T29958] ? htab_map_update_elem+0xca0/0xca0 [ 431.518384][T29958] __do_sys_bpf+0x478/0x3610 [ 431.522995][T29958] ? bpf_prog_load+0x1960/0x1960 [ 431.527951][T29958] ? __kasan_check_write+0x14/0x20 [ 431.533072][T29958] ? __mutex_unlock_slowpath+0xf0/0x6a0 13:59:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e004c00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:15 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 431.538632][T29958] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 431.543929][T29958] ? wait_for_completion+0x440/0x440 [ 431.549234][T29958] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 431.555542][T29958] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 431.561046][T29958] ? do_syscall_64+0x26/0x790 [ 431.565736][T29958] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.571816][T29958] ? do_syscall_64+0x26/0x790 [ 431.576520][T29958] __x64_sys_bpf+0x73/0xb0 [ 431.580956][T29958] do_syscall_64+0xfa/0x790 13:59:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e006000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 431.585476][T29958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.591378][T29958] RIP: 0033:0x45a909 [ 431.595280][T29958] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.614895][T29958] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 431.623321][T29958] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 431.631302][T29958] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 431.639289][T29958] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 431.647372][T29958] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 431.655337][T29958] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 431.709740][T29971] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x0, 'rdma'}]}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x140) 13:59:16 executing program 1 (fault-call:2 fault-nth:95): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 13:59:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000010200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:16 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e006800130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000017ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e006c00130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 432.015269][T29997] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 13:59:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000048200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:16 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000680081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 432.092465][T30002] FAULT_INJECTION: forcing a failure. [ 432.092465][T30002] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:59:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e007400130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 13:59:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e000000130081c5e4050cecdb4cb9040a485e431b00000018ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 432.203367][T30002] CPU: 1 PID: 30002 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 432.212105][T30002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.222172][T30002] Call Trace: [ 432.225482][T30002] dump_stack+0x197/0x210 [ 432.229919][T30002] should_fail.cold+0xa/0x15 [ 432.234544][T30002] ? fault_create_debugfs_attr+0x180/0x180 [ 432.235431][T30013] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 432.240361][T30002] ? ___might_sleep+0x163/0x2c0 [ 432.240407][T30002] should_fail_alloc_page+0x50/0x60 [ 432.240420][T30002] __alloc_pages_nodemask+0x1a1/0x910 [ 432.240434][T30002] ? find_held_lock+0x35/0x130 [ 432.240448][T30002] ? __alloc_pages_slowpath+0x2920/0x2920 [ 432.240465][T30002] ? lock_downgrade+0x920/0x920 [ 432.240480][T30002] ? rwlock_bug.part.0+0x90/0x90 [ 432.240502][T30002] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 432.254629][T30002] alloc_pages_current+0x107/0x210 [ 432.275612][T30002] __get_free_pages+0xc/0x40 13:59:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x1af, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00004c200081c5e4050cecdb4cb9040a485e431c00000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 432.275631][T30002] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 432.306941][T30002] apply_to_page_range+0x445/0x700 [ 432.312084][T30002] ? memset+0x40/0x40 [ 432.316098][T30002] kasan_populate_vmalloc+0x68/0x90 [ 432.321329][T30002] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 432.326469][T30002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.332758][T30002] pcpu_create_chunk+0x24e/0x7f0 [ 432.337754][T30002] pcpu_alloc+0x10f3/0x1380 [ 432.342296][T30002] ? pcpu_alloc_area+0x820/0x820 [ 432.347253][T30002] ? bpf_map_area_alloc+0x20/0x30 [ 432.352304][T30002] __alloc_percpu_gfp+0x28/0x30 [ 432.357203][T30002] htab_map_alloc+0xdb9/0x11c0 [ 432.361984][T30002] ? htab_map_update_elem+0xca0/0xca0 [ 432.362001][T30002] __do_sys_bpf+0x478/0x3610 [ 432.362018][T30002] ? bpf_prog_load+0x1960/0x1960 [ 432.362032][T30002] ? __kasan_check_write+0x14/0x20 [ 432.362052][T30002] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 432.387733][T30002] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 432.393050][T30002] ? wait_for_completion+0x440/0x440 [ 432.393075][T30002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 432.393100][T30002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 432.410108][T30002] ? do_syscall_64+0x26/0x790 [ 432.414835][T30002] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.420948][T30002] ? do_syscall_64+0x26/0x790 [ 432.425654][T30002] __x64_sys_bpf+0x73/0xb0 [ 432.430123][T30002] do_syscall_64+0xfa/0x790 [ 432.434655][T30002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.440559][T30002] RIP: 0033:0x45a909 [ 432.444487][T30002] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.464211][T30002] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 432.472756][T30002] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 432.480757][T30002] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 432.480765][T30002] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 432.480772][T30002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 432.480779][T30002] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 432.498594][T30002] ================================================================== [ 432.521377][T30002] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 432.528980][T30002] Write of size 24576 at addr ffffe8ffffa00000 by task syz-executor.1/30002 [ 432.537655][T30002] [ 432.540162][T30002] CPU: 1 PID: 30002 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 432.548837][T30002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.558909][T30002] Call Trace: [ 432.558933][T30002] dump_stack+0x197/0x210 [ 432.558951][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.558975][T30002] print_address_description.constprop.0.cold+0x5/0x30b [ 432.578079][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.582675][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.587276][T30002] __kasan_report.cold+0x1b/0x41 [ 432.587296][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.587310][T30002] kasan_report+0x12/0x20 [ 432.587328][T30002] check_memory_region+0x134/0x1a0 [ 432.596833][T30002] memset+0x24/0x40 [ 432.596851][T30002] pcpu_alloc+0x589/0x1380 [ 432.596874][T30002] ? pcpu_alloc_area+0x820/0x820 [ 432.596892][T30002] ? bpf_map_area_alloc+0x20/0x30 [ 432.624530][T30002] __alloc_percpu_gfp+0x28/0x30 [ 432.629398][T30002] htab_map_alloc+0xdb9/0x11c0 [ 432.634195][T30002] ? htab_map_update_elem+0xca0/0xca0 [ 432.639578][T30002] __do_sys_bpf+0x478/0x3610 [ 432.644183][T30002] ? bpf_prog_load+0x1960/0x1960 [ 432.649127][T30002] ? __kasan_check_write+0x14/0x20 [ 432.654251][T30002] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 432.659806][T30002] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 432.665098][T30002] ? wait_for_completion+0x440/0x440 [ 432.670399][T30002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 432.676658][T30002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 432.682388][T30002] ? do_syscall_64+0x26/0x790 [ 432.687072][T30002] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.693170][T30002] ? do_syscall_64+0x26/0x790 [ 432.697855][T30002] __x64_sys_bpf+0x73/0xb0 [ 432.702278][T30002] do_syscall_64+0xfa/0x790 [ 432.706782][T30002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.712780][T30002] RIP: 0033:0x45a909 [ 432.716657][T30002] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.736468][T30002] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 432.744880][T30002] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 432.752920][T30002] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 432.761006][T30002] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 432.768974][T30002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 432.777057][T30002] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 432.785024][T30002] [ 432.787334][T30002] [ 432.789643][T30002] Memory state around the buggy address: [ 432.795468][T30002] BUG: unable to handle page fault for address: fffff91ffff3ffe0 [ 432.803203][T30002] #PF: supervisor read access in kernel mode [ 432.809193][T30002] #PF: error_code(0x0000) - not-present page [ 432.815151][T30002] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 432.822641][T30002] Oops: 0000 [#1] PREEMPT SMP KASAN [ 432.827847][T30002] CPU: 1 PID: 30002 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 432.836498][T30002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.846567][T30002] RIP: 0010:memcpy_erms+0x6/0x10 [ 432.851505][T30002] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 432.871104][T30002] RSP: 0018:ffffc900028a7990 EFLAGS: 00010082 [ 432.877167][T30002] RAX: ffffc900028a799c RBX: fffff91ffff3ffe0 RCX: 0000000000000010 [ 432.885146][T30002] RDX: 0000000000000010 RSI: fffff91ffff3ffe0 RDI: ffffc900028a799c [ 432.893115][T30002] RBP: ffffc900028a79f0 R08: ffff888067772200 R09: fffff52000514f38 [ 432.901175][T30002] R10: fffff52000514f37 R11: ffffc900028a79be R12: fffff91ffff40000 [ 432.909149][T30002] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 432.917107][T30002] FS: 00007f947a35d700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 432.926031][T30002] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 432.932598][T30002] CR2: fffff91ffff3ffe0 CR3: 0000000095ee4000 CR4: 00000000001406e0 [ 432.940558][T30002] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 432.948523][T30002] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 432.956473][T30002] Call Trace: [ 432.959751][T30002] ? print_shadow_for_address+0x91/0x117 [ 432.965365][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.969952][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.974551][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.979121][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.983694][T30002] __kasan_report.cold+0x30/0x41 [ 432.988628][T30002] ? pcpu_alloc+0x589/0x1380 [ 432.993199][T30002] kasan_report+0x12/0x20 [ 432.997509][T30002] check_memory_region+0x134/0x1a0 [ 433.002618][T30002] memset+0x24/0x40 [ 433.006428][T30002] pcpu_alloc+0x589/0x1380 [ 433.010823][T30002] ? pcpu_alloc_area+0x820/0x820 [ 433.015740][T30002] ? bpf_map_area_alloc+0x20/0x30 [ 433.020759][T30002] __alloc_percpu_gfp+0x28/0x30 [ 433.025597][T30002] htab_map_alloc+0xdb9/0x11c0 [ 433.030342][T30002] ? htab_map_update_elem+0xca0/0xca0 [ 433.035692][T30002] __do_sys_bpf+0x478/0x3610 [ 433.040382][T30002] ? bpf_prog_load+0x1960/0x1960 [ 433.045398][T30002] ? __kasan_check_write+0x14/0x20 [ 433.050498][T30002] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 433.056045][T30002] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 433.061329][T30002] ? wait_for_completion+0x440/0x440 [ 433.066608][T30002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 433.072834][T30002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 433.078280][T30002] ? do_syscall_64+0x26/0x790 [ 433.082953][T30002] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.089007][T30002] ? do_syscall_64+0x26/0x790 [ 433.093683][T30002] __x64_sys_bpf+0x73/0xb0 [ 433.098081][T30002] do_syscall_64+0xfa/0x790 [ 433.102574][T30002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.108468][T30002] RIP: 0033:0x45a909 [ 433.112340][T30002] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.132014][T30002] RSP: 002b:00007f947a35cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 433.140423][T30002] RAX: ffffffffffffffda RBX: 00007f947a35cc90 RCX: 000000000045a909 [ 433.148395][T30002] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 433.156346][T30002] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 433.164299][T30002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f947a35d6d4 [ 433.172356][T30002] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 433.180327][T30002] Modules linked in: [ 433.184239][T30002] CR2: fffff91ffff3ffe0 [ 433.188382][T30002] ---[ end trace c696887bd6e1ca5c ]--- [ 433.193926][T30002] RIP: 0010:memcpy_erms+0x6/0x10 [ 433.198871][T30002] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 433.218500][T30002] RSP: 0018:ffffc900028a7990 EFLAGS: 00010082 [ 433.224553][T30002] RAX: ffffc900028a799c RBX: fffff91ffff3ffe0 RCX: 0000000000000010 [ 433.232525][T30002] RDX: 0000000000000010 RSI: fffff91ffff3ffe0 RDI: ffffc900028a799c [ 433.240490][T30002] RBP: ffffc900028a79f0 R08: ffff888067772200 R09: fffff52000514f38 [ 433.248452][T30002] R10: fffff52000514f37 R11: ffffc900028a79be R12: fffff91ffff40000 [ 433.256493][T30002] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 433.264477][T30002] FS: 00007f947a35d700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 433.273454][T30002] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 433.280181][T30002] CR2: fffff91ffff3ffe0 CR3: 0000000095ee4000 CR4: 00000000001406e0 [ 433.288276][T30002] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 433.296309][T30002] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 433.304273][T30002] Kernel panic - not syncing: Fatal exception [ 433.312165][T30002] Kernel Offset: disabled [ 433.316500][T30002] Rebooting in 86400 seconds..