isra.0+0xba/0x170 [ 2428.987532][ T1684] inet_sendmsg+0x9e/0xe0 [ 2428.987550][ T1684] ? inet_sendmsg+0x9e/0xe0 [ 2428.987572][ T1684] ? inet_send_prepare+0x4e0/0x4e0 [ 2429.018492][ T1684] sock_sendmsg+0xd7/0x130 [ 2429.018511][ T1684] ____sys_sendmsg+0x753/0x880 [ 2429.018531][ T1684] ? kernel_sendmsg+0x50/0x50 [ 2429.018550][ T1684] ? __fget+0x35d/0x550 [ 2429.041972][ T1684] ? find_held_lock+0x35/0x130 [ 2429.042003][ T1684] ___sys_sendmsg+0x100/0x170 [ 2429.042023][ T1684] ? sendmsg_copy_msghdr+0x70/0x70 [ 2429.042039][ T1684] ? __kasan_check_read+0x11/0x20 [ 2429.042057][ T1684] ? __fget+0x37f/0x550 [ 2429.042078][ T1684] ? ksys_dup3+0x3e0/0x3e0 [ 2429.042104][ T1684] ? __fdget+0x1b/0x20 [ 2429.060777][ T1684] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2429.060801][ T1684] __sys_sendmsg+0x105/0x1d0 [ 2429.060818][ T1684] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2429.060847][ T1684] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2429.060862][ T1684] ? do_syscall_64+0x26/0x790 [ 2429.060884][ T1684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.078616][ T1684] ? do_syscall_64+0x26/0x790 [ 2429.078640][ T1684] __x64_sys_sendmsg+0x78/0xb0 [ 2429.078658][ T1684] do_syscall_64+0xfa/0x790 [ 2429.078681][ T1684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.078699][ T1684] RIP: 0033:0x45a919 [ 2429.110704][ T1684] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2429.110714][ T1684] RSP: 002b:00007ff8fed08c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2429.110728][ T1684] RAX: ffffffffffffffda RBX: 00007ff8fed08c90 RCX: 000000000045a919 18:04:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e80000410200000001", 0x29}], 0x1}, 0x0) 18:04:15 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754", 0x15}], 0x1}, 0x0) 18:04:15 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00ab86dd07"], 0x90ad) [ 2429.110736][ T1684] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2429.110744][ T1684] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2429.110753][ T1684] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fed096d4 [ 2429.110762][ T1684] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e80000410200000001", 0x29}], 0x1}, 0x0) 18:04:15 executing program 4: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:15 executing program 0 (fault-call:5 fault-nth:3): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r0, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r3 = socket$kcm(0x2, 0x1, 0x84) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r4, 0xb) setsockopt$sock_attach_bpf(r3, 0x10d, 0xb, &(0x7f0000000000)=r4, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r4, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r6 = socket$kcm(0x2, 0x1, 0x84) close(r6) r7 = socket$kcm(0xa, 0x6, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r7, 0x10d, 0xb, &(0x7f0000000000)=r8, 0xb) setsockopt$sock_attach_bpf(r6, 0x10d, 0xb, &(0x7f0000000000)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa45}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, @generic={0x3, 0x1, 0x2, 0x3, 0x7fffffff}, @alu={0x0, 0x1, 0x0, 0x3, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r1, 0x19, r2, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r5, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6f97, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x0, 0x1362923bea897feb, 0x8, 0x3, 0x2, 0x10}, @alu={0x7, 0x0, 0x6, 0x5, 0xa, 0xfffffffffffffff8, 0xb}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xf5, &(0x7f00000002c0)=""/245, 0x40f00, 0x5, [], r1, 0x6edf7f713a5c18ab, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x2}, 0x10}, 0x78) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="0100008007ec70903a633f98c2fd3102f3735595dca24e66190cfaa06f7c46048ef40bfb9b08a98a4d62605f13cf0c293dc6963ca11e2fdb6cdd905137df3589a3245d"], 0x90ad) 18:04:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754", 0x15}], 0x1}, 0x0) 18:04:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e80000410200000001", 0x29}], 0x1}, 0x0) [ 2429.567458][ T1718] FAULT_INJECTION: forcing a failure. [ 2429.567458][ T1718] name failslab, interval 1, probability 0, space 0, times 0 18:04:16 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0104ffffba"], 0x90ad) [ 2429.636320][ T1718] CPU: 1 PID: 1718 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 2429.644958][ T1718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2429.655114][ T1718] Call Trace: [ 2429.658435][ T1718] dump_stack+0x197/0x210 [ 2429.662800][ T1718] should_fail.cold+0xa/0x15 [ 2429.667419][ T1718] ? fault_create_debugfs_attr+0x180/0x180 [ 2429.673290][ T1718] ? find_held_lock+0x35/0x130 [ 2429.678080][ T1718] ? __nf_conntrack_find_get+0xa6b/0x13a0 [ 2429.683826][ T1718] __should_failslab+0x121/0x190 [ 2429.688791][ T1718] should_failslab+0x9/0x14 [ 2429.693313][ T1718] kmem_cache_alloc+0x47/0x710 [ 2429.698095][ T1718] ? __nf_conntrack_find_get+0xb2b/0x13a0 [ 2429.703839][ T1718] ? __kasan_check_read+0x11/0x20 [ 2429.708889][ T1718] __nf_conntrack_alloc+0xdb/0x6c0 [ 2429.714029][ T1718] init_conntrack.isra.0+0xe3c/0x11a0 [ 2429.719439][ T1718] ? nf_conntrack_alloc+0x50/0x50 [ 2429.724514][ T1718] ? ip6t_do_table+0xdd5/0x1cc0 [ 2429.729402][ T1718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2429.735887][ T1718] nf_conntrack_in+0xd94/0x1460 [ 2429.740781][ T1718] ? nf_conntrack_update+0x960/0x960 [ 2429.746087][ T1718] ? ip6t_error+0x40/0x40 [ 2429.750456][ T1718] ipv6_conntrack_local+0x1e/0x30 [ 2429.755513][ T1718] nf_hook_slow+0xbc/0x1e0 [ 2429.759961][ T1718] rawv6_sendmsg+0x2914/0x3900 [ 2429.764747][ T1718] ? mark_lock+0xc2/0x1220 [ 2429.769732][ T1718] ? rawv6_bind+0x9a0/0x9a0 [ 2429.774248][ T1718] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2429.780170][ T1718] ? rawv6_rcv_skb+0x390/0x390 [ 2429.784951][ T1718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2429.791192][ T1718] ? aa_label_sk_perm+0x91/0xf0 [ 2429.791217][ T1718] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2429.791230][ T1718] ? aa_sk_perm+0x346/0xaf0 [ 2429.791247][ T1718] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2429.791265][ T1718] ? aa_af_perm+0x2a0/0x2a0 [ 2429.791291][ T1718] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2429.791317][ T1718] inet_sendmsg+0x9e/0xe0 [ 2429.791331][ T1718] ? inet_sendmsg+0x9e/0xe0 [ 2429.791346][ T1718] ? inet_send_prepare+0x4e0/0x4e0 [ 2429.791361][ T1718] sock_sendmsg+0xd7/0x130 [ 2429.791376][ T1718] ____sys_sendmsg+0x753/0x880 [ 2429.791394][ T1718] ? kernel_sendmsg+0x50/0x50 [ 2429.841150][ T1718] ? __fget+0x35d/0x550 [ 2429.841167][ T1718] ? find_held_lock+0x35/0x130 [ 2429.841194][ T1718] ___sys_sendmsg+0x100/0x170 [ 2429.841214][ T1718] ? sendmsg_copy_msghdr+0x70/0x70 [ 2429.841231][ T1718] ? __kasan_check_read+0x11/0x20 [ 2429.841249][ T1718] ? __fget+0x37f/0x550 [ 2429.841269][ T1718] ? ksys_dup3+0x3e0/0x3e0 [ 2429.841300][ T1718] ? __fdget+0x1b/0x20 [ 2429.854901][ T1718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2429.874883][ T1718] __sys_sendmsg+0x105/0x1d0 [ 2429.874902][ T1718] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2429.874933][ T1718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2429.898374][ T1718] ? do_syscall_64+0x26/0x790 [ 2429.898396][ T1718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.898410][ T1718] ? do_syscall_64+0x26/0x790 [ 2429.898431][ T1718] __x64_sys_sendmsg+0x78/0xb0 [ 2429.929079][ T1718] do_syscall_64+0xfa/0x790 [ 2429.933706][ T1718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.939611][ T1718] RIP: 0033:0x45a919 [ 2429.939629][ T1718] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2429.939637][ T1718] RSP: 002b:00007ff8fed08c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2429.939652][ T1718] RAX: ffffffffffffffda RBX: 00007ff8fed08c90 RCX: 000000000045a919 [ 2429.939669][ T1718] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 18:04:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27", 0x20}], 0x1}, 0x0) 18:04:16 executing program 1: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 18:04:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27", 0x20}], 0x1}, 0x0) 18:04:16 executing program 4: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 2429.987612][ T1718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2429.995605][ T1718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fed096d4 [ 2430.004208][ T1718] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:16 executing program 4: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:04:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27", 0x20}], 0x1}, 0x0) 18:04:16 executing program 0 (fault-call:5 fault-nth:4): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:16 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x80000000, 0x8}, 0xc) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'n\xf7\xff\xff\xff\xff\xff\xff\xff\x00\x00\x94\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x28, &(0x7f0000000180)}, 0x10) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[], 0x0) [ 2430.411116][ T1750] FAULT_INJECTION: forcing a failure. [ 2430.411116][ T1750] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.442877][ T1750] CPU: 1 PID: 1750 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 2430.451517][ T1750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2430.461673][ T1750] Call Trace: [ 2430.464994][ T1750] dump_stack+0x197/0x210 [ 2430.469346][ T1750] should_fail.cold+0xa/0x15 [ 2430.473961][ T1750] ? fault_create_debugfs_attr+0x180/0x180 [ 2430.479794][ T1750] ? nf_ct_ext_add+0x26b/0x630 [ 2430.484588][ T1750] __should_failslab+0x121/0x190 [ 2430.489725][ T1750] should_failslab+0x9/0x14 [ 2430.494256][ T1750] __kmalloc_track_caller+0x6d/0x760 [ 2430.499821][ T1750] ? lock_downgrade+0x920/0x920 [ 2430.504780][ T1750] ? rcu_read_lock_held+0x9c/0xb0 [ 2430.509826][ T1750] ? nf_ct_ext_add+0x2c7/0x630 [ 2430.514617][ T1750] krealloc+0x66/0xd0 [ 2430.518635][ T1750] nf_ct_ext_add+0x2c7/0x630 [ 2430.523251][ T1750] init_conntrack.isra.0+0x439/0x11a0 [ 2430.528655][ T1750] ? nf_conntrack_alloc+0x50/0x50 [ 2430.533705][ T1750] ? ip6t_do_table+0xdd5/0x1cc0 [ 2430.538581][ T1750] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2430.544848][ T1750] nf_conntrack_in+0xd94/0x1460 [ 2430.549730][ T1750] ? nf_conntrack_update+0x960/0x960 [ 2430.555038][ T1750] ? ip6t_error+0x40/0x40 [ 2430.559404][ T1750] ipv6_conntrack_local+0x1e/0x30 [ 2430.564557][ T1750] nf_hook_slow+0xbc/0x1e0 [ 2430.569015][ T1750] rawv6_sendmsg+0x2914/0x3900 [ 2430.573805][ T1750] ? mark_lock+0xc2/0x1220 [ 2430.578250][ T1750] ? rawv6_bind+0x9a0/0x9a0 [ 2430.582764][ T1750] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2430.588686][ T1750] ? rawv6_rcv_skb+0x390/0x390 [ 2430.593472][ T1750] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2430.599824][ T1750] ? aa_label_sk_perm+0x91/0xf0 [ 2430.604695][ T1750] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2430.610344][ T1750] ? aa_sk_perm+0x346/0xaf0 [ 2430.614874][ T1750] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2430.621312][ T1750] ? aa_af_perm+0x2a0/0x2a0 [ 2430.625858][ T1750] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2430.631427][ T1750] inet_sendmsg+0x9e/0xe0 [ 2430.635773][ T1750] ? inet_sendmsg+0x9e/0xe0 [ 2430.640288][ T1750] ? inet_send_prepare+0x4e0/0x4e0 [ 2430.640302][ T1750] sock_sendmsg+0xd7/0x130 [ 2430.640318][ T1750] ____sys_sendmsg+0x753/0x880 [ 2430.640335][ T1750] ? kernel_sendmsg+0x50/0x50 [ 2430.640349][ T1750] ? __fget+0x35d/0x550 [ 2430.640362][ T1750] ? find_held_lock+0x35/0x130 [ 2430.640386][ T1750] ___sys_sendmsg+0x100/0x170 [ 2430.672908][ T1750] ? sendmsg_copy_msghdr+0x70/0x70 [ 2430.672927][ T1750] ? __kasan_check_read+0x11/0x20 [ 2430.672948][ T1750] ? __fget+0x37f/0x550 [ 2430.672969][ T1750] ? ksys_dup3+0x3e0/0x3e0 [ 2430.692219][ T1750] ? __fdget+0x1b/0x20 [ 2430.696315][ T1750] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2430.702841][ T1750] __sys_sendmsg+0x105/0x1d0 [ 2430.707453][ T1750] ? __sys_sendmsg_sock+0xc0/0xc0 18:04:17 executing program 3: r0 = getpid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x9, 0xf5, 0x3, 0x5, 0x0, 0x7341, 0x10800, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x0, 0x0, 0x2, 0x0, 0x3ff}, r0, 0xa, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:17 executing program 1: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) 18:04:17 executing program 1: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) [ 2430.712518][ T1750] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2430.718002][ T1750] ? do_syscall_64+0x26/0x790 [ 2430.722710][ T1750] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2430.728805][ T1750] ? do_syscall_64+0x26/0x790 [ 2430.733521][ T1750] __x64_sys_sendmsg+0x78/0xb0 [ 2430.738328][ T1750] do_syscall_64+0xfa/0x790 [ 2430.742867][ T1750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2430.748777][ T1750] RIP: 0033:0x45a919 [ 2430.752773][ T1750] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2430.772378][ T1750] RSP: 002b:00007ff8fed08c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2430.772393][ T1750] RAX: ffffffffffffffda RBX: 00007ff8fed08c90 RCX: 000000000045a919 [ 2430.772402][ T1750] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2430.772410][ T1750] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2430.772418][ T1750] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fed096d4 [ 2430.772426][ T1750] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:17 executing program 4: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:04:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e800004102", 0x25}], 0x1}, 0x0) 18:04:17 executing program 0 (fault-call:5 fault-nth:5): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:17 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000440)="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", &(0x7f00000001c0)="64e26c6f425f3684e9231f471bdc6005668a054c51c02fee7ceb56f336130b8cf636012f6cf9facd90e35961b249503f600aef3cfaabaeba7728ceb02fe3aa846da7eb7a66f2d17cfcbf7de6b6f7dd38c0fb16e444b9bc12d7e99e6a38791b4268f9f01893703ac6f830e3eb37012e459989dad8108bbd97f68b60765fb937c56bb997d61a75816ba73f0e6775971cf5d01e72433adc3b588f8071daf54dca77f25a2dec35b191f73d14e7ccdd30879579b06e8be62be9", 0x2}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x7, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000001580)={0x3, 0xb, 0x6, 0x7fffffff}, &(0x7f00000015c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x2}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0xe, 0x9, &(0x7f0000000300)=@raw=[@map={0x18, 0x6, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x7, 0x3, 0x7, 0x1}, @exit, @alu={0x7, 0x0, 0x2, 0x4, 0x9, 0x100, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x3, 0x50f2ab9ada28006c, 0x642d2dfe90b0d91f, 0xffffffffffffffff, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x5, 0x9, 0x9, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x4, 0x92, &(0x7f0000001440)=""/146, 0x41000, 0x8, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x1, 0x0, 0x10001}, 0x10, r3, r4}, 0x78) 18:04:17 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xa9, 0x5, 0x1, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r1, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x0, 0x4, 0x0, r1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r3}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r3, 0x5e0, 0x4}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r4, &(0x7f00000000c0)="69b175c6d38c03becf9c5a34fbc702a261683a8080057a62dd5195a773511ea0bbed8216b371580ea153dc21651785ea7389c700fae094cab9b8de37976326b4aa13f9964c9437476c80d6b096a8bdbb68bc9b33c26cfb66837f6992983e38dbc81b057801c207eef2ad8f73694b2fd89e01", &(0x7f0000000240)="57627043ae3b3be8840648b0333359", 0x6}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth1\x00', 0x20}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000486dd07577984703cf5376e35ea3e4da76f6901d24546aeb69496a2577d2b5dae589b728a9987bb9a62925fb7b512996fa4e0230580bfe3d75057005a1084923030155da920e6088530eeba3455eccd6bb6e8e8f09ab9eed2f40a495729"], 0x90ad) [ 2431.155866][ T1772] FAULT_INJECTION: forcing a failure. [ 2431.155866][ T1772] name failslab, interval 1, probability 0, space 0, times 0 [ 2431.169014][ T1772] CPU: 1 PID: 1772 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 2431.178050][ T1772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2431.188125][ T1772] Call Trace: [ 2431.191442][ T1772] dump_stack+0x197/0x210 [ 2431.195811][ T1772] should_fail.cold+0xa/0x15 [ 2431.200427][ T1772] ? fault_create_debugfs_attr+0x180/0x180 [ 2431.206356][ T1772] __should_failslab+0x121/0x190 [ 2431.211324][ T1772] should_failslab+0x9/0x14 [ 2431.215860][ T1772] kmem_cache_alloc_node+0x56/0x740 [ 2431.221097][ T1772] __alloc_skb+0xd5/0x5e0 [ 2431.225590][ T1772] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2431.231159][ T1772] ? ipv6_get_ifaddr+0x3ce/0x560 [ 2431.236203][ T1772] ? find_held_lock+0x35/0x130 [ 2431.241585][ T1772] alloc_skb_with_frags+0x93/0x590 [ 2431.246724][ T1772] ? lock_downgrade+0x920/0x920 [ 2431.251607][ T1772] sock_alloc_send_pskb+0x7ad/0x920 [ 2431.256841][ T1772] ? sock_wmalloc+0x120/0x120 [ 2431.261630][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.267894][ T1772] ? xfrm_lookup_with_ifid+0x602/0x2390 [ 2431.273464][ T1772] ? ip6_mtu+0x2e6/0x450 [ 2431.277733][ T1772] ? find_held_lock+0x35/0x130 [ 2431.282533][ T1772] sock_alloc_send_skb+0x32/0x40 [ 2431.287507][ T1772] __ip6_append_data.isra.0+0x1e94/0x3b60 [ 2431.293261][ T1772] ? rawv6_exit+0x20/0x20 [ 2431.297635][ T1772] ? ip6_flush_pending_frames+0xd0/0xd0 18:04:17 executing program 1 (fault-call:6 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e800004102", 0x25}], 0x1}, 0x0) [ 2431.303216][ T1772] ? ip6_fraglist_init+0x8a0/0x8a0 [ 2431.308359][ T1772] ip6_append_data+0x1ec/0x330 [ 2431.313142][ T1772] ? rawv6_exit+0x20/0x20 [ 2431.317488][ T1772] ? rawv6_exit+0x20/0x20 [ 2431.321837][ T1772] icmp6_send+0x1505/0x1f90 [ 2431.326372][ T1772] ? icmpv6_push_pending_frames+0x540/0x540 [ 2431.332632][ T1772] ? __lock_acquire+0x821/0x4a00 [ 2431.337600][ T1772] ? ip6_route_dev_notify+0x1a0/0x7c0 [ 2431.343535][ T1772] ? icmpv6_push_pending_frames+0x540/0x540 [ 2431.349462][ T1772] ? rcu_read_lock_held+0x9c/0xb0 [ 2431.354607][ T1772] ? rcu_read_lock_held_common+0x130/0x130 [ 2431.360449][ T1772] ? icmpv6_push_pending_frames+0x540/0x540 [ 2431.366371][ T1772] icmpv6_send+0xec/0x220 [ 2431.370817][ T1772] ? icmpv6_send+0xec/0x220 [ 2431.375456][ T1772] ip6_link_failure+0x2b/0x530 [ 2431.380242][ T1772] ? inet6_rtm_getroute+0x1460/0x1460 [ 2431.385628][ T1772] ip6_tnl_xmit+0x455/0x3430 [ 2431.390252][ T1772] ? ip6ip6_err+0x540/0x540 [ 2431.394864][ T1772] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2431.400609][ T1772] ? map_id_range_down+0x1ee/0x370 [ 2431.405745][ T1772] ? __put_user_ns+0x70/0x70 [ 2431.410359][ T1772] ? ipv6_ext_hdr+0x7e/0x90 [ 2431.414880][ T1772] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2431.422531][ T1772] ? ip6_tnl_parse_tlv_enc_lim+0x349/0x5e0 [ 2431.428365][ T1772] ip6_tnl_start_xmit+0x84d/0x1ca0 [ 2431.433501][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.439868][ T1772] ? ip6_tnl_start_xmit+0x84d/0x1ca0 [ 2431.440910][ T1787] FAULT_INJECTION: forcing a failure. 18:04:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e800004102", 0x25}], 0x1}, 0x0) [ 2431.440910][ T1787] name failslab, interval 1, probability 0, space 0, times 0 [ 2431.445199][ T1772] ? ip6_tnl_xmit+0x3430/0x3430 [ 2431.445251][ T1772] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2431.445274][ T1772] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2431.475288][ T1772] dev_hard_start_xmit+0x1a3/0x9b0 [ 2431.481315][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.487582][ T1772] __dev_queue_xmit+0x2b05/0x35c0 [ 2431.492718][ T1772] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2431.498027][ T1772] ? mark_held_locks+0xf0/0xf0 [ 2431.502808][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.509932][ T1772] ? debug_smp_processor_id+0x33/0x18a [ 2431.516366][ T1772] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2431.522546][ T1772] ? rcu_read_lock_held_common+0xbd/0x130 [ 2431.528287][ T1772] dev_queue_xmit+0x18/0x20 [ 2431.532810][ T1772] ? dev_queue_xmit+0x18/0x20 [ 2431.537508][ T1772] neigh_direct_output+0x16/0x20 [ 2431.542470][ T1772] ip6_finish_output2+0x109a/0x25c0 [ 2431.547821][ T1772] ? ip6_frag_next+0xb20/0xb20 [ 2431.552624][ T1772] ? lock_downgrade+0x920/0x920 [ 2431.557594][ T1772] ? rcu_read_lock_held+0x9c/0xb0 [ 2431.562631][ T1772] ? __kasan_check_read+0x11/0x20 [ 2431.567793][ T1772] __ip6_finish_output+0x444/0xaa0 [ 2431.572917][ T1772] ? __ip6_finish_output+0x444/0xaa0 [ 2431.578235][ T1772] ip6_finish_output+0x38/0x1f0 [ 2431.583119][ T1772] ip6_output+0x25e/0x880 [ 2431.583135][ T1772] ? rawv6_sendmsg+0x2951/0x3900 [ 2431.583151][ T1772] ? ip6_finish_output+0x1f0/0x1f0 [ 2431.583168][ T1772] ? __ip6_finish_output+0xaa0/0xaa0 [ 2431.583185][ T1772] ? __kasan_check_read+0x11/0x20 [ 2431.583205][ T1772] rawv6_sendmsg+0x20f6/0x3900 [ 2431.583225][ T1772] ? mark_lock+0xc2/0x1220 [ 2431.583252][ T1772] ? rawv6_bind+0x9a0/0x9a0 [ 2431.583267][ T1772] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2431.583296][ T1772] ? rawv6_rcv_skb+0x390/0x390 [ 2431.583311][ T1772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2431.583327][ T1772] ? aa_label_sk_perm+0x91/0xf0 [ 2431.583344][ T1772] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2431.583356][ T1772] ? aa_sk_perm+0x346/0xaf0 [ 2431.583373][ T1772] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2431.583392][ T1772] ? aa_af_perm+0x2a0/0x2a0 [ 2431.583416][ T1772] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2431.583438][ T1772] inet_sendmsg+0x9e/0xe0 [ 2431.583458][ T1772] ? inet_sendmsg+0x9e/0xe0 [ 2431.681555][ T1772] ? inet_send_prepare+0x4e0/0x4e0 [ 2431.686674][ T1772] sock_sendmsg+0xd7/0x130 [ 2431.691529][ T1772] ____sys_sendmsg+0x753/0x880 [ 2431.696295][ T1772] ? kernel_sendmsg+0x50/0x50 [ 2431.700972][ T1772] ? __fget+0x35d/0x550 [ 2431.705115][ T1772] ? find_held_lock+0x35/0x130 [ 2431.709879][ T1772] ___sys_sendmsg+0x100/0x170 [ 2431.714644][ T1772] ? sendmsg_copy_msghdr+0x70/0x70 [ 2431.719953][ T1772] ? __kasan_check_read+0x11/0x20 [ 2431.725062][ T1772] ? __fget+0x37f/0x550 [ 2431.729222][ T1772] ? ksys_dup3+0x3e0/0x3e0 [ 2431.733641][ T1772] ? __fdget+0x1b/0x20 [ 2431.737698][ T1772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2431.743930][ T1772] __sys_sendmsg+0x105/0x1d0 [ 2431.748862][ T1772] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2431.753896][ T1772] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2431.759339][ T1772] ? do_syscall_64+0x26/0x790 [ 2431.764005][ T1772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2431.770057][ T1772] ? do_syscall_64+0x26/0x790 [ 2431.774815][ T1772] __x64_sys_sendmsg+0x78/0xb0 [ 2431.780537][ T1772] do_syscall_64+0xfa/0x790 [ 2431.785042][ T1772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2431.791013][ T1772] RIP: 0033:0x45a919 [ 2431.794896][ T1772] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2431.814592][ T1772] RSP: 002b:00007ff8fed08c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2431.822987][ T1772] RAX: ffffffffffffffda RBX: 00007ff8fed08c90 RCX: 000000000045a919 [ 2431.830952][ T1772] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2431.838918][ T1772] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2431.846971][ T1772] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fed096d4 [ 2431.855822][ T1772] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 [ 2431.873912][ T1787] CPU: 1 PID: 1787 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2431.882529][ T1787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2431.882535][ T1787] Call Trace: [ 2431.882559][ T1787] dump_stack+0x197/0x210 [ 2431.882581][ T1787] should_fail.cold+0xa/0x15 [ 2431.882596][ T1787] ? __find_rr_leaf+0x5d1/0x750 [ 2431.882614][ T1787] ? fault_create_debugfs_attr+0x180/0x180 [ 2431.882640][ T1787] __should_failslab+0x121/0x190 [ 2431.882658][ T1787] should_failslab+0x9/0x14 [ 2431.882671][ T1787] kmem_cache_alloc+0x47/0x710 [ 2431.882686][ T1787] ? rcu_read_lock_held+0x9c/0xb0 [ 2431.882708][ T1787] ? rcu_read_lock_held_common+0x130/0x130 [ 2431.882723][ T1787] ? rcu_read_lock_held+0x9c/0xb0 [ 2431.882745][ T1787] dst_alloc+0x10e/0x200 [ 2431.904972][ T1787] ip6_dst_alloc+0x34/0xa0 [ 2431.904991][ T1787] ip6_rt_cache_alloc+0x21c/0x850 [ 2431.905011][ T1787] ? rt6_get_route_info+0x780/0x780 [ 2431.905034][ T1787] ip6_pol_route+0x8c2/0xa70 [ 2431.915666][ T1787] ? ip6_pol_route_lookup+0x1240/0x1240 [ 2431.915686][ T1787] ? lock_downgrade+0x920/0x920 [ 2431.915714][ T1787] ? __kasan_check_read+0x11/0x20 [ 2431.915729][ T1787] ? mark_lock+0xc2/0x1220 [ 2431.915752][ T1787] ip6_pol_route_output+0x54/0x70 [ 2431.925176][ T1787] fib6_rule_lookup+0x6b0/0x7d0 [ 2431.925195][ T1787] ? __kernel_text_address+0xd/0x40 [ 2431.925212][ T1787] ? ip6_pol_route_input+0x80/0x80 18:04:18 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) [ 2431.925230][ T1787] ? fib6_lookup+0x340/0x340 [ 2431.925248][ T1787] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2431.925268][ T1787] ? rcu_read_lock_held+0x9c/0xb0 [ 2431.940883][ T1787] ? rcu_read_lock_held_common+0x130/0x130 [ 2431.940902][ T1787] ? __kasan_check_read+0x11/0x20 [ 2431.940914][ T1787] ? mark_lock+0xc2/0x1220 [ 2431.940929][ T1787] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2431.940947][ T1787] ? dev_get_by_index_rcu+0x113/0x150 [ 2431.940966][ T1787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.940992][ T1787] ip6_route_output_flags_noref+0x2d6/0x360 [ 2431.954650][ T1787] ip6_route_output_flags+0x106/0x4d0 [ 2431.954666][ T1787] ? ip6_dst_check+0x710/0x710 [ 2431.954690][ T1787] ? __kasan_check_read+0x11/0x20 [ 2431.979856][ T1787] ? mark_lock+0xc2/0x1220 [ 2431.979869][ T1787] ? find_held_lock+0x35/0x130 [ 2431.979895][ T1787] ip6_dst_lookup_tail+0x104b/0x1f20 [ 2431.979908][ T1787] ? mark_lock+0xc2/0x1220 [ 2431.979921][ T1787] ? __lock_acquire+0x16f2/0x4a00 [ 2431.979935][ T1787] ? update_curr+0x3e0/0x8d0 18:04:18 executing program 0 (fault-call:5 fault-nth:6): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2431.979953][ T1787] ? __lock_acquire+0x8a0/0x4a00 [ 2431.979971][ T1787] ? ip6_append_data+0x330/0x330 [ 2431.979986][ T1787] ? finish_task_switch+0x147/0x750 [ 2431.980008][ T1787] ? rawv6_sendmsg+0xb5b/0x3900 [ 2431.980020][ T1787] ? find_held_lock+0x35/0x130 [ 2431.980043][ T1787] ? rawv6_sendmsg+0xb5b/0x3900 [ 2431.994489][ T1787] ip6_dst_lookup_flow+0x8c/0x1d0 [ 2431.994511][ T1787] ? ip6_dst_lookup+0x70/0x70 [ 2431.994525][ T1787] ? rcu_read_lock_held+0x9c/0xb0 [ 2431.994545][ T1787] ? __kasan_check_read+0x11/0x20 [ 2432.031489][ T1787] rawv6_sendmsg+0xea9/0x3900 [ 2432.031512][ T1787] ? mark_lock+0xc2/0x1220 [ 2432.031528][ T1787] ? startup_64+0x11/0x30 [ 2432.031550][ T1787] ? rawv6_bind+0x9a0/0x9a0 [ 2432.031566][ T1787] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2432.031586][ T1787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2432.031612][ T1787] ? ___might_sleep+0x163/0x2c0 [ 2432.031637][ T1787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2432.031652][ T1787] ? aa_label_sk_perm+0x91/0xf0 [ 2432.031672][ T1787] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2432.058445][ T1787] ? aa_sk_perm+0x346/0xaf0 [ 2432.058466][ T1787] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2432.058483][ T1787] ? aa_af_perm+0x2a0/0x2a0 [ 2432.058508][ T1787] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2432.069774][ T1787] inet_sendmsg+0x9e/0xe0 [ 2432.084123][ T1787] ? inet_sendmsg+0x9e/0xe0 [ 2432.084142][ T1787] ? inet_send_prepare+0x4e0/0x4e0 [ 2432.084161][ T1787] sock_sendmsg+0xd7/0x130 [ 2432.132895][ T1787] ____sys_sendmsg+0x753/0x880 [ 2432.132917][ T1787] ? kernel_sendmsg+0x50/0x50 [ 2432.132932][ T1787] ? __fget+0x35d/0x550 [ 2432.132946][ T1787] ? find_held_lock+0x35/0x130 [ 2432.132971][ T1787] ___sys_sendmsg+0x100/0x170 [ 2432.132989][ T1787] ? sendmsg_copy_msghdr+0x70/0x70 [ 2432.133004][ T1787] ? __kasan_check_read+0x11/0x20 [ 2432.133023][ T1787] ? __fget+0x37f/0x550 [ 2432.152602][ T1787] ? ksys_dup3+0x3e0/0x3e0 [ 2432.152640][ T1787] ? __fdget+0x1b/0x20 [ 2432.171334][ T1787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2432.171355][ T1787] __sys_sendmsg+0x105/0x1d0 [ 2432.171371][ T1787] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2432.171400][ T1787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2432.171415][ T1787] ? do_syscall_64+0x26/0x790 [ 2432.171438][ T1787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2432.171454][ T1787] ? do_syscall_64+0x26/0x790 [ 2432.171475][ T1787] __x64_sys_sendmsg+0x78/0xb0 [ 2432.181889][ T1787] do_syscall_64+0xfa/0x790 [ 2432.181916][ T1787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2432.181927][ T1787] RIP: 0033:0x45a919 [ 2432.181942][ T1787] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2432.181950][ T1787] RSP: 002b:00007fd47218bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2432.181965][ T1787] RAX: ffffffffffffffda RBX: 00007fd47218bc90 RCX: 000000000045a919 [ 2432.181974][ T1787] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2432.181982][ T1787] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2432.181996][ T1787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd47218c6d4 [ 2432.203375][ T1787] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 [ 2432.329756][ T1799] FAULT_INJECTION: forcing a failure. [ 2432.329756][ T1799] name failslab, interval 1, probability 0, space 0, times 0 [ 2432.373813][ T1799] CPU: 0 PID: 1799 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 2432.373823][ T1799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2432.373829][ T1799] Call Trace: [ 2432.373854][ T1799] dump_stack+0x197/0x210 [ 2432.373874][ T1799] should_fail.cold+0xa/0x15 [ 2432.373894][ T1799] ? fault_create_debugfs_attr+0x180/0x180 [ 2432.373913][ T1799] ? __kasan_check_read+0x11/0x20 [ 2432.373935][ T1799] __should_failslab+0x121/0x190 [ 2432.423711][ T1799] should_failslab+0x9/0x14 [ 2432.423727][ T1799] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2432.423746][ T1799] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2432.423763][ T1799] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2432.423782][ T1799] __kmalloc_node_track_caller+0x3d/0x70 [ 2432.423806][ T1799] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2432.468047][ T1799] __alloc_skb+0x10b/0x5e0 [ 2432.468074][ T1799] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2432.505896][ T1799] ? ipv6_get_ifaddr+0x3ce/0x560 [ 2432.505915][ T1799] ? find_held_lock+0x35/0x130 [ 2432.505938][ T1799] alloc_skb_with_frags+0x93/0x590 [ 2432.527829][ T1799] ? lock_downgrade+0x920/0x920 [ 2432.527859][ T1799] sock_alloc_send_pskb+0x7ad/0x920 [ 2432.548064][ T1799] ? sock_wmalloc+0x120/0x120 [ 2432.548090][ T1799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.564560][ T1799] ? xfrm_lookup_with_ifid+0x602/0x2390 [ 2432.570157][ T1799] ? ip6_mtu+0x2e6/0x450 [ 2432.574429][ T1799] ? find_held_lock+0x35/0x130 [ 2432.579218][ T1799] sock_alloc_send_skb+0x32/0x40 [ 2432.579240][ T1799] __ip6_append_data.isra.0+0x1e94/0x3b60 [ 2432.579261][ T1799] ? rawv6_exit+0x20/0x20 [ 2432.594487][ T1799] ? ip6_flush_pending_frames+0xd0/0xd0 [ 2432.600066][ T1799] ? ip6_fraglist_init+0x8a0/0x8a0 [ 2432.605211][ T1799] ip6_append_data+0x1ec/0x330 [ 2432.610219][ T1799] ? rawv6_exit+0x20/0x20 [ 2432.610240][ T1799] ? rawv6_exit+0x20/0x20 [ 2432.610259][ T1799] icmp6_send+0x1505/0x1f90 [ 2432.610288][ T1799] ? icmpv6_push_pending_frames+0x540/0x540 [ 2432.610302][ T1799] ? __lock_acquire+0x821/0x4a00 [ 2432.610321][ T1799] ? ip6_route_dev_notify+0x1a0/0x7c0 [ 2432.610356][ T1799] ? icmpv6_push_pending_frames+0x540/0x540 [ 2432.629392][ T1799] ? rcu_read_lock_held+0x9c/0xb0 [ 2432.629410][ T1799] ? rcu_read_lock_held_common+0x130/0x130 [ 2432.629431][ T1799] ? icmpv6_push_pending_frames+0x540/0x540 [ 2432.629452][ T1799] icmpv6_send+0xec/0x220 [ 2432.662888][ T1799] ? icmpv6_send+0xec/0x220 [ 2432.662909][ T1799] ip6_link_failure+0x2b/0x530 [ 2432.662921][ T1799] ? inet6_rtm_getroute+0x1460/0x1460 [ 2432.662937][ T1799] ip6_tnl_xmit+0x455/0x3430 [ 2432.662963][ T1799] ? ip6ip6_err+0x540/0x540 [ 2432.662985][ T1799] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2432.682251][ T1799] ? map_id_range_down+0x1ee/0x370 [ 2432.682270][ T1799] ? __put_user_ns+0x70/0x70 [ 2432.682285][ T1799] ? ipv6_ext_hdr+0x7e/0x90 [ 2432.682304][ T1799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2432.682318][ T1799] ? ip6_tnl_parse_tlv_enc_lim+0x349/0x5e0 [ 2432.682341][ T1799] ip6_tnl_start_xmit+0x84d/0x1ca0 [ 2432.711848][ T1799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.711865][ T1799] ? ip6_tnl_start_xmit+0x84d/0x1ca0 [ 2432.711891][ T1799] ? ip6_tnl_xmit+0x3430/0x3430 [ 2432.711921][ T1799] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2432.729169][ T1799] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2432.729196][ T1799] dev_hard_start_xmit+0x1a3/0x9b0 [ 2432.729219][ T1799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.769096][ T1799] __dev_queue_xmit+0x2b05/0x35c0 [ 2432.774157][ T1799] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2432.779474][ T1799] ? mark_held_locks+0xf0/0xf0 [ 2432.785045][ T1799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.785061][ T1799] ? debug_smp_processor_id+0x33/0x18a [ 2432.785078][ T1799] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2432.785097][ T1799] ? rcu_read_lock_held_common+0xbd/0x130 [ 2432.802937][ T1799] dev_queue_xmit+0x18/0x20 [ 2432.802953][ T1799] ? dev_queue_xmit+0x18/0x20 [ 2432.802974][ T1799] neigh_direct_output+0x16/0x20 [ 2432.823958][ T1799] ip6_finish_output2+0x109a/0x25c0 [ 2432.829192][ T1799] ? ip6_frag_next+0xb20/0xb20 [ 2432.833978][ T1799] ? lock_downgrade+0x920/0x920 [ 2432.838871][ T1799] ? rcu_read_lock_held+0x9c/0xb0 [ 2432.843937][ T1799] ? __kasan_check_read+0x11/0x20 [ 2432.849013][ T1799] __ip6_finish_output+0x444/0xaa0 [ 2432.854172][ T1799] ? __ip6_finish_output+0x444/0xaa0 18:04:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e800004102000000", 0x28}], 0x1}, 0x0) 18:04:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e800004102000000", 0x28}], 0x1}, 0x0) 18:04:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2432.859667][ T1799] ip6_finish_output+0x38/0x1f0 [ 2432.864550][ T1799] ip6_output+0x25e/0x880 [ 2432.868907][ T1799] ? rawv6_sendmsg+0x2951/0x3900 [ 2432.873981][ T1799] ? ip6_finish_output+0x1f0/0x1f0 [ 2432.879223][ T1799] ? __ip6_finish_output+0xaa0/0xaa0 [ 2432.884533][ T1799] ? __kasan_check_read+0x11/0x20 [ 2432.889761][ T1799] rawv6_sendmsg+0x20f6/0x3900 [ 2432.895158][ T1799] ? mark_lock+0xc2/0x1220 [ 2432.899638][ T1799] ? rawv6_bind+0x9a0/0x9a0 [ 2432.904172][ T1799] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2432.910113][ T1799] ? rawv6_rcv_skb+0x390/0x390 [ 2432.914994][ T1799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2432.921351][ T1799] ? aa_label_sk_perm+0x91/0xf0 [ 2432.926229][ T1799] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2432.932944][ T1799] ? aa_sk_perm+0x346/0xaf0 [ 2432.937479][ T1799] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2432.944058][ T1799] ? aa_af_perm+0x2a0/0x2a0 [ 2432.948652][ T1799] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2432.954318][ T1799] inet_sendmsg+0x9e/0xe0 [ 2432.958754][ T1799] ? inet_sendmsg+0x9e/0xe0 [ 2432.963398][ T1799] ? inet_send_prepare+0x4e0/0x4e0 [ 2432.968708][ T1799] sock_sendmsg+0xd7/0x130 [ 2432.973151][ T1799] ____sys_sendmsg+0x753/0x880 [ 2432.977951][ T1799] ? kernel_sendmsg+0x50/0x50 [ 2432.982842][ T1799] ? __fget+0x35d/0x550 [ 2432.987017][ T1799] ? find_held_lock+0x35/0x130 [ 2432.991811][ T1799] ___sys_sendmsg+0x100/0x170 [ 2432.996514][ T1799] ? sendmsg_copy_msghdr+0x70/0x70 [ 2433.002092][ T1799] ? __kasan_check_read+0x11/0x20 [ 2433.007178][ T1799] ? __fget+0x37f/0x550 [ 2433.011470][ T1799] ? ksys_dup3+0x3e0/0x3e0 [ 2433.015922][ T1799] ? __fdget+0x1b/0x20 [ 2433.020000][ T1799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2433.026232][ T1799] __sys_sendmsg+0x105/0x1d0 [ 2433.031312][ T1799] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2433.036751][ T1799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2433.042203][ T1799] ? do_syscall_64+0x26/0x790 [ 2433.047955][ T1799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2433.054281][ T1799] ? do_syscall_64+0x26/0x790 [ 2433.059584][ T1799] __x64_sys_sendmsg+0x78/0xb0 [ 2433.064370][ T1799] do_syscall_64+0xfa/0x790 [ 2433.069681][ T1799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2433.075585][ T1799] RIP: 0033:0x45a919 [ 2433.079474][ T1799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2433.099517][ T1799] RSP: 002b:00007ff8fed08c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2433.107941][ T1799] RAX: ffffffffffffffda RBX: 00007ff8fed08c90 RCX: 000000000045a919 [ 2433.116270][ T1799] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2433.125303][ T1799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2433.133876][ T1799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fed096d4 [ 2433.141862][ T1799] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:19 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c777876f441d952b0e123f58a8d876c4ed0f2e70946b507d0419c09fc1fe6c0000"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:19 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e800004102000000", 0x28}], 0x1}, 0x0) 18:04:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x2, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:19 executing program 0 (fault-call:5 fault-nth:7): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:19 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000000)={0x4, 0xfffffffffffffe73, 0x80, 0x4, 0x2, 0x2, 0x0, 0x9, 0xcbc22, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x10, 0x7, 0x7f, 0x4, 0x1f, 0x1, 0x42}, 0x0, 0x8, 0xffffffffffffffff, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000586dd07"], 0x90ad) 18:04:20 executing program 3: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xe6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'veth0_to_bridge\x00'}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r2, 0x3, 0x6}, 0x10) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2d, 'rdma'}, {0x2d, 'cpu'}, {0x2b, 'rdma'}, {0x2d, 'io'}, {0x2d, 'pids'}, {0x2b, 'rdma'}, {0x2b, 'rdma'}, {0x2d, 'cpu'}, {0x0, 'rdma'}, {0x2d, 'io'}]}, 0x36) 18:04:20 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e80000410200000001", 0x29}], 0x1}, 0x0) 18:04:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:20 executing program 4: r0 = socket$kcm(0x2b, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x4, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:20 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x1012}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[], 0xc9fc62fdcb10676c) 18:04:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e80000410200000001", 0x29}], 0x1}, 0x0) 18:04:20 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:20 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_subtree(r3, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[], 0xffffffffffffff6b) 18:04:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x5, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:20 executing program 4: r0 = socket$kcm(0x2b, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:20 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x2, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:20 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e80000410200000001", 0x29}], 0x1}, 0x0) 18:04:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000140)=r2, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r4, 0x0, &(0x7f0000000000)="40c74a2bf111375896d876c6ed50c1fe6c00000000fbefd9c9cba954929fa7afaa9f8d6928160e8879677ba1fbcf6112e40e45428be667e6953534c6202447deaec89cf460cdad25c6a69030aa1318", 0x2}, 0x1b) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:20 executing program 4: r0 = socket$kcm(0x2b, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:21 executing program 2: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:04:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x7, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:21 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:21 executing program 2: sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:04:21 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000340)='c\xadgrou\x00\x00\x00\x00\x00\x00\x80\x01+&\xf9\x9d=2\xd9\x8e\xef\xf4^', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x28, &(0x7f00000001c0)}, 0x10) r4 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2b, 'pids'}, {0x2b, 'cpu'}, {0x5c, 'pids'}]}, 0x11) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="e70386dd079b2d7aa771c7c9eac8d842192dd7c7a581297c71e70fd2b51b54ee0c3318443dabede8cc3b31192ccd"], 0x90ad) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000300)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r8 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r9, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r12 = socket$kcm(0x2, 0x1, 0x84) close(r12) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r13, 0xb) setsockopt$sock_attach_bpf(r12, 0x10d, 0xb, &(0x7f0000000000)=r13, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r13, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r15 = socket$kcm(0x2, 0x1, 0x84) close(r15) r16 = socket$kcm(0xa, 0x6, 0x0) r17 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r16, 0x10d, 0xb, &(0x7f0000000000)=r17, 0xb) setsockopt$sock_attach_bpf(r15, 0x10d, 0xb, &(0x7f0000000000)=r17, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000080000000000000045fa00001800000020000000000000000700000003210300ffffff7f08635000fcffff05960000000000000043f26d657bb234e70dd82a0b5a09ecca09b47e931cb2a474e2b753ffa45e826f2a612cf2af16d506b4f305532efefcdcf8c67f65cf65f138e8e4c29f83f40d332b2e63926cec0fba6c163f6fc75229db90327628ab8213ab120096087a80f577d5d039895f01263968a15a959fbbea6a20ced86510ef"], &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r10, 0x19, r11, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r14, r17}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x8a2b709e92ed3957, 0x1, 0x6, 0x9ff, 0x840, r7, 0x20, [], r10, 0xffffffffffffffff, 0x1, 0x5}, 0x3c) 18:04:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x4, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x8, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x5, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:21 executing program 2 (fault-call:5 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x9, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2435.324925][ T1968] FAULT_INJECTION: forcing a failure. [ 2435.324925][ T1968] name failslab, interval 1, probability 0, space 0, times 0 [ 2435.385129][ T1968] CPU: 0 PID: 1968 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2435.393846][ T1968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2435.403911][ T1968] Call Trace: [ 2435.407224][ T1968] dump_stack+0x197/0x210 [ 2435.411587][ T1968] should_fail.cold+0xa/0x15 [ 2435.416292][ T1968] ? __find_rr_leaf+0x5d1/0x750 [ 2435.421168][ T1968] ? fault_create_debugfs_attr+0x180/0x180 [ 2435.427009][ T1968] __should_failslab+0x121/0x190 [ 2435.431973][ T1968] should_failslab+0x9/0x14 [ 2435.437470][ T1968] kmem_cache_alloc+0x47/0x710 [ 2435.442424][ T1968] ? rcu_read_lock_held+0x9c/0xb0 [ 2435.448083][ T1968] ? rcu_read_lock_held_common+0x130/0x130 [ 2435.453910][ T1968] ? rcu_read_lock_held+0x9c/0xb0 [ 2435.458962][ T1968] dst_alloc+0x10e/0x200 [ 2435.463235][ T1968] ip6_dst_alloc+0x34/0xa0 [ 2435.467662][ T1968] ip6_rt_cache_alloc+0x21c/0x850 [ 2435.472709][ T1968] ? rt6_get_route_info+0x780/0x780 [ 2435.472732][ T1968] ip6_pol_route+0x8c2/0xa70 18:04:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xa, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2435.472750][ T1968] ? ip6_pol_route_lookup+0x1240/0x1240 [ 2435.472765][ T1968] ? lock_downgrade+0x920/0x920 [ 2435.472789][ T1968] ? __kasan_check_read+0x11/0x20 [ 2435.498854][ T1968] ? mark_lock+0xc2/0x1220 [ 2435.503316][ T1968] ip6_pol_route_output+0x54/0x70 [ 2435.508366][ T1968] fib6_rule_lookup+0x6b0/0x7d0 [ 2435.513243][ T1968] ? __kernel_text_address+0xd/0x40 [ 2435.518459][ T1968] ? ip6_pol_route_input+0x80/0x80 [ 2435.523594][ T1968] ? fib6_lookup+0x340/0x340 [ 2435.528208][ T1968] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2435.534395][ T1968] ? rcu_read_lock_held+0x9c/0xb0 [ 2435.539530][ T1968] ? rcu_read_lock_held_common+0x130/0x130 [ 2435.545356][ T1968] ? __kasan_check_read+0x11/0x20 [ 2435.550391][ T1968] ? mark_lock+0xc2/0x1220 [ 2435.554901][ T1968] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2435.554920][ T1968] ? dev_get_by_index_rcu+0x113/0x150 [ 2435.554941][ T1968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2435.573008][ T1968] ip6_route_output_flags_noref+0x2d6/0x360 [ 2435.578928][ T1968] ip6_route_output_flags+0x106/0x4d0 [ 2435.584400][ T1968] ? ima_match_policy+0x84f/0x1270 [ 2435.589534][ T1968] ? ip6_dst_check+0x710/0x710 [ 2435.594316][ T1968] ? __kasan_check_read+0x11/0x20 [ 2435.599971][ T1968] ? __lock_acquire+0x16f2/0x4a00 [ 2435.605196][ T1968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.611291][ T1968] ip6_dst_lookup_tail+0x104b/0x1f20 [ 2435.616683][ T1968] ? mark_lock+0xc2/0x1220 [ 2435.621126][ T1968] ? __lock_acquire+0x8a0/0x4a00 [ 2435.626082][ T1968] ? ip6_append_data+0x330/0x330 [ 2435.631032][ T1968] ? process_measurement+0x821/0x1850 [ 2435.631053][ T1968] ? rawv6_sendmsg+0xb5b/0x3900 [ 2435.631067][ T1968] ? find_held_lock+0x35/0x130 [ 2435.631088][ T1968] ? rawv6_sendmsg+0xb5b/0x3900 [ 2435.641392][ T1968] ip6_dst_lookup_flow+0x8c/0x1d0 [ 2435.641411][ T1968] ? ip6_dst_lookup+0x70/0x70 [ 2435.641432][ T1968] ? rcu_read_lock_held+0x9c/0xb0 [ 2435.666096][ T1968] ? __kasan_check_read+0x11/0x20 [ 2435.671154][ T1968] rawv6_sendmsg+0xea9/0x3900 [ 2435.675851][ T1968] ? mark_lock+0xc2/0x1220 [ 2435.680596][ T1968] ? rawv6_bind+0x9a0/0x9a0 [ 2435.685100][ T1968] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2435.691036][ T1968] ? ___might_sleep+0x163/0x2c0 [ 2435.695893][ T1968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2435.702125][ T1968] ? aa_label_sk_perm+0x91/0xf0 [ 2435.707847][ T1968] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2435.713495][ T1968] ? aa_sk_perm+0x346/0xaf0 [ 2435.718008][ T1968] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2435.724423][ T1968] ? aa_af_perm+0x2a0/0x2a0 [ 2435.728924][ T1968] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2435.734999][ T1968] inet_sendmsg+0x9e/0xe0 [ 2435.739542][ T1968] ? inet_sendmsg+0x9e/0xe0 [ 2435.744037][ T1968] ? inet_send_prepare+0x4e0/0x4e0 [ 2435.749145][ T1968] sock_sendmsg+0xd7/0x130 [ 2435.753917][ T1968] ____sys_sendmsg+0x753/0x880 [ 2435.758665][ T1968] ? kernel_sendmsg+0x50/0x50 [ 2435.763333][ T1968] ? __fget+0x35d/0x550 [ 2435.767474][ T1968] ? find_held_lock+0x35/0x130 [ 2435.772227][ T1968] ___sys_sendmsg+0x100/0x170 [ 2435.776893][ T1968] ? sendmsg_copy_msghdr+0x70/0x70 [ 2435.782008][ T1968] ? __kasan_check_read+0x11/0x20 [ 2435.787036][ T1968] ? __fget+0x37f/0x550 [ 2435.791834][ T1968] ? ksys_dup3+0x3e0/0x3e0 [ 2435.796256][ T1968] ? __fdget+0x1b/0x20 [ 2435.800376][ T1968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2435.806637][ T1968] __sys_sendmsg+0x105/0x1d0 [ 2435.811217][ T1968] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2435.816238][ T1968] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2435.821683][ T1968] ? do_syscall_64+0x26/0x790 [ 2435.826797][ T1968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.832862][ T1968] ? do_syscall_64+0x26/0x790 [ 2435.837556][ T1968] __x64_sys_sendmsg+0x78/0xb0 [ 2435.842314][ T1968] do_syscall_64+0xfa/0x790 [ 2435.846807][ T1968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.852943][ T1968] RIP: 0033:0x45a919 [ 2435.856824][ T1968] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2435.877382][ T1968] RSP: 002b:00007f1a5a077c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2435.886388][ T1968] RAX: ffffffffffffffda RBX: 00007f1a5a077c90 RCX: 000000000045a919 [ 2435.894710][ T1968] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2435.902699][ T1968] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2435.910667][ T1968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a0786d4 [ 2435.918633][ T1968] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x840, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000686dd07"], 0x90ad) 18:04:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:22 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x20000, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000040)=0x7fffffff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:22 executing program 2 (fault-call:5 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x10, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x7, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:22 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'hwsim0\x00', 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2436.312068][ T2007] FAULT_INJECTION: forcing a failure. [ 2436.312068][ T2007] name failslab, interval 1, probability 0, space 0, times 0 [ 2436.370659][ T2007] CPU: 1 PID: 2007 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2436.379302][ T2007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2436.389642][ T2007] Call Trace: [ 2436.392961][ T2007] dump_stack+0x197/0x210 [ 2436.392982][ T2007] should_fail.cold+0xa/0x15 [ 2436.392997][ T2007] ? mark_lock+0xc2/0x1220 [ 2436.393013][ T2007] ? fault_create_debugfs_attr+0x180/0x180 [ 2436.393031][ T2007] ? ___might_sleep+0x163/0x2c0 [ 2436.393052][ T2007] __should_failslab+0x121/0x190 [ 2436.393068][ T2007] should_failslab+0x9/0x14 [ 2436.393086][ T2007] kmem_cache_alloc_node+0x268/0x740 [ 2436.433466][ T2007] ? ip6_dst_lookup_tail+0xdd5/0x1f20 [ 2436.438851][ T2007] __alloc_skb+0xd5/0x5e0 [ 2436.443297][ T2007] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2436.448869][ T2007] ? trace_hardirqs_on+0x67/0x240 [ 2436.453915][ T2007] ? __kasan_check_read+0x11/0x20 [ 2436.458959][ T2007] alloc_skb_with_frags+0x93/0x590 [ 2436.464101][ T2007] ? __kasan_check_read+0x11/0x20 [ 2436.469329][ T2007] sock_alloc_send_pskb+0x7ad/0x920 [ 2436.474566][ T2007] ? sock_wmalloc+0x120/0x120 [ 2436.479257][ T2007] ? lock_downgrade+0x920/0x920 [ 2436.484128][ T2007] ? rcu_read_lock_held+0x9c/0xb0 [ 2436.489175][ T2007] ? __kasan_check_read+0x11/0x20 [ 2436.494220][ T2007] sock_alloc_send_skb+0x32/0x40 [ 2436.499183][ T2007] rawv6_sendmsg+0x1959/0x3900 [ 2436.503965][ T2007] ? mark_lock+0xc2/0x1220 [ 2436.508419][ T2007] ? rawv6_bind+0x9a0/0x9a0 [ 2436.512944][ T2007] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2436.518863][ T2007] ? ___might_sleep+0x163/0x2c0 [ 2436.518891][ T2007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2436.529988][ T2007] ? aa_label_sk_perm+0x91/0xf0 [ 2436.534869][ T2007] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2436.540627][ T2007] ? aa_sk_perm+0x346/0xaf0 [ 2436.545158][ T2007] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2436.551792][ T2007] ? aa_af_perm+0x2a0/0x2a0 [ 2436.551820][ T2007] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2436.551844][ T2007] inet_sendmsg+0x9e/0xe0 [ 2436.551861][ T2007] ? inet_sendmsg+0x9e/0xe0 [ 2436.551878][ T2007] ? inet_send_prepare+0x4e0/0x4e0 [ 2436.551898][ T2007] sock_sendmsg+0xd7/0x130 [ 2436.562135][ T2007] ____sys_sendmsg+0x753/0x880 [ 2436.562154][ T2007] ? kernel_sendmsg+0x50/0x50 [ 2436.562168][ T2007] ? __fget+0x35d/0x550 [ 2436.562183][ T2007] ? find_held_lock+0x35/0x130 [ 2436.562208][ T2007] ___sys_sendmsg+0x100/0x170 [ 2436.562226][ T2007] ? sendmsg_copy_msghdr+0x70/0x70 [ 2436.562241][ T2007] ? __kasan_check_read+0x11/0x20 [ 2436.562259][ T2007] ? __fget+0x37f/0x550 18:04:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x8, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2436.562280][ T2007] ? ksys_dup3+0x3e0/0x3e0 [ 2436.562305][ T2007] ? __fdget+0x1b/0x20 [ 2436.562322][ T2007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2436.562342][ T2007] __sys_sendmsg+0x105/0x1d0 [ 2436.580703][ T2007] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2436.580733][ T2007] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2436.580749][ T2007] ? do_syscall_64+0x26/0x790 [ 2436.580767][ T2007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.580781][ T2007] ? do_syscall_64+0x26/0x790 [ 2436.580807][ T2007] __x64_sys_sendmsg+0x78/0xb0 18:04:23 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r4, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r7 = socket$kcm(0x2, 0x1, 0x84) close(r7) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r8, 0xb) setsockopt$sock_attach_bpf(r7, 0x10d, 0xb, &(0x7f0000000000)=r8, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r8, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r10 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r11, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) close(r10) r12 = socket$kcm(0xa, 0x6, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r12, 0x10d, 0xb, &(0x7f0000000000)=r13, 0xb) setsockopt$sock_attach_bpf(r10, 0x10d, 0xb, &(0x7f0000000000)=r13, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000080000000000000045fa00001800000020000000000000000700000003210376b41b4990b900ffffff7f08635000fcffffff9500000000000000"], &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r5, 0x19, r6, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r9, r13}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r9}, 0x78) [ 2436.580825][ T2007] do_syscall_64+0xfa/0x790 [ 2436.580852][ T2007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.623770][ T2007] RIP: 0033:0x45a919 [ 2436.623787][ T2007] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2436.623795][ T2007] RSP: 002b:00007f1a5a077c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2436.623809][ T2007] RAX: ffffffffffffffda RBX: 00007f1a5a077c90 RCX: 000000000045a919 18:04:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x11, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2436.623826][ T2007] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2436.634109][ T2007] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2436.634118][ T2007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a0786d4 [ 2436.634125][ T2007] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x9, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x60, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:23 executing program 2 (fault-call:5 fault-nth:2): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xa, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:23 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000af00)={&(0x7f0000009d00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000ae40)=[{&(0x7f0000009d80)=""/4096, 0x1000}, {&(0x7f000000ad80)=""/166, 0xa6}], 0x2, &(0x7f000000ae80)=""/70, 0x46}, 0x2185) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000b1c0)={r2, 0xc0, &(0x7f000000b100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000afc0)=0x7, 0x0, 0x0, 0x0, &(0x7f000000b000)={0x1, 0x3}, 0x0, 0x0, &(0x7f000000b040)={0x2, 0x8, 0x80, 0x10001}, &(0x7f000000b080)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f000000b0c0)=0x1}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0x12, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4}, [@generic={0x40, 0xf, 0xb, 0x3, 0x8}, @call={0x85, 0x0, 0x0, 0x27}, @exit, @generic={0x79, 0x0, 0xa, 0xa95b, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x5}, @ldst={0x1, 0x1, 0x6, 0x1, 0x1, 0x10c, 0x4}, @alu={0x7, 0x0, 0x1, 0x1, 0x0, 0xffffffffffffffe4, 0xfffffffffffffff0}]}, &(0x7f00000001c0)='syzkaller\x00', 0xf55, 0x0, 0x0, 0x41000, 0x1, [], r1, 0x7f9214a67052b6e2, 0xffffffffffffffff, 0x8, &(0x7f000000af40)={0x4, 0x5}, 0x8, 0x10, &(0x7f000000af80)={0x4, 0xb, 0x9, 0x7fffffff}, 0x10, r4, r5}, 0x78) 18:04:23 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f00000001c0)="748a2740387ad453e049243e9914026f156af9ee2a2bab7e0e8a7809539cf663b5c056cdfc8c5f6885d2cfa68c0bf230c8c06d334c6c948aa41114bcbc2eb1b3de67981225bbbbe5bd0edaeecff736867b0dc399959e41df71bfee3e85be85e3ecccea1126a9db7dc1a9601345f869a147d8f1bc3fb112c43f782ac6250ab32683e636ab915438bdda71fda94507020be2ce7782926d9cc6f44b08522ee3a2b31b57e20c8cf3b74c82", &(0x7f0000000000)=""/44, 0x2}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000486dd0726715d99726f690341255ae59cb96464aac6ef885cd9b2ea4f5b7d987b93f7fc19d3917b14654e6194b944598d0827ac3c500996a63acfe779689164bbfc2630f76831bee438463496afcdbf8bcb970a5e72f546c99df688a72a23e51ea109e0e74312b372122af7bc3f3d56b5b21be1ad69d0ccf51991cb683149ec2ffa7d07fee1300e3b6bf6e936331e781cc515c02690dfcc5409fda7aa2ccbbf63c845b067ea8aab0fec60d4905b48ac397a0584d692b19a25ddea3204d91476d30779e299f135dce75865ddfcb83762e2c7bd9538"], 0x90ad) 18:04:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:24 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x7052fc6455b851b1, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:24 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfc, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2437.584579][ T2066] FAULT_INJECTION: forcing a failure. [ 2437.584579][ T2066] name failslab, interval 1, probability 0, space 0, times 0 18:04:24 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x10, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:24 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) [ 2437.870122][ T2066] CPU: 0 PID: 2066 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2437.878853][ T2066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2437.888919][ T2066] Call Trace: [ 2437.893027][ T2066] dump_stack+0x197/0x210 [ 2437.897382][ T2066] should_fail.cold+0xa/0x15 [ 2437.902001][ T2066] ? fault_create_debugfs_attr+0x180/0x180 [ 2437.907819][ T2066] ? ___might_sleep+0x163/0x2c0 [ 2437.912678][ T2066] __should_failslab+0x121/0x190 [ 2437.912698][ T2066] should_failslab+0x9/0x14 [ 2437.912713][ T2066] kmem_cache_alloc_node_trace+0x274/0x750 [ 2437.912730][ T2066] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2437.912750][ T2066] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2437.912773][ T2066] __kmalloc_node_track_caller+0x3d/0x70 [ 2437.945424][ T2066] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2437.950830][ T2066] __alloc_skb+0x10b/0x5e0 [ 2437.955632][ T2066] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2437.961187][ T2066] ? trace_hardirqs_on+0x67/0x240 [ 2437.967187][ T2066] ? __kasan_check_read+0x11/0x20 [ 2437.972232][ T2066] alloc_skb_with_frags+0x93/0x590 [ 2437.977369][ T2066] ? __kasan_check_read+0x11/0x20 [ 2437.982425][ T2066] sock_alloc_send_pskb+0x7ad/0x920 [ 2437.987666][ T2066] ? sock_wmalloc+0x120/0x120 [ 2437.992338][ T2066] ? lock_downgrade+0x920/0x920 [ 2437.992355][ T2066] ? rcu_read_lock_held+0x9c/0xb0 [ 2437.992371][ T2066] ? __kasan_check_read+0x11/0x20 [ 2437.992389][ T2066] sock_alloc_send_skb+0x32/0x40 [ 2437.992408][ T2066] rawv6_sendmsg+0x1959/0x3900 [ 2437.992425][ T2066] ? mark_lock+0xc2/0x1220 [ 2438.021633][ T2066] ? rawv6_bind+0x9a0/0x9a0 [ 2438.026212][ T2066] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2438.032200][ T2066] ? ___might_sleep+0x163/0x2c0 [ 2438.037062][ T2066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2438.043306][ T2066] ? aa_label_sk_perm+0x91/0xf0 [ 2438.048174][ T2066] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2438.053819][ T2066] ? aa_sk_perm+0x346/0xaf0 [ 2438.058312][ T2066] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2438.064812][ T2066] ? aa_af_perm+0x2a0/0x2a0 [ 2438.069357][ T2066] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2438.074920][ T2066] inet_sendmsg+0x9e/0xe0 [ 2438.079240][ T2066] ? inet_sendmsg+0x9e/0xe0 [ 2438.083729][ T2066] ? inet_send_prepare+0x4e0/0x4e0 [ 2438.088828][ T2066] sock_sendmsg+0xd7/0x130 [ 2438.093232][ T2066] ____sys_sendmsg+0x753/0x880 [ 2438.097996][ T2066] ? kernel_sendmsg+0x50/0x50 [ 2438.102659][ T2066] ? __fget+0x35d/0x550 [ 2438.106816][ T2066] ? find_held_lock+0x35/0x130 [ 2438.111571][ T2066] ___sys_sendmsg+0x100/0x170 [ 2438.116244][ T2066] ? sendmsg_copy_msghdr+0x70/0x70 [ 2438.121341][ T2066] ? __kasan_check_read+0x11/0x20 [ 2438.126652][ T2066] ? __fget+0x37f/0x550 [ 2438.130801][ T2066] ? ksys_dup3+0x3e0/0x3e0 [ 2438.135227][ T2066] ? __fdget+0x1b/0x20 [ 2438.139282][ T2066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2438.145511][ T2066] __sys_sendmsg+0x105/0x1d0 [ 2438.150367][ T2066] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2438.155388][ T2066] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2438.160832][ T2066] ? do_syscall_64+0x26/0x790 [ 2438.165498][ T2066] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.171605][ T2066] ? do_syscall_64+0x26/0x790 [ 2438.176289][ T2066] __x64_sys_sendmsg+0x78/0xb0 [ 2438.181059][ T2066] do_syscall_64+0xfa/0x790 [ 2438.185565][ T2066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.191458][ T2066] RIP: 0033:0x45a919 [ 2438.195430][ T2066] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:04:24 executing program 2 (fault-call:5 fault-nth:3): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x300, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2438.215106][ T2066] RSP: 002b:00007f1a5a077c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2438.223511][ T2066] RAX: ffffffffffffffda RBX: 00007f1a5a077c90 RCX: 000000000045a919 [ 2438.231497][ T2066] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2438.239455][ T2066] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2438.247499][ T2066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a0786d4 [ 2438.255459][ T2066] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 [ 2438.364364][ T2099] FAULT_INJECTION: forcing a failure. [ 2438.364364][ T2099] name failslab, interval 1, probability 0, space 0, times 0 [ 2438.378978][ T2099] CPU: 0 PID: 2099 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2438.387773][ T2099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2438.397821][ T2099] Call Trace: [ 2438.397849][ T2099] dump_stack+0x197/0x210 [ 2438.397870][ T2099] should_fail.cold+0xa/0x15 [ 2438.397887][ T2099] ? fault_create_debugfs_attr+0x180/0x180 [ 2438.397901][ T2099] ? find_held_lock+0x35/0x130 [ 2438.397923][ T2099] ? __nf_conntrack_find_get+0xa6b/0x13a0 [ 2438.427481][ T2099] __should_failslab+0x121/0x190 [ 2438.432446][ T2099] should_failslab+0x9/0x14 [ 2438.437666][ T2099] kmem_cache_alloc+0x47/0x710 [ 2438.442455][ T2099] ? __nf_conntrack_find_get+0xb2b/0x13a0 [ 2438.448202][ T2099] ? __kasan_check_read+0x11/0x20 [ 2438.453253][ T2099] __nf_conntrack_alloc+0xdb/0x6c0 [ 2438.458411][ T2099] init_conntrack.isra.0+0xe3c/0x11a0 [ 2438.463795][ T2099] ? nf_conntrack_alloc+0x50/0x50 [ 2438.463817][ T2099] ? ip6t_do_table+0xdd5/0x1cc0 [ 2438.463832][ T2099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2438.463853][ T2099] nf_conntrack_in+0xd94/0x1460 [ 2438.484790][ T2099] ? nf_conntrack_update+0x960/0x960 [ 2438.490082][ T2099] ? ip6t_error+0x40/0x40 [ 2438.494426][ T2099] ipv6_conntrack_local+0x1e/0x30 [ 2438.499450][ T2099] nf_hook_slow+0xbc/0x1e0 [ 2438.503864][ T2099] rawv6_sendmsg+0x2914/0x3900 [ 2438.508607][ T2099] ? mark_lock+0xc2/0x1220 [ 2438.513011][ T2099] ? rawv6_bind+0x9a0/0x9a0 [ 2438.517509][ T2099] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2438.523410][ T2099] ? rawv6_rcv_skb+0x390/0x390 [ 2438.528186][ T2099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2438.534432][ T2099] ? aa_label_sk_perm+0x91/0xf0 [ 2438.539299][ T2099] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2438.544940][ T2099] ? aa_sk_perm+0x346/0xaf0 [ 2438.549560][ T2099] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2438.555965][ T2099] ? aa_af_perm+0x2a0/0x2a0 [ 2438.560464][ T2099] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2438.566085][ T2099] inet_sendmsg+0x9e/0xe0 [ 2438.570400][ T2099] ? inet_sendmsg+0x9e/0xe0 [ 2438.574886][ T2099] ? inet_send_prepare+0x4e0/0x4e0 [ 2438.579992][ T2099] sock_sendmsg+0xd7/0x130 [ 2438.584389][ T2099] ____sys_sendmsg+0x753/0x880 [ 2438.589235][ T2099] ? kernel_sendmsg+0x50/0x50 [ 2438.593908][ T2099] ? __fget+0x35d/0x550 [ 2438.598068][ T2099] ? find_held_lock+0x35/0x130 [ 2438.602839][ T2099] ___sys_sendmsg+0x100/0x170 [ 2438.607515][ T2099] ? sendmsg_copy_msghdr+0x70/0x70 [ 2438.612608][ T2099] ? __kasan_check_read+0x11/0x20 [ 2438.617629][ T2099] ? __fget+0x37f/0x550 [ 2438.621769][ T2099] ? ksys_dup3+0x3e0/0x3e0 [ 2438.626188][ T2099] ? __fdget+0x1b/0x20 [ 2438.630240][ T2099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2438.636477][ T2099] __sys_sendmsg+0x105/0x1d0 [ 2438.642704][ T2099] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2438.647733][ T2099] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2438.653173][ T2099] ? do_syscall_64+0x26/0x790 [ 2438.657831][ T2099] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.663875][ T2099] ? do_syscall_64+0x26/0x790 [ 2438.668537][ T2099] __x64_sys_sendmsg+0x78/0xb0 [ 2438.673282][ T2099] do_syscall_64+0xfa/0x790 [ 2438.677877][ T2099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.683792][ T2099] RIP: 0033:0x45a919 [ 2438.687693][ T2099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2438.707442][ T2099] RSP: 002b:00007f1a5a077c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 18:04:25 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x408000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'bond_slave_0\x00', @remote}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486d507"], 0x90ad) 18:04:25 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup(r1, &(0x7f0000000480)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f00000004c0)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x3, 0x4}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x7, 0x4}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x9, 0x5, 0x200}, &(0x7f0000000200)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="009c1e1a24"], 0x90ad) 18:04:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x11, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x430, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2438.715840][ T2099] RAX: ffffffffffffffda RBX: 00007f1a5a077c90 RCX: 000000000045a919 [ 2438.723869][ T2099] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2438.731836][ T2099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2438.739793][ T2099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a0786d4 [ 2438.747766][ T2099] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:25 executing program 2 (fault-call:5 fault-nth:4): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:25 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x12, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x438, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:25 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff7b, 0x0}, 0xffffffffffffff01) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) [ 2438.997450][ T2119] FAULT_INJECTION: forcing a failure. [ 2438.997450][ T2119] name failslab, interval 1, probability 0, space 0, times 0 [ 2439.060194][ T2119] CPU: 0 PID: 2119 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2439.069093][ T2119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2439.080197][ T2119] Call Trace: [ 2439.080225][ T2119] dump_stack+0x197/0x210 [ 2439.080244][ T2119] should_fail.cold+0xa/0x15 [ 2439.080259][ T2119] ? __lock_acquire+0x16f2/0x4a00 [ 2439.080276][ T2119] ? fault_create_debugfs_attr+0x180/0x180 [ 2439.080299][ T2119] ? nf_ct_ext_add+0x26b/0x630 [ 2439.108563][ T2119] __should_failslab+0x121/0x190 [ 2439.113613][ T2119] should_failslab+0x9/0x14 [ 2439.118141][ T2119] __kmalloc_track_caller+0x6d/0x760 [ 2439.123443][ T2119] ? lock_downgrade+0x920/0x920 [ 2439.128318][ T2119] ? rcu_read_lock_held+0x9c/0xb0 [ 2439.133453][ T2119] ? nf_ct_ext_add+0x2c7/0x630 [ 2439.138242][ T2119] krealloc+0x66/0xd0 [ 2439.142253][ T2119] nf_ct_ext_add+0x2c7/0x630 [ 2439.146871][ T2119] init_conntrack.isra.0+0x439/0x11a0 [ 2439.152262][ T2119] ? nf_conntrack_alloc+0x50/0x50 [ 2439.157320][ T2119] ? ip6t_do_table+0xdd5/0x1cc0 [ 2439.162980][ T2119] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2439.169255][ T2119] nf_conntrack_in+0xd94/0x1460 [ 2439.174147][ T2119] ? nf_conntrack_update+0x960/0x960 [ 2439.179457][ T2119] ? ip6t_error+0x40/0x40 [ 2439.183825][ T2119] ipv6_conntrack_local+0x1e/0x30 [ 2439.188873][ T2119] nf_hook_slow+0xbc/0x1e0 [ 2439.193322][ T2119] rawv6_sendmsg+0x2914/0x3900 [ 2439.198151][ T2119] ? mark_lock+0xc2/0x1220 [ 2439.202691][ T2119] ? rawv6_bind+0x9a0/0x9a0 18:04:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x460, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2439.207297][ T2119] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2439.213358][ T2119] ? rawv6_rcv_skb+0x390/0x390 [ 2439.218149][ T2119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2439.224408][ T2119] ? aa_label_sk_perm+0x91/0xf0 [ 2439.229289][ T2119] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2439.235209][ T2119] ? aa_sk_perm+0x346/0xaf0 [ 2439.235227][ T2119] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2439.235243][ T2119] ? aa_af_perm+0x2a0/0x2a0 [ 2439.235268][ T2119] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2439.235294][ T2119] inet_sendmsg+0x9e/0xe0 [ 2439.235308][ T2119] ? inet_sendmsg+0x9e/0xe0 [ 2439.235329][ T2119] ? inet_send_prepare+0x4e0/0x4e0 [ 2439.270431][ T2119] sock_sendmsg+0xd7/0x130 [ 2439.274871][ T2119] ____sys_sendmsg+0x753/0x880 [ 2439.279685][ T2119] ? kernel_sendmsg+0x50/0x50 [ 2439.284429][ T2119] ? __fget+0x35d/0x550 [ 2439.288610][ T2119] ? find_held_lock+0x35/0x130 [ 2439.293429][ T2119] ___sys_sendmsg+0x100/0x170 [ 2439.298184][ T2119] ? sendmsg_copy_msghdr+0x70/0x70 [ 2439.303325][ T2119] ? __kasan_check_read+0x11/0x20 18:04:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x500, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2439.308369][ T2119] ? __fget+0x37f/0x550 [ 2439.312561][ T2119] ? ksys_dup3+0x3e0/0x3e0 [ 2439.317017][ T2119] ? __fdget+0x1b/0x20 [ 2439.321121][ T2119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2439.327468][ T2119] __sys_sendmsg+0x105/0x1d0 [ 2439.332158][ T2119] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2439.332187][ T2119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2439.332202][ T2119] ? do_syscall_64+0x26/0x790 [ 2439.332219][ T2119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2439.332240][ T2119] ? do_syscall_64+0x26/0x790 [ 2439.359536][ T2119] __x64_sys_sendmsg+0x78/0xb0 [ 2439.364438][ T2119] do_syscall_64+0xfa/0x790 [ 2439.368978][ T2119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2439.374887][ T2119] RIP: 0033:0x45a919 [ 2439.378805][ T2119] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2439.398609][ T2119] RSP: 002b:00007f1a5a077c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2439.407055][ T2119] RAX: ffffffffffffffda RBX: 00007f1a5a077c90 RCX: 000000000045a919 [ 2439.415046][ T2119] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2439.423160][ T2119] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2439.431161][ T2119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a0786d4 [ 2439.439414][ T2119] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:26 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f00000002c0)="89402bc323745aa5eca601b2ff6c57f64aa38d6027302e28aa9e718e485351003b4896953703666e20fa233ac381acfaff88dcb0e3838a9c939cb90ff28b2d8e63f8171df981c9c7d2b0e8515e77a70b58814ae46c9ffedf548d44e62788988faaed88cbbb65fcfad411aae51ea2d2c6393d60d23c9985383623feb74da301a4b6cc6d62f32a05711880e99970eb697d9853d6259a4f1f64fd3e6cb97b81801011b27479c1bd0cfbe0301763779f65332c1aff237b74b1cd0b8523cadd01d65519732e60d6d95d018588ced14156fa52b121d8da36b2716311372b13b9116a242663a7daf0a1b98849527f65690953b295d126e63ce76bed", &(0x7f00000001c0)="e1f4417a60bbae9a3d63535946c93fdfd3c9d323f3cdc145f65fb5552206ee2ade81dcdd75624b134fd77d72e8252a975a635b9838601704432ee5d0b6148e3542988d64fc2bff2cbc796aced7705fc216", 0x4}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0486461a94dbddaa88dde3651bebe407ff56766af2a036ff600534582668c64570dfe3e6a1734c0af0dfdf9dcbf3f99c623eae1652d8b3e530fdbb8fe8e8aa6fb69d4462bf36a63707800440330dc300ec"], 0x90ad) 18:04:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x5ac, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:26 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:26 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="2333e8ff4400000095143200000000001cb59842c2822eccc6bd9d47ea4160a555217d080600effa5cda497ebfbce27d463e6a0065b159fd00d477b9a4760f83d97d97ae191341ea16b74d39859db33526ecbcba345090d218817cd4c38d79950cb06bbc75e9040f7c8ba12a4725"], &(0x7f00000001c0)='GPL\x00', 0x8000, 0xda, &(0x7f0000000300)=""/218, 0x41000, 0x0, [], 0x0, 0x6e819fa128a9fd76, r4, 0x8, &(0x7f0000000200)={0x0, 0x6418}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0x4, 0x6, 0x100}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000500)=r6) mkdirat$cgroup(r3, &(0x7f00000006c0)='syz0\x00', 0x1ff) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00020000001bb6c60041c86186f39f0fb9bb76464674c5edbe1f13e5cfb75bb901a6197047a4ead45ad470eb5e6a9d9b92bd0d17476e459b61ce26303e8ddcbe27a19788a2d83b4c10bc25c22d5ce20ca2337bf48820576cfbec4db16e27762d259d81950e31ce5b0c4f0c4da1aa1d8d9ce794032e2f2d063030023cd9f56c13ea4f7b9c4af5a10e772ebd6dd291f5f0492649c58b142e19ef466067a4b073f99e41d0a3769038fac1c63d44bcb19686ae2af6"], 0x90ad) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000680)='cpuacct.usage_sys\x00', 0x0, 0x0) 18:04:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x60, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:26 executing program 2 (fault-call:5 fault-nth:5): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2439.916818][ T2157] FAULT_INJECTION: forcing a failure. [ 2439.916818][ T2157] name failslab, interval 1, probability 0, space 0, times 0 [ 2439.929537][ T2157] CPU: 0 PID: 2157 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2439.938157][ T2157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2439.938164][ T2157] Call Trace: [ 2439.938189][ T2157] dump_stack+0x197/0x210 [ 2439.938213][ T2157] should_fail.cold+0xa/0x15 [ 2439.960975][ T2157] ? fault_create_debugfs_attr+0x180/0x180 [ 2439.966809][ T2157] __should_failslab+0x121/0x190 [ 2439.971780][ T2157] should_failslab+0x9/0x14 [ 2439.976325][ T2157] kmem_cache_alloc_node+0x56/0x740 [ 2439.981550][ T2157] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2439.987815][ T2157] ? fib6_rule_lookup+0x529/0x7d0 [ 2439.992863][ T2157] __alloc_skb+0xd5/0x5e0 [ 2439.992886][ T2157] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2439.992900][ T2157] ? __lock_acquire+0x8a0/0x4a00 [ 2439.992924][ T2157] ? rcu_read_lock_held_common+0x130/0x130 [ 2440.013626][ T2157] alloc_skb_with_frags+0x93/0x590 [ 2440.013643][ T2157] ? mark_lock+0xc2/0x1220 [ 2440.013662][ T2157] ? find_held_lock+0x35/0x130 [ 2440.027992][ T2157] sock_alloc_send_pskb+0x7ad/0x920 [ 2440.033226][ T2157] ? sock_wmalloc+0x120/0x120 [ 2440.037914][ T2157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2440.037934][ T2157] ? xfrm_lookup_with_ifid+0x602/0x2390 [ 2440.037955][ T2157] ? ip6_mtu+0x2e6/0x450 [ 2440.053985][ T2157] ? find_held_lock+0x35/0x130 [ 2440.054008][ T2157] sock_alloc_send_skb+0x32/0x40 [ 2440.064321][ T2157] __ip6_append_data.isra.0+0x1e94/0x3b60 [ 2440.070051][ T2157] ? rawv6_exit+0x20/0x20 [ 2440.070084][ T2157] ? ip6_flush_pending_frames+0xd0/0xd0 [ 2440.070104][ T2157] ? ip6_fraglist_init+0x8a0/0x8a0 [ 2440.070124][ T2157] ip6_append_data+0x1ec/0x330 [ 2440.070140][ T2157] ? rawv6_exit+0x20/0x20 [ 2440.085355][ T2157] ? rawv6_exit+0x20/0x20 [ 2440.085375][ T2157] icmp6_send+0x1505/0x1f90 [ 2440.085403][ T2157] ? icmpv6_push_pending_frames+0x540/0x540 [ 2440.094473][ T2157] ? __lock_acquire+0x821/0x4a00 [ 2440.094496][ T2157] ? ip6_route_dev_notify+0x1a0/0x7c0 [ 2440.094533][ T2157] ? icmpv6_push_pending_frames+0x540/0x540 [ 2440.109258][ T2157] ? rcu_read_lock_held+0x9c/0xb0 [ 2440.119628][ T2157] ? rcu_read_lock_held_common+0x130/0x130 [ 2440.119649][ T2157] ? icmpv6_push_pending_frames+0x540/0x540 [ 2440.119664][ T2157] icmpv6_send+0xec/0x220 [ 2440.119683][ T2157] ? icmpv6_send+0xec/0x220 [ 2440.130608][ T2157] ip6_link_failure+0x2b/0x530 [ 2440.130622][ T2157] ? inet6_rtm_getroute+0x1460/0x1460 [ 2440.130638][ T2157] ip6_tnl_xmit+0x455/0x3430 18:04:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x600, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x700, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x900, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2440.130666][ T2157] ? ip6ip6_err+0x540/0x540 [ 2440.161452][ T2157] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2440.161472][ T2157] ? map_id_range_down+0x1ee/0x370 [ 2440.161494][ T2157] ? __put_user_ns+0x70/0x70 [ 2440.181410][ T2157] ? ipv6_ext_hdr+0x7e/0x90 [ 2440.181430][ T2157] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2440.181447][ T2157] ? ip6_tnl_parse_tlv_enc_lim+0x349/0x5e0 [ 2440.181470][ T2157] ip6_tnl_start_xmit+0x84d/0x1ca0 [ 2440.181483][ T2157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2440.181501][ T2157] ? ip6_tnl_start_xmit+0x84d/0x1ca0 [ 2440.219950][ T2157] ? ip6_tnl_xmit+0x3430/0x3430 [ 2440.224833][ T2157] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2440.230412][ T2157] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2440.236657][ T2157] dev_hard_start_xmit+0x1a3/0x9b0 [ 2440.241961][ T2157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2440.248232][ T2157] __dev_queue_xmit+0x2b05/0x35c0 [ 2440.253281][ T2157] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2440.258604][ T2157] ? mark_held_locks+0xf0/0xf0 [ 2440.264432][ T2157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2440.270696][ T2157] ? debug_smp_processor_id+0x33/0x18a [ 2440.276181][ T2157] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2440.282356][ T2157] ? rcu_read_lock_held_common+0xbd/0x130 [ 2440.288111][ T2157] dev_queue_xmit+0x18/0x20 [ 2440.292637][ T2157] ? dev_queue_xmit+0x18/0x20 [ 2440.297336][ T2157] neigh_direct_output+0x16/0x20 [ 2440.302380][ T2157] ip6_finish_output2+0x109a/0x25c0 [ 2440.307615][ T2157] ? ip6_frag_next+0xb20/0xb20 [ 2440.312392][ T2157] ? lock_downgrade+0x920/0x920 18:04:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xa00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2440.317259][ T2157] ? rcu_read_lock_held+0x9c/0xb0 [ 2440.322480][ T2157] ? __kasan_check_read+0x11/0x20 [ 2440.327539][ T2157] __ip6_finish_output+0x444/0xaa0 [ 2440.332673][ T2157] ? __ip6_finish_output+0x444/0xaa0 [ 2440.337984][ T2157] ip6_finish_output+0x38/0x1f0 [ 2440.342850][ T2157] ip6_output+0x25e/0x880 [ 2440.342867][ T2157] ? rawv6_sendmsg+0x2951/0x3900 [ 2440.342891][ T2157] ? ip6_finish_output+0x1f0/0x1f0 [ 2440.352149][ T2157] ? __ip6_finish_output+0xaa0/0xaa0 [ 2440.352171][ T2157] ? __kasan_check_read+0x11/0x20 [ 2440.352196][ T2157] rawv6_sendmsg+0x20f6/0x3900 [ 2440.352218][ T2157] ? mark_lock+0xc2/0x1220 [ 2440.377182][ T2157] ? rawv6_bind+0x9a0/0x9a0 [ 2440.381705][ T2157] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2440.387670][ T2157] ? rawv6_rcv_skb+0x390/0x390 [ 2440.392458][ T2157] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2440.398734][ T2157] ? aa_label_sk_perm+0x91/0xf0 [ 2440.403603][ T2157] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2440.409254][ T2157] ? aa_sk_perm+0x346/0xaf0 18:04:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xe00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2440.415349][ T2157] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2440.421781][ T2157] ? aa_af_perm+0x2a0/0x2a0 [ 2440.426305][ T2157] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2440.431879][ T2157] inet_sendmsg+0x9e/0xe0 [ 2440.436228][ T2157] ? inet_sendmsg+0x9e/0xe0 [ 2440.440750][ T2157] ? inet_send_prepare+0x4e0/0x4e0 [ 2440.440766][ T2157] sock_sendmsg+0xd7/0x130 [ 2440.440788][ T2157] ____sys_sendmsg+0x753/0x880 [ 2440.455156][ T2157] ? kernel_sendmsg+0x50/0x50 [ 2440.455175][ T2157] ? __fget+0x35d/0x550 [ 2440.455192][ T2157] ? find_held_lock+0x35/0x130 [ 2440.455219][ T2157] ___sys_sendmsg+0x100/0x170 [ 2440.455240][ T2157] ? sendmsg_copy_msghdr+0x70/0x70 [ 2440.481981][ T2157] ? __kasan_check_read+0x11/0x20 [ 2440.487028][ T2157] ? __fget+0x37f/0x550 [ 2440.491215][ T2157] ? ksys_dup3+0x3e0/0x3e0 [ 2440.495665][ T2157] ? __fdget+0x1b/0x20 [ 2440.499763][ T2157] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2440.506035][ T2157] __sys_sendmsg+0x105/0x1d0 [ 2440.510654][ T2157] ? __sys_sendmsg_sock+0xc0/0xc0 18:04:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1100, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2440.515712][ T2157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2440.521221][ T2157] ? do_syscall_64+0x26/0x790 [ 2440.525915][ T2157] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2440.532003][ T2157] ? do_syscall_64+0x26/0x790 [ 2440.536706][ T2157] __x64_sys_sendmsg+0x78/0xb0 [ 2440.541496][ T2157] do_syscall_64+0xfa/0x790 [ 2440.552824][ T2157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2440.552837][ T2157] RIP: 0033:0x45a919 [ 2440.552852][ T2157] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2440.552866][ T2157] RSP: 002b:00007f1a5a077c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2440.582264][ T2157] RAX: ffffffffffffffda RBX: 00007f1a5a077c90 RCX: 000000000045a919 [ 2440.582274][ T2157] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2440.582281][ T2157] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2440.582289][ T2157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a0786d4 [ 2440.582299][ T2157] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3004, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfc, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:27 executing program 2 (fault-call:5 fault-nth:6): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:27 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0xa, 0x0) sendmsg$kcm(r1, &(0x7f0000002a80)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x3, 0x2, 0x61b2b077d0800eca, 0xeb, 0x7, "81629298d3ad1c42ac53a2e37bff488aee96fedba768be928fa7b40ed6fa6e9192b472a4a403b9aa707dfec96393f36ca528d0021177c6ac391c36e020535e", 0x16}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="7248f87482d4591b6daed374b8ff55e909bb867e3f16fa7f6f3c8643e242a8a2bc70e52f4f19c14cdd566451d7f99282c45051a295c2da03c6ad18ad328117b958f5d0aa1a75c04cb07c65ccf143f496fa58bd2f4188519adfd0eb24", 0x5c}, {&(0x7f00000002c0)="b043e6a6ca558a263356b42e218133ab9b688e761e297a278312e7fa42fbe0c499e039e6615c6b9311282a8445c79c12120b196c946d6ad195e9b7971cae4396432c52ccfa63b23bf0462e6967c213f1141c73890c60763f3b3be129f11647dc961aaf3b7d10c68ab0f1a79d0b732553cbcd5dc032faef80258cd55e906efb4152bc22f62a215f602c70bf1fa76b510f7449b2953f6b610d62e3b36032715259ded8a001ce1a94279cdedf24c2c5f4b155f5e23461f21b28304107fdf3d8b53dc1a2843d068e51c96ff830fa933ec272", 0xd0}, {&(0x7f00000003c0)="104b627b34c07058cb151fe37fb64da25127f8ae3609639d8676aeb70ae58a994ccbfdcb969927e72fd62f027b1fa9b46a275367", 0x34}, {&(0x7f0000000440)="cf72a4ac8bb75016acf0f97cea5b4c1a929b9a0f805ffd7d5cd0f17fe529c2c0763a5388c520a46da90c0a542a2dd90888dfda68ce8a3cf18df5490ad0b5e4e4c1350a04d46e2d9e8fae6532c4ca3f3374133a1dd6a12656b500ee088b766bf7b54bf7c986a79eac42131dd0f62b92c1dcc94d77", 0x74}, {&(0x7f00000004c0)="cb0ad5e05f0179108d795af78841984bca65856d1d7b0f57927013129e5b34bf7ba9170df6caed0b084b2d14724f5d168e28226460b368d4b8218b7764a86fb09e80d0cb60cdc290eed396a4a7e68c382f3417f17932f5cc28a3a17791082606b472d9381c648cab871d92e74c", 0x6d}, {&(0x7f0000000540)="141a182f82262a220320f062a71b147c2e820ecfa056e70447fa5ce7d684eb85da3032aa3e4de65b35fb1255e7552d74c1fbdb3f133d3738a37ee47393a103244dceff65b459e8ef6fd9246dd49f7e789a3e54267f1576de556d54d11d5c648595aebc37d25b6b94b4d0e67670d584b113445904ef59f720f36296956dc97209b5ccd42a68300f8953f2f747d88d2087d893a37089640753bd452291ea89978987389f434a319763c72596093a1e85c49e975fe91f596b5585fbd7d6258f6f503305b57884360628ec323d435b4fe577c5ca", 0xd2}, {&(0x7f0000000640)="eb635a7c552dff9db8743c0e5fb2cabbe1f34e664c6404a0e939485b255f3950da5f658c474b0cc9a17c70b849b1459a29c7705fe74f043aa5dddc7316e932c4a9c3090227e3b6565971095e62e400eac886280b45ee349c14468e0a1737c0fb07bcdf8c2f8e5118591533a8d1473eba48fea7916e940357125850c69ff6f713ea634c8cf64fd325de850911e60951f216ae9dc5844484d4997b0e3a00d6109ebf54df632675930127259b5e033ed6ef4ba611b38ffca515ccc6ef6685be530f92f2cfff8d45800cf8328d30e49df89ab63d0fdc9d1f8a6074c689177d81a913ff157c25fd2f9adda94c23544cfc92ade9999fca9935f5adc7b6c60633f3be04faa2fedd382a06ca02ee92b9d9e87628567d243746a2a5841b264047e33f12cc34f180c8c043ec45393504aee1937db46031f1d6a05ae968fd60f819d057a7108735d0bb8cfcc25397bc6c04957a49e52d7e7b2a8e9f475ec60a108a2f2e45cdad5974fca1e9961b294c76c22109b0f3f1d4e5832da720593f5fc9a5820a63a347f486c52356e0035be56c6bdece781e3d0d666c7d59f7ee395ab48c1fb5a9a8d91af698216b1a09bf1e563e6caa155d851a8adb767c5ce82f9ce6963a4252142684499097038f4718f114be65ea72adf78262a923fa19208b70cccc840b1d0e1094937d316e3de7c4fa5c37d4b454047e94ca4c0c749f6f625b6068ad50ececa50a8d01612ea3bf1fd16b93da5e5cee1383f5f0d5800294ea8ac6255d4971da30a93a6a59d78d2e1ca5ad78e62789436398b9a55eca7e0bcafdd49b0ecab2d620b6b7edae768079d84e94fdce48dcdd17b02102f9d05711380f8237aac7a5344987fad0588e3d00d203186f3cfae926c1fbbfc160a68a805471a79b215a5a8a5356612dcf3a70c1d5af171357c8a48d6bb8536e14279086e038588254119221e147108e4f33b0506043b9177020a0722e02253b8756082f4f4e286d752da61c1a65a7b96ac794b6fe6245b8de78fd9a13ce15b7249b5aa29f69b7b3b45cfd5d10430f59f9f620f8a69582b3d6d6fd33bcae5a17c2b542d763d3345c0de45313595ef7f0c29f76c795fdb964a6843f3792b6bd1cfe064470860f38f0512d6deee1e3838335568cfac678baaac356e327184086d78ae43701f5a5bc2af9903a8958dfbdb6d5f9a72757ee522098a0789c6fc0815023a323472f9e54c8f08c4dd77f158e5a2cff9a5affcac95b1f20f0fbb26ebe4073fd135926124afcae4fc61d1741c480044debc3b55820882e9e0fbabc452c0188b8a26d22cdc8e86bfed82bc23b73e06ad67a28424d3dedfd9ef7bf9f5c719e2e9792765a70cde845b5ed4dcca3fec7251d71317bc5104a77262197f100e9d4608a20d315c708c7c2411c458f9a93390e059eb6870cd496812c7b3b6a77b08db3f0e559525a21a268807ed74eb3467b83dcbf02f6b912a1072342d82ee33a6d6d1f87a5637b94f3a7f89866bbdb4655208e4e5c619acd9edbc4db6471448da67d4f76186b92443fb6e064f3bcabbeb745c8ccfcfc52dd90de4e95b91e222cc92a75690982b856ff71848c1da6fcc2e27ec66242199b312e264c7b605b750663da2f9385e5c5f027a590fb21a5ecd81818002c2ffed38a312338922ab6d1e7234a8358b6c089f42e53e1752f717332da7708327abbb6ca963047dcefdce43e6cb1c2e8b338c484e7b5a3d340469a2dca2d6b98657973df0ae22edcaf498b645f6daf9dc6a3236132a4d1b174ee522eb80ed14bf6822ddb5f9066ce87fde308a7609e8c7fefe08f28a7144e5c827b0500c16340459c0b7291c209f2acd974eecdd28c0b0f501f2787cfae405d3ed59da43501d58608a833726ca493ac34d1936bf07b30eec6194e82fbd922eba8809e869d9d471caded461a15b31421a216c3806d889f2fcf31afeb753161ee181513ef69a13cfe063c1cfd84b1bb1fd36419c0e9c336e852518c835c933b5d44def83cb967295afd9f70b47d88b813622bc363fd500221d5bbfd84c25ec2eb0a7488bd1df2aab0a513aa8ccfcc7ee4f0f2c3567e9a4f6218107ebb237d1e5c056a3e6a6c4c1de77e0120a308a69e85ae05daa0c740c4be78c4708e59a94cf4f00e0c69ac5972531fc4ac90d1b38c6dba1a53b671b03e6ec44a16465e699291c271c4737edbc6cecc2cce8dc79fd3eeb8f419349853da9bb56af4b847b056be50d83c14eb43be87d461699eaef145315d27aafe2e56d4eb4d1170f6b488ea2346c80aa1708f32b8fb9aafcfae76148c62580d517682f79a77ce8faf9a948b63d4e892465d2c8a95e9e1d3b60eb70a90d15383800ef146a07a9a2fc3f61c1877fa1ab9394e371f978320ef674837f8aca1d185758b308095ed41df2695e17c75be20e3092bc94dff73b34cdbd35718e00e373eb33286fb2d68fb121c105ce925e1b2d5421ce1dd69fd4a3fa4089fde79d10bce1999ffd102ad6e28c53403c84471871df3a1f370c39203f694c7ecd302c5d83156ec041033dc14f2007247e3fde1ecf5cbbea32bfa248fe1468d3a596e7500de7536668efe93511483309adf1a88e5be479f30b8540e9574d6e6235f9f4ab537a9c3880a62ab36940d6f5f6533848bdfb8cf7a4c57192970015c820fe8064e706a40fc0f21998ac357e4fdd297076859cfb4b7c794a5e96052b88d4164d7c3b664d3683bdbb51169a3644e1448656ef7b882e3774f49ae0d9b688ac84d488d85aab47f26e5b0d1a2eb406a23a02d40572213d34c2d82335cf5daa9031e8b81a05091cbf91c30229ec10d344531f62226a7546f84026985f997cecc7bbd89fa72be0553ca30ba8acd9b3844fc2257c9488880c359cfa21d22a64eed172a6f35ea1b43a414457e8f87b8f38ad8de764d954e4897b5b54687a0c2ccf12bd3f0a54274650e05430aa34a04c4ab975ed8b36b4ac2534e0c00b4f51c2acf1f8e206386868764ef31187f24cd80331750ae561fe30336dc292657c766c1fccd1f4ed84251690ee811a12f6fcf6aef14d259cac2ee4607cbdb4e67178af6b8eb8b8c219cf1228f527dfe9aa1a8020e4c913d13d8a1a892f0103d1eaf1894aa80726f0f6c260f56cfc560baa4c12452ad0f15522ff639e638218060a1516155f786f93b91cda40b6dc3fc12e2f789650dd8071ec8fd7c1c61e3fe04d9ad7917c5178479a334989a10ff9d9948efb4e64475d74333c1f625eb4d50aaf116d331f09df3dc3fd3b8005847118244b887cb62d54a533f16e490a388f8cb6b5a100c6ae615b400c7d444c51db159a3b11eb5160c86c5e85f554377038e4a4852a3a325686aa6cc054a9456fb7b297a2a20f21391163e562879f72781340f13ebb95336dd28dfad0ce81469b93d195739ada5faaf0c43a300f494080da08376fd0ac35d89d23740f855d4055f2d62eb4725d6d373714b693c21dbe36113727088cb62ae964674bd9b2ab2f59c46d12c1f78f9de05fe4fc83ca05cade8eed0bb0144343ab35d85bd6ff24808d1ac44b8854f33ecffee520a46856b9f13ad5d659a84cacae49bbd829c66b7f816f468a73efb8d5f2a867c32251810e959adaa35b07a7d338c035cede8401c0b9c1ff3953280f7d21ede4bfe53a6052edb7a6d771f628beaee57eaa3d1e1deadd4ab978c798f553d61093b5c553759472ea2abf0717e9a72a006f983eeb22073328d5ce68096a0c67c31b22e4dc8a463f9199ecfc817371d83c701599acc8e3da511bcc707769132ad2abe2ef6a39dcab040dedb232bd878ea544fb8090efad813b0ea873ba8a122363d3e82024ca3e10613227f16164464f3d6f7d1f0a0100cfce0373ff0bbe3b25ced6557c1d206dc1bf30e37ee1b45192cdd40a0314a896d4f185e9f26f05806947e20740376be245638c3ceae3e3abf79218b432dd5d7e99dad4e0568a9d05b07f8735f2b2e57c73534a4803be97c00cf39f3a2427ce8d54913516c5903278c49df335227cf783e8cfcc045f687777dcb5a6f19a35e13c82aee5c6501856f63f10d1fe81fed42c1acd885440590546dc2dbac70f5ef4758e5c8eb9aa458c2104ae43aba7a139d6dc4dc7f72b9b1873eba597186e74d21eb747c5e5657937a0d67d606173e2b6f1736707c17d713e07847622b86033a69ba7b0ae490fad941e5ffb03caf0d4d86fe665ef83d2bdecd098ddd0943cd96a39f5d2f8d4ca0082ad67a312d204ae8c791400bf423f944f2c0db3c9a713fd53bbf1a354b47e59316f42670814195c653960dd28e5ba9ea4ee1d9ccbe19c9d87c1e51b9240bf38411ad30c48ac76508b839fc0f1ed7d0ca5867a27cb50f8add23f30e0661c3f835c781fe1e012f439e2ad0c41acf52b08d3edbeace9da2456fd74aead0b446942a74766c1e65b69e0ffe26768754f6e9cb4f53ffaf90bc4ed6e558b5157fc43f93f07ff33f0ed28805d9a00690fd9c15218b4f13a7d123fb961f398db872b1f2b184a61c0558c42cec7cfd65e1f37db8e27e69645279d7f91cd843c2cdfdf5a72d50428283be80bd5d82985d27fa560e944ce2ecf8342a612dc1b88cc34479d4cca44a3b3f0c570c71f99db8fbff5664d725ad9d7b8bc7ecd8256ca2fcd3fb998b769feb996a9015dda0ec00f9106f72be0c004976288b4f8f9f6746f75ac9044b0c841e174fc1656dba833174383a2238e9058428957a677515b41a344f0f92b47db55408d477e190ba3fe61c3e4fdf3e4ff35e3fbf3379cc0b79e922baf5420893d3590a43a11904942e82ae9f6384cee9ed97f762928b76f89bd4c48dbca0ba27574c720ebbeba59d1b8d5996bbadbc94bfb8e7e1504f70db23b457fc57a03cadd42e47f9f8f374d5ab364dfd69396a2e4f018b1efb2340b5a6ecc246f50227456f76843a98c53bde851c48110386fc9b131d2ff3b37004b6676049c19faed1a496c727b2ae3eff9b85950b35fe2b5c0a5ea4adc6f3a42e5d6e19165156eadee48d83a393c9f25bef5bdd1f13ab0e7a03be01171f6ecb7e971cf6e4890b49b4a30bb1862535d8d68e06c53e3586a8d2559962285a1c58090c17b2bfc0d9424c0e6336b148df622e0755c00e574953847559f1ee7a144d1d50d475326323e3f5337563e08054facd62184c787e64df90ea6d9f17230c799522e6e7a6ba92e7967c1ab121bec79b44aff4abf29b5d87f822cad3028298990f98ab21ef1d8ef0743d92deba1625ee7941a03d84aaade4de1797a3cbea3f68cbbebf7bea949194ade09a6e6641bd0a21672b2e40b930c0527b441f0640896fab94939a9b0c5197767b8f522b017cb94aa5bcf75de5d6c13a20b83d984bae455e38283d08bd28afaf032664fc71f2df202bc34f0d940a38684849e0fd7a8ce6cb9fb228db15bad85fbc8641bf98ddcb4d16f543f13a979f95979003e6b186639a8f1ac909b80a524d1c90d96e7f678d52a6c413b21625b068faabdfc27935b8889baa52930af1d4ca2361f25c7f90f1ed0a50ce86a2d6e1eff67deb8b6bd0e49a34a810a64282afec150884eed8897a3418545a20e1dccbd09b0142479c253db0f9c929fb012e1204ad76d3a7796429534f7fc8603efdcd3f679cd29eee90f1f9f32bc3f87aedb578b170a2e66c0344fcf9416d1a4e18607e9a7891d0f9cd3402bd3befbbfc59ebe8aac8b72dc22c2e0dc622ed3057b90d2b363476347b50ed956d5a14f4b485136f0f4fff37913e231a0a6f763b71f692ddfe04b283f7953394c71785960296327ed8becd1a9540c8c451bbfa3ade9bb67473d9b5357309e281b5773f0590e969442c5eb7", 0x1000}, {&(0x7f0000001640)="86ff1f2426ff07e3665cabc03e9f622495ebc0bfdb6508000395f67e4f728b6c90a8e479c9663e196bd889257912ca4a0f890900345791eb8b85faa80311c144a672a1f9e7462dea5404867731df0a3192864bcb141bf92329da34d2b28b27ff534406bad8804455b3885e9f654dbcc6827928c4b12b8322f201b5cb7c52f2e95d53123fa3415c5a7ea0e55188c5f3e69966e2e1e827ad35afdc984c9a50989412e3f7692d8b1984520db37eca3ac65b3bc7b8e8110bbf472d4abe15ee8c5969ca2f36abdebea199642a07b21be977f909e1da855a0acc05a373786d6af44001b79ac0f6573ec7c2e9adc3f7c50ea4", 0xef}, {&(0x7f0000001740)="58eb57068b76123203c505b6b22d53873dadd424dc522389fc6af70264da4ebe275d2ce327b69269830fbdb0924245c0ae10cc6f6f41694cded67bcafe7237305b0c54de211778285ecbe511ef9598267e4cf16fef30812315fe8eb497", 0x5d}], 0xa, &(0x7f0000001880)=[{0x70, 0x104, 0x1, "e6b0469883384b5f7d2a40aa8c248613942cc0df87efef594de2711820d7e950fce5deadb48ccaf64a54026511e97ea057e822d78391fc23e5e5c30b4694a96a3f614f6d1bb2bb3c02c90479064adddb933675d6450cad20642fba2c88ff8486"}, {0xa0, 0x84, 0x10001, "8695e790b3dd1c4a63bd5af9a359ac5711169ba99987edbbf6022347a0a8232d833eec093e64c1740474d6b0b25498b3ab93757a25873ad211b17f451caec098a1496679fa80079fc3c0e251a289aaefc132d8fca2884188f4582e9d999ed9ba94916d3592b445c6d70cd833a7ce06a1c0410aacf1110ac73688ec5547337ad88bec021300581ad2174e9dbd51"}, {0x1010, 0x10d, 0x1f, "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"}, {0xfffffffffffffee5, 0x332, 0x3, "f1a65d14c325027b16ee8caa1c1ec341f894558263ba46bf4cabdc6469a2f689b587939afb93379a7ae283aab0a961b6b1477c6afa60f460f49b8dc87aed2382d1e61ff490ba38705688f831c9c983f67c974a1f706205e80240f739bb49f876942d2969378da55d564c5206cee8977b4e451252f942592f4b4eac8c45c61f471607f72dd0b40d51483d904e8da5a3c9b00c71bedc7d34920ce531c1b82860de7a60c3693f7ef244f9dad9813ade83000065"}], 0x11e8}, 0x480) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x63edfb0f975e37d2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x28, &(0x7f0000000100)}, 0x5) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) r6 = perf_event_open(&(0x7f0000002bc0)={0x1, 0x70, 0x9, 0x3, 0x40, 0x3f, 0x0, 0x57, 0x800, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x8, @perf_config_ext={0x8, 0x8f9}, 0x2900, 0x4, 0xf6b7, 0x0, 0xffffffff00000000, 0x4, 0x2}, 0x0, 0x2, r4, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x5) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000002ac0)=ANY=[@ANYBLOB="000486dd07d5ff49e65a051310f789dda94e5bba4f255ff5568108d371ae64a7ab9a7bb597b77b7fb8267b576081e597344e8b2dbdde507002fef00b17bdf9a0a3f647718d3673e27f3a3bccf86d4fd33a8380cd3cb9d4f32fa09cdbcf2096c1b5bba97cb5ec8e6845f21e0ff8be944b3699de45afc73fe8978f79f59a9260b2c2074143ed50b51d4ff0d4ae233c5871c627a2c2491bb86c2a99c237b0466a06e63182ffc856e2fbc79c701292768e5bd17093d4f246743d96dae287541fb62e4ce479"], 0x90ad) 18:04:27 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x90ad) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) [ 2441.215088][ T2208] FAULT_INJECTION: forcing a failure. [ 2441.215088][ T2208] name failslab, interval 1, probability 0, space 0, times 0 [ 2441.227805][ T2208] CPU: 0 PID: 2208 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 2441.236399][ T2208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2441.246462][ T2208] Call Trace: [ 2441.249767][ T2208] dump_stack+0x197/0x210 [ 2441.254815][ T2208] should_fail.cold+0xa/0x15 [ 2441.259442][ T2208] ? fault_create_debugfs_attr+0x180/0x180 [ 2441.265273][ T2208] ? __kasan_check_read+0x11/0x20 [ 2441.270325][ T2208] __should_failslab+0x121/0x190 [ 2441.275282][ T2208] should_failslab+0x9/0x14 [ 2441.279802][ T2208] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2441.285541][ T2208] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2441.291532][ T2208] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2441.291556][ T2208] __kmalloc_node_track_caller+0x3d/0x70 [ 2441.303077][ T2208] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2441.308479][ T2208] __alloc_skb+0x10b/0x5e0 [ 2441.312915][ T2208] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2441.318498][ T2208] ? __lock_acquire+0x8a0/0x4a00 [ 2441.323445][ T2208] ? rcu_read_lock_held_common+0x130/0x130 [ 2441.329271][ T2208] alloc_skb_with_frags+0x93/0x590 [ 2441.334392][ T2208] ? mark_lock+0xc2/0x1220 [ 2441.338830][ T2208] ? find_held_lock+0x35/0x130 [ 2441.343617][ T2208] sock_alloc_send_pskb+0x7ad/0x920 [ 2441.349442][ T2208] ? sock_wmalloc+0x120/0x120 [ 2441.354131][ T2208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2441.354148][ T2208] ? xfrm_lookup_with_ifid+0x602/0x2390 [ 2441.354161][ T2208] ? ip6_mtu+0x2e6/0x450 [ 2441.354175][ T2208] ? find_held_lock+0x35/0x130 [ 2441.354196][ T2208] sock_alloc_send_skb+0x32/0x40 [ 2441.354214][ T2208] __ip6_append_data.isra.0+0x1e94/0x3b60 [ 2441.354235][ T2208] ? rawv6_exit+0x20/0x20 [ 2441.389995][ T2208] ? ip6_flush_pending_frames+0xd0/0xd0 [ 2441.395564][ T2208] ? ip6_fraglist_init+0x8a0/0x8a0 [ 2441.400706][ T2208] ip6_append_data+0x1ec/0x330 [ 2441.405478][ T2208] ? rawv6_exit+0x20/0x20 [ 2441.410521][ T2208] ? rawv6_exit+0x20/0x20 [ 2441.414864][ T2208] icmp6_send+0x1505/0x1f90 [ 2441.419377][ T2208] ? icmpv6_push_pending_frames+0x540/0x540 [ 2441.425290][ T2208] ? __lock_acquire+0x821/0x4a00 [ 2441.430261][ T2208] ? ip6_route_dev_notify+0x1a0/0x7c0 [ 2441.435674][ T2208] ? icmpv6_push_pending_frames+0x540/0x540 [ 2441.441586][ T2208] ? rcu_read_lock_held+0x9c/0xb0 [ 2441.446638][ T2208] ? rcu_read_lock_held_common+0x130/0x130 [ 2441.452477][ T2208] ? icmpv6_push_pending_frames+0x540/0x540 [ 2441.458393][ T2208] icmpv6_send+0xec/0x220 [ 2441.462825][ T2208] ? icmpv6_send+0xec/0x220 [ 2441.467344][ T2208] ip6_link_failure+0x2b/0x530 [ 2441.472135][ T2208] ? inet6_rtm_getroute+0x1460/0x1460 [ 2441.477540][ T2208] ip6_tnl_xmit+0x455/0x3430 [ 2441.482251][ T2208] ? ip6ip6_err+0x540/0x540 [ 2441.486773][ T2208] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2441.486792][ T2208] ? map_id_range_down+0x1ee/0x370 [ 2441.486809][ T2208] ? __put_user_ns+0x70/0x70 [ 2441.486828][ T2208] ? ipv6_ext_hdr+0x7e/0x90 [ 2441.506809][ T2208] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2441.513065][ T2208] ? ip6_tnl_parse_tlv_enc_lim+0x349/0x5e0 [ 2441.518897][ T2208] ip6_tnl_start_xmit+0x84d/0x1ca0 [ 2441.524024][ T2208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2441.524041][ T2208] ? ip6_tnl_start_xmit+0x84d/0x1ca0 [ 2441.524065][ T2208] ? ip6_tnl_xmit+0x3430/0x3430 [ 2441.524091][ T2208] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2441.546061][ T2208] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2441.546091][ T2208] dev_hard_start_xmit+0x1a3/0x9b0 [ 2441.546113][ T2208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2441.546138][ T2208] __dev_queue_xmit+0x2b05/0x35c0 [ 2441.568581][ T2208] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2441.573897][ T2208] ? mark_held_locks+0xf0/0xf0 [ 2441.578677][ T2208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2441.578697][ T2208] ? debug_smp_processor_id+0x33/0x18a [ 2441.578717][ T2208] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2441.578733][ T2208] ? rcu_read_lock_held_common+0xbd/0x130 [ 2441.578756][ T2208] dev_queue_xmit+0x18/0x20 [ 2441.606884][ T2208] ? dev_queue_xmit+0x18/0x20 [ 2441.611587][ T2208] neigh_direct_output+0x16/0x20 [ 2441.616554][ T2208] ip6_finish_output2+0x109a/0x25c0 [ 2441.621871][ T2208] ? ip6_frag_next+0xb20/0xb20 [ 2441.626651][ T2208] ? lock_downgrade+0x920/0x920 [ 2441.633015][ T2208] ? rcu_read_lock_held+0x9c/0xb0 [ 2441.638060][ T2208] ? __kasan_check_read+0x11/0x20 [ 2441.643097][ T2208] __ip6_finish_output+0x444/0xaa0 [ 2441.643111][ T2208] ? __ip6_finish_output+0x444/0xaa0 [ 2441.643129][ T2208] ip6_finish_output+0x38/0x1f0 [ 2441.643145][ T2208] ip6_output+0x25e/0x880 [ 2441.643161][ T2208] ? rawv6_sendmsg+0x2951/0x3900 [ 2441.643180][ T2208] ? ip6_finish_output+0x1f0/0x1f0 [ 2441.658487][ T2208] ? __ip6_finish_output+0xaa0/0xaa0 [ 2441.658509][ T2208] ? __kasan_check_read+0x11/0x20 [ 2441.658534][ T2208] rawv6_sendmsg+0x20f6/0x3900 [ 2441.658548][ T2208] ? mark_lock+0xc2/0x1220 [ 2441.658573][ T2208] ? rawv6_bind+0x9a0/0x9a0 [ 2441.658595][ T2208] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2441.678236][ T2208] ? rawv6_rcv_skb+0x390/0x390 [ 2441.678258][ T2208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2441.678273][ T2208] ? aa_label_sk_perm+0x91/0xf0 [ 2441.678295][ T2208] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2441.707798][ T2208] ? aa_sk_perm+0x346/0xaf0 [ 2441.729004][ T2208] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 2441.735555][ T2208] ? aa_af_perm+0x2a0/0x2a0 [ 2441.740093][ T2208] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2441.740121][ T2208] inet_sendmsg+0x9e/0xe0 [ 2441.740138][ T2208] ? inet_sendmsg+0x9e/0xe0 [ 2441.740156][ T2208] ? inet_send_prepare+0x4e0/0x4e0 [ 2441.740170][ T2208] sock_sendmsg+0xd7/0x130 18:04:27 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0006c6dd07"], 0x90ad) 18:04:27 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x300, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3804, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:28 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x430, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3f00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2441.740185][ T2208] ____sys_sendmsg+0x753/0x880 [ 2441.740202][ T2208] ? kernel_sendmsg+0x50/0x50 [ 2441.740217][ T2208] ? __fget+0x35d/0x550 [ 2441.740233][ T2208] ? find_held_lock+0x35/0x130 [ 2441.740258][ T2208] ___sys_sendmsg+0x100/0x170 [ 2441.740277][ T2208] ? sendmsg_copy_msghdr+0x70/0x70 [ 2441.740297][ T2208] ? __kasan_check_read+0x11/0x20 [ 2441.754659][ T2208] ? __fget+0x37f/0x550 [ 2441.754684][ T2208] ? ksys_dup3+0x3e0/0x3e0 [ 2441.754716][ T2208] ? __fdget+0x1b/0x20 [ 2441.754732][ T2208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2441.754753][ T2208] __sys_sendmsg+0x105/0x1d0 [ 2441.797510][ T2208] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2441.797545][ T2208] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2441.797563][ T2208] ? do_syscall_64+0x26/0x790 [ 2441.797588][ T2208] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2441.826020][ T2208] ? do_syscall_64+0x26/0x790 [ 2441.826046][ T2208] __x64_sys_sendmsg+0x78/0xb0 [ 2441.826067][ T2208] do_syscall_64+0xfa/0x790 [ 2441.826091][ T2208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2441.826108][ T2208] RIP: 0033:0x45a919 [ 2441.868037][ T2208] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2441.887653][ T2208] RSP: 002b:00007f1a5a077c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2441.896084][ T2208] RAX: ffffffffffffffda RBX: 00007f1a5a077c90 RCX: 000000000045a919 [ 2441.904082][ T2208] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 18:04:28 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x438, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2441.904092][ T2208] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2441.904103][ T2208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a5a0786d4 [ 2441.904112][ T2208] R13: 00000000004c99ab R14: 00000000004e1850 R15: 0000000000000004 18:04:28 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x460, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:28 executing program 2 (fault-call:5 fault-nth:7): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x4000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f00000001c0), &(0x7f0000000300)="d58a6707734f607e0e30d781d8c9fff8b083c4142f2980ce906fa54a0cc820aedd353a3028f4bbd29e04508f8dd1c2f0226f44a8f881c4067419c2ebe1a84aaf2ee7a5e2e49ecfe1439930f842f73a9307b283163128d8c7e6830a18ca3092652bb04365c369a42e57bc1b36219af585f85d7a6f7cc66e09103d127c38871c465b74c72f0ab75e6fc8fe88d451a53db3335470f0c4c76a0cb6d0f8153df6fe0551825d89e06b927c062d447cffb416eecb002fa4694f949d430c94cf5d0a2f4775b40933795474c5dd0c0b0eafbcf7ed2ee3f78c451246e177bc1a1596bcdc", 0x1}, 0x20) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x7, 0x0, 0x6b, 0x0, 0x7, 0x530, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7fff, 0x4, @perf_config_ext={0x5ee6, 0x5}, 0x50008, 0x6, 0x1, 0x6, 0x7, 0x9, 0xb57}, r1, 0x8, r2, 0x1) 18:04:29 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x600000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x40106614, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000040)) r4 = openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x10) write$cgroup_pid(r4, &(0x7f0000000280)=r5, 0x12) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r5, 0x12) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[], 0x0) 18:04:29 executing program 4: socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:04:29 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x500, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6004, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000486dd0764079b1a82a8ff8397b1d0264cbe28c1c51dfca75ab502223717847af654628b19920f63b3f30a5c615703766da3132d37edf75e48469a498afd8942dc50f3d1407bcef8225561473cfbb32946c52309a4986d785cd475effb3b717b84ac038c910219503e9673a7f65cf4dfbe0076cab5d65898f39c2c1bc48aeb73ca22d40b38277fdc9b8264faeaef2f2f0046dc1592f80ca59b152e149680a2440e8df96a3c9f8ff5f5cd5608173914fb3b43667d509fb8baa6ff12be57f7d1974903685b4e557f3bfe"], 0x90ad) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f00000000c0)=0x1) 18:04:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x5ac, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 4: socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:04:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x2, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(r1, &(0x7f0000000240)='\xae\x9f\xe1\xbal\xba!r\xc2\xdc\xc0\xc3', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r5, 0xffffffffffffff11, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:29 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dD\x1c\x00\x00\x00\x00\x19\x00', 0x8200, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x80fe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x600, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 4: socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:04:29 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xac05, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:29 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x700, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0xb47, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x6, 0x1}, 0x0, 0x0, &(0x7f0000000380)={0x5, 0xc, 0x7fff, 0xfffffffe}, &(0x7f00000003c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)}}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x70, 0x4, 0x3, 0x0, 0x3, 0x0, 0x1, 0x10101, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x101, 0x6, @perf_bp={&(0x7f0000000100), 0x4}, 0x4000, 0x3, 0x8fc0, 0x2, 0x7, 0x1, 0xf63c}, r0, 0x8, 0xffffffffffffffff, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'ip6erspan0\x00', 0x1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:30 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x4, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xc0fe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 18:04:30 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="160000000053"], 0x90ad) 18:04:30 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x5, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x900, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'memory'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'io'}, {0x2b, 'pids'}]}, 0x1d) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r4 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x2, 0x6, 0x5, 0xff, 0x0, 0x1, 0x1, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x5, @perf_bp={&(0x7f0000000000), 0x9}, 0x8000, 0x3, 0x13e, 0xbf3918c062594ee4, 0xa2, 0x8, 0x7}, 0x0, 0x7, r0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xb98d) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x7f) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r5, 0x13}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r8 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.stet\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) r10 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) 18:04:30 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 18:04:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfc00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xa00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/291], 0x90ad) 18:04:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfe80, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xe00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:30 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x7, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syz_tun\x00', 0x1000}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="00080000006316c6594772eeb6bce1d05dff713984fa524d177f27ec6f149ef97055299d5a19404dc9b165f5557fb9987beb1be542d4290c97b2e9333f7239631a9ed9a9f40fedd39333975e000272"], 0x90ad) 18:04:31 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 18:04:31 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) 18:04:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfec0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x8, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1100, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r4, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r7 = socket$kcm(0x2, 0x1, 0x84) close(r7) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r8, 0xb) setsockopt$sock_attach_bpf(r7, 0x10d, 0xb, &(0x7f0000000000)=r8, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r8, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r10 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r11, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) close(r10) r12 = socket$kcm(0xa, 0x6, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r12, 0x10d, 0xb, &(0x7f0000000000)=r13, 0xb) setsockopt$sock_attach_bpf(r10, 0x10d, 0xb, &(0x7f0000000000)=r13, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000080000000000000045fa00001800000020000000000000000700000003210376b41b4990b900ffffff7f08635000fcffffff9500000000000000"], &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r5, 0x19, r6, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r9, r13}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r9}, 0x78) 18:04:31 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x9, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1200, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xff00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x7, 0x8}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r4, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r7 = socket$kcm(0x2, 0x1, 0x84) close(r7) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r8, 0xb) setsockopt$sock_attach_bpf(r7, 0x10d, 0xb, &(0x7f0000000000)=r8, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r8, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r10 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r11, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) close(r10) r12 = socket$kcm(0xa, 0x6, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r12, 0x10d, 0xb, &(0x7f0000000000)=r13, 0xb) setsockopt$sock_attach_bpf(r10, 0x10d, 0xb, &(0x7f0000000000)=r13, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000080000000000000045fa00001800000020000000000000000700000003210376b41b4990b900ffffff7f08635000fcffffff9500000000000000"], &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r5, 0x19, r6, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r9, r13}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r9}, 0x78) 18:04:31 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3004, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x90ad) 18:04:31 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xa, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3804, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:31 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:31 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2445.320932][ T2453] FAULT_INJECTION: forcing a failure. [ 2445.320932][ T2453] name failslab, interval 1, probability 0, space 0, times 0 [ 2445.344028][ T2454] FAULT_INJECTION: forcing a failure. [ 2445.344028][ T2454] name failslab, interval 1, probability 0, space 0, times 0 [ 2445.388647][ T2453] CPU: 1 PID: 2453 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2445.397312][ T2453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2445.407391][ T2453] Call Trace: [ 2445.410702][ T2453] dump_stack+0x197/0x210 [ 2445.415042][ T2453] should_fail.cold+0xa/0x15 [ 2445.419656][ T2453] ? fault_create_debugfs_attr+0x180/0x180 [ 2445.425518][ T2453] ? ___might_sleep+0x163/0x2c0 [ 2445.431102][ T2453] __should_failslab+0x121/0x190 [ 2445.436060][ T2453] should_failslab+0x9/0x14 [ 2445.440580][ T2453] kmem_cache_alloc_trace+0x2d3/0x790 [ 2445.445999][ T2453] htab_map_alloc+0xe3/0x11c0 [ 2445.450697][ T2453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2445.450716][ T2453] ? htab_map_update_elem+0xca0/0xca0 [ 2445.450734][ T2453] __do_sys_bpf+0x478/0x3610 [ 2445.450753][ T2453] ? bpf_prog_load+0x1960/0x1960 [ 2445.450770][ T2453] ? __kasan_check_write+0x14/0x20 [ 2445.450787][ T2453] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2445.450804][ T2453] ? rcu_read_lock_bh_held+0xb0/0xb0 18:04:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x2, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:32 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:32 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3f00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2445.450822][ T2453] ? wait_for_completion+0x440/0x440 [ 2445.450850][ T2453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2445.462536][ T2453] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2445.462552][ T2453] ? do_syscall_64+0x26/0x790 [ 2445.462568][ T2453] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.462583][ T2453] ? do_syscall_64+0x26/0x790 [ 2445.462607][ T2453] __x64_sys_bpf+0x73/0xb0 [ 2445.488177][ T2453] do_syscall_64+0xfa/0x790 [ 2445.505217][ T2453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.520589][ T2453] RIP: 0033:0x45a919 [ 2445.520605][ T2453] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2445.520613][ T2453] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2445.520627][ T2453] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2445.520635][ T2453] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2445.520643][ T2453] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2445.520651][ T2453] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2445.520659][ T2453] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 2445.530750][ T2454] CPU: 1 PID: 2454 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2445.615848][ T2454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2445.626004][ T2454] Call Trace: [ 2445.629312][ T2454] dump_stack+0x197/0x210 [ 2445.633661][ T2454] should_fail.cold+0xa/0x15 [ 2445.638258][ T2454] ? fault_create_debugfs_attr+0x180/0x180 [ 2445.644083][ T2454] ? ___might_sleep+0x163/0x2c0 [ 2445.648966][ T2454] __should_failslab+0x121/0x190 [ 2445.653928][ T2454] should_failslab+0x9/0x14 [ 2445.658449][ T2454] kmem_cache_alloc_trace+0x2d3/0x790 [ 2445.663857][ T2454] htab_map_alloc+0xe3/0x11c0 [ 2445.668570][ T2454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2445.674839][ T2454] ? htab_map_update_elem+0xca0/0xca0 [ 2445.680238][ T2454] __do_sys_bpf+0x478/0x3610 [ 2445.684843][ T2454] ? bpf_prog_load+0x1960/0x1960 [ 2445.689793][ T2454] ? __kasan_check_write+0x14/0x20 [ 2445.694926][ T2454] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2445.700495][ T2454] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2445.705941][ T2454] ? wait_for_completion+0x440/0x440 [ 2445.711262][ T2454] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2445.717567][ T2454] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2445.723050][ T2454] ? do_syscall_64+0x26/0x790 [ 2445.727749][ T2454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.733829][ T2454] ? do_syscall_64+0x26/0x790 [ 2445.738532][ T2454] __x64_sys_bpf+0x73/0xb0 [ 2445.742976][ T2454] do_syscall_64+0xfa/0x790 [ 2445.747508][ T2454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.753414][ T2454] RIP: 0033:0x45a919 [ 2445.757316][ T2454] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2445.776937][ T2454] RSP: 002b:00007f61874a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:04:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:32 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x10, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:32 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x4000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2445.785369][ T2454] RAX: ffffffffffffffda RBX: 00007f61874a3c90 RCX: 000000000045a919 [ 2445.793543][ T2454] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2445.801624][ T2454] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2445.809624][ T2454] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61874a46d4 [ 2445.817612][ T2454] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:32 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)="40c74adc77a4e27d876f441d952bf111375896d876c5ed0f2e703cd5f8b64ff305946b507d0419c09fc1fe6c"}, 0xffffffffffffff47) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r3, 0x5, 0xda3582bd041c48e2}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r4, 0x4) r5 = socket$kcm(0x2b, 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x0, 0x4b, 0x91, &(0x7f00000001c0)="9e3805e99493b347485ebbc99acf34ab00f1eb3e9ad58fbbf15158a433035ec119860658594113c936330804eea2f828afb7e13ed1c9eb0edf33147d7e7e7d8f6ee946db41501c17307aed", &(0x7f00000002c0)=""/145, 0xcd7e, 0x0, 0xe1, 0x40, &(0x7f0000000440)="1465e5c6bc1e71d8321e77bc2940c9f2031dd1840691c1059ea398790058667b875450d9f2de8360f8aa3b909df95af0fc0077dbeebd6395fd5f4d290f5a09c7e4aa578ce28cf38b42de3a74f2cbaab81ad03ffcc9fe0ed52e520bc5a7af6d5de3bdde2cd422968b81571c541ae37b8ffd336ea337269f0a4b36b4367e63fe8a9a46380938effa681dbb67bda89053b14315ad9a00fb17da317072cb06535936aba3919b3904a14fa0491bffb9c51ffb46ccdf88975d6fe6d232e09e0d5908b01496d910b146a888c95146b0aa3cdfd86e0878604cf149554f4ab2f8759657af3d", &(0x7f0000000240)="18e847d9064b301ded23ad372905ff5c9d531a3ae7c30511565c4734e13838f516f8e091af7d55475ceb2c5d64974b983514e0565db0bfe1cd2c1977b0d57e47"}, 0x40) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x4001fe) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x0) 18:04:32 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:32 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x11, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:32 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x4, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:32 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2446.330335][ T2499] FAULT_INJECTION: forcing a failure. [ 2446.330335][ T2499] name failslab, interval 1, probability 0, space 0, times 0 [ 2446.369393][ T2502] FAULT_INJECTION: forcing a failure. [ 2446.369393][ T2502] name failslab, interval 1, probability 0, space 0, times 0 [ 2446.377240][ T2499] CPU: 0 PID: 2499 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2446.390760][ T2499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2446.400842][ T2499] Call Trace: [ 2446.404237][ T2499] dump_stack+0x197/0x210 [ 2446.408590][ T2499] should_fail.cold+0xa/0x15 [ 2446.413295][ T2499] ? fault_create_debugfs_attr+0x180/0x180 [ 2446.419137][ T2499] ? ___might_sleep+0x163/0x2c0 [ 2446.419160][ T2499] __should_failslab+0x121/0x190 [ 2446.419183][ T2499] should_failslab+0x9/0x14 [ 2446.433464][ T2499] kmem_cache_alloc_node_trace+0x274/0x750 [ 2446.439287][ T2499] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2446.444890][ T2499] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2446.450887][ T2499] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2446.450907][ T2499] __kmalloc_node+0x3d/0x70 [ 2446.450923][ T2499] __bpf_map_area_alloc+0xbd/0xf0 [ 2446.450944][ T2499] bpf_map_area_alloc+0x20/0x30 [ 2446.461270][ T2499] htab_map_alloc+0x589/0x11c0 [ 2446.461298][ T2499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2446.461315][ T2499] ? htab_map_update_elem+0xca0/0xca0 [ 2446.461332][ T2499] __do_sys_bpf+0x478/0x3610 [ 2446.461352][ T2499] ? bpf_prog_load+0x1960/0x1960 [ 2446.461366][ T2499] ? __kasan_check_write+0x14/0x20 [ 2446.461388][ T2499] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2446.476007][ T2499] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2446.476029][ T2499] ? wait_for_completion+0x440/0x440 [ 2446.487738][ T2499] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2446.487776][ T2499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2446.530468][ T2499] ? do_syscall_64+0x26/0x790 [ 2446.535174][ T2499] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2446.535190][ T2499] ? do_syscall_64+0x26/0x790 [ 2446.535215][ T2499] __x64_sys_bpf+0x73/0xb0 [ 2446.550381][ T2499] do_syscall_64+0xfa/0x790 [ 2446.554912][ T2499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2446.560828][ T2499] RIP: 0033:0x45a919 [ 2446.564743][ T2499] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2446.564753][ T2499] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2446.564767][ T2499] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2446.564775][ T2499] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2446.564790][ T2499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2446.608911][ T2499] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2446.624851][ T2499] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 2446.634766][ T2502] CPU: 0 PID: 2502 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2446.643398][ T2502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2446.653486][ T2502] Call Trace: [ 2446.656811][ T2502] dump_stack+0x197/0x210 [ 2446.661143][ T2502] should_fail.cold+0xa/0x15 [ 2446.661164][ T2502] ? fault_create_debugfs_attr+0x180/0x180 [ 2446.661185][ T2502] ? ___might_sleep+0x163/0x2c0 [ 2446.661204][ T2502] __should_failslab+0x121/0x190 [ 2446.661223][ T2502] should_failslab+0x9/0x14 [ 2446.661236][ T2502] kmem_cache_alloc_node_trace+0x274/0x750 [ 2446.661254][ T2502] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2446.676504][ T2502] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2446.676524][ T2502] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2446.676544][ T2502] __kmalloc_node+0x3d/0x70 [ 2446.676569][ T2502] __bpf_map_area_alloc+0xbd/0xf0 [ 2446.697328][ T2502] bpf_map_area_alloc+0x20/0x30 [ 2446.697348][ T2502] htab_map_alloc+0x589/0x11c0 [ 2446.697373][ T2502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2446.697392][ T2502] ? htab_map_update_elem+0xca0/0xca0 [ 2446.713707][ T2502] __do_sys_bpf+0x478/0x3610 [ 2446.713732][ T2502] ? bpf_prog_load+0x1960/0x1960 [ 2446.713750][ T2502] ? __kasan_check_write+0x14/0x20 [ 2446.713765][ T2502] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2446.713785][ T2502] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2446.728557][ T2502] ? wait_for_completion+0x440/0x440 [ 2446.744762][ T2502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2446.744799][ T2502] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2446.782660][ T2502] ? do_syscall_64+0x26/0x790 [ 2446.787344][ T2502] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2446.793396][ T2502] ? do_syscall_64+0x26/0x790 [ 2446.798065][ T2502] __x64_sys_bpf+0x73/0xb0 [ 2446.802469][ T2502] do_syscall_64+0xfa/0x790 [ 2446.806970][ T2502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2446.812844][ T2502] RIP: 0033:0x45a919 [ 2446.816741][ T2502] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2446.836365][ T2502] RSP: 002b:00007f61874a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2446.844764][ T2502] RAX: ffffffffffffffda RBX: 00007f61874a3c90 RCX: 000000000045a919 [ 2446.852733][ T2502] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2446.860786][ T2502] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2446.868748][ T2502] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61874a46d4 18:04:33 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6004, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:33 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x80fe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:33 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x12, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x5, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2446.876717][ T2502] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:33 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xac05, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:33 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x60, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfc, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xc0fe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2447.539816][ T2550] FAULT_INJECTION: forcing a failure. [ 2447.539816][ T2550] name failslab, interval 1, probability 0, space 0, times 0 [ 2447.597140][ T2550] CPU: 0 PID: 2550 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2447.605787][ T2550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2447.615867][ T2550] Call Trace: [ 2447.619205][ T2550] dump_stack+0x197/0x210 [ 2447.623558][ T2550] should_fail.cold+0xa/0x15 [ 2447.628174][ T2550] ? fault_create_debugfs_attr+0x180/0x180 [ 2447.635054][ T2550] ? ___might_sleep+0x163/0x2c0 [ 2447.639936][ T2550] __should_failslab+0x121/0x190 [ 2447.644896][ T2550] should_failslab+0x9/0x14 [ 2447.649427][ T2550] kmem_cache_alloc_node_trace+0x274/0x750 [ 2447.655250][ T2550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2447.661515][ T2550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2447.667787][ T2550] ? debug_smp_processor_id+0x33/0x18a [ 2447.673273][ T2550] __get_vm_area_node+0x12b/0x4f0 [ 2447.678324][ T2550] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2447.683898][ T2550] __vmalloc_node_range+0xd4/0x810 [ 2447.689035][ T2550] ? bpf_map_area_alloc+0x20/0x30 [ 2447.694122][ T2550] ? kasan_unpoison_shadow+0x35/0x50 [ 2447.699435][ T2550] ? bpf_map_area_alloc+0x20/0x30 [ 2447.704487][ T2550] __vmalloc_node_flags_caller+0x71/0x90 [ 2447.710140][ T2550] ? bpf_map_area_alloc+0x20/0x30 [ 2447.715212][ T2550] __bpf_map_area_alloc+0xde/0xf0 [ 2447.720265][ T2550] bpf_map_area_alloc+0x20/0x30 [ 2447.725159][ T2550] htab_map_alloc+0x8d3/0x11c0 [ 2447.729957][ T2550] ? htab_map_update_elem+0xca0/0xca0 [ 2447.735444][ T2550] __do_sys_bpf+0x478/0x3610 [ 2447.740063][ T2550] ? bpf_prog_load+0x1960/0x1960 [ 2447.745028][ T2550] ? __kasan_check_write+0x14/0x20 [ 2447.750159][ T2550] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2447.755721][ T2550] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2447.761029][ T2550] ? wait_for_completion+0x440/0x440 [ 2447.766520][ T2550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2447.772834][ T2550] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2447.778329][ T2550] ? do_syscall_64+0x26/0x790 [ 2447.783026][ T2550] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2447.789377][ T2550] ? do_syscall_64+0x26/0x790 [ 2447.794086][ T2550] __x64_sys_bpf+0x73/0xb0 [ 2447.798527][ T2550] do_syscall_64+0xfa/0x790 [ 2447.804022][ T2550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2447.809944][ T2550] RIP: 0033:0x45a919 [ 2447.813851][ T2550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2447.833466][ T2550] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:04:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x300, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xa9, 0x5, 0x1, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r1, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x0, 0x4, 0x0, r1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r3}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r3, 0x10001}, 0xc) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x430, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfc00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x7, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2447.841985][ T2550] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2447.849973][ T2550] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2447.857954][ T2550] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2447.857964][ T2550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2447.857973][ T2550] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000002, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x8, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfe80, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x438, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000003, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:34 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfec0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x9, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2448.495357][ T2607] FAULT_INJECTION: forcing a failure. [ 2448.495357][ T2607] name failslab, interval 1, probability 0, space 0, times 0 [ 2448.558921][ T2607] CPU: 0 PID: 2607 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2448.567560][ T2607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2448.577620][ T2607] Call Trace: [ 2448.580915][ T2607] dump_stack+0x197/0x210 [ 2448.586105][ T2607] should_fail.cold+0xa/0x15 [ 2448.591387][ T2607] ? htab_map_alloc+0x8d3/0x11c0 [ 2448.596315][ T2607] ? fault_create_debugfs_attr+0x180/0x180 [ 2448.602115][ T2607] ? ___might_sleep+0x163/0x2c0 [ 2448.606961][ T2607] __should_failslab+0x121/0x190 [ 2448.611903][ T2607] should_failslab+0x9/0x14 [ 2448.616394][ T2607] kmem_cache_alloc_node+0x268/0x740 [ 2448.621857][ T2607] ? ___might_sleep+0x163/0x2c0 [ 2448.626701][ T2607] alloc_vmap_area+0x147/0x2030 [ 2448.631539][ T2607] ? __get_vm_area_node+0x12b/0x4f0 [ 2448.636756][ T2607] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2448.642473][ T2607] ? purge_vmap_area_lazy+0x40/0x40 [ 2448.647688][ T2607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2448.653928][ T2607] ? debug_smp_processor_id+0x33/0x18a [ 2448.659427][ T2607] __get_vm_area_node+0x179/0x4f0 [ 2448.664975][ T2607] __vmalloc_node_range+0xd4/0x810 [ 2448.670089][ T2607] ? bpf_map_area_alloc+0x20/0x30 [ 2448.675110][ T2607] ? kasan_unpoison_shadow+0x35/0x50 [ 2448.680396][ T2607] ? bpf_map_area_alloc+0x20/0x30 [ 2448.685409][ T2607] __vmalloc_node_flags_caller+0x71/0x90 [ 2448.691044][ T2607] ? bpf_map_area_alloc+0x20/0x30 [ 2448.696084][ T2607] __bpf_map_area_alloc+0xde/0xf0 [ 2448.701122][ T2607] bpf_map_area_alloc+0x20/0x30 [ 2448.705968][ T2607] htab_map_alloc+0x8d3/0x11c0 [ 2448.710730][ T2607] ? htab_map_update_elem+0xca0/0xca0 [ 2448.716089][ T2607] __do_sys_bpf+0x478/0x3610 [ 2448.720759][ T2607] ? bpf_prog_load+0x1960/0x1960 [ 2448.725684][ T2607] ? __kasan_check_write+0x14/0x20 [ 2448.730793][ T2607] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2448.736447][ T2607] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2448.741750][ T2607] ? wait_for_completion+0x440/0x440 [ 2448.747041][ T2607] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2448.753296][ T2607] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2448.759102][ T2607] ? do_syscall_64+0x26/0x790 [ 2448.763804][ T2607] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2448.769876][ T2607] ? do_syscall_64+0x26/0x790 [ 2448.774567][ T2607] __x64_sys_bpf+0x73/0xb0 [ 2448.778980][ T2607] do_syscall_64+0xfa/0x790 [ 2448.783488][ T2607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2448.789365][ T2607] RIP: 0033:0x45a919 [ 2448.793248][ T2607] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2448.812944][ T2607] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2448.821342][ T2607] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2448.829311][ T2607] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2448.837266][ T2607] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2448.845508][ T2607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 18:04:35 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0004892207"], 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000040)=r4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xffffffffffffff81) 18:04:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x460, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xff00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:35 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000004, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xa, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2448.853479][ T2607] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x500, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:35 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000005, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:35 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x5ac, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x2, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2449.479403][ T2662] FAULT_INJECTION: forcing a failure. [ 2449.479403][ T2662] name failslab, interval 1, probability 0, space 0, times 0 [ 2449.503680][ T2662] CPU: 1 PID: 2662 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2449.512321][ T2662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2449.522384][ T2662] Call Trace: [ 2449.522413][ T2662] dump_stack+0x197/0x210 [ 2449.522433][ T2662] should_fail.cold+0xa/0x15 [ 2449.522458][ T2662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2449.522476][ T2662] ? fault_create_debugfs_attr+0x180/0x180 [ 2449.522502][ T2662] ? ___might_sleep+0x163/0x2c0 [ 2449.522531][ T2662] __should_failslab+0x121/0x190 [ 2449.522615][ T2662] should_failslab+0x9/0x14 [ 2449.522644][ T2662] kmem_cache_alloc_node+0x268/0x740 [ 2449.522665][ T2662] ? ___might_sleep+0x163/0x2c0 [ 2449.530351][ T2662] alloc_vmap_area+0xc8d/0x2030 [ 2449.530372][ T2662] ? __get_vm_area_node+0x12b/0x4f0 [ 2449.530389][ T2662] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2449.530417][ T2662] ? purge_vmap_area_lazy+0x40/0x40 [ 2449.530435][ T2662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2449.530450][ T2662] ? debug_smp_processor_id+0x33/0x18a [ 2449.530471][ T2662] __get_vm_area_node+0x179/0x4f0 [ 2449.530500][ T2662] __vmalloc_node_range+0xd4/0x810 [ 2449.530522][ T2662] ? bpf_map_area_alloc+0x20/0x30 [ 2449.620368][ T2662] ? kasan_unpoison_shadow+0x35/0x50 [ 2449.625681][ T2662] ? bpf_map_area_alloc+0x20/0x30 [ 2449.630720][ T2662] __vmalloc_node_flags_caller+0x71/0x90 [ 2449.636404][ T2662] ? bpf_map_area_alloc+0x20/0x30 [ 2449.641452][ T2662] __bpf_map_area_alloc+0xde/0xf0 [ 2449.646488][ T2662] bpf_map_area_alloc+0x20/0x30 [ 2449.651432][ T2662] htab_map_alloc+0x8d3/0x11c0 [ 2449.656202][ T2662] ? htab_map_update_elem+0xca0/0xca0 [ 2449.661665][ T2662] __do_sys_bpf+0x478/0x3610 [ 2449.666285][ T2662] ? bpf_prog_load+0x1960/0x1960 [ 2449.671228][ T2662] ? __kasan_check_write+0x14/0x20 [ 2449.676355][ T2662] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2449.682265][ T2662] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2449.687556][ T2662] ? wait_for_completion+0x440/0x440 [ 2449.692850][ T2662] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2449.699085][ T2662] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2449.704537][ T2662] ? do_syscall_64+0x26/0x790 [ 2449.709201][ T2662] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2449.715271][ T2662] ? do_syscall_64+0x26/0x790 [ 2449.719960][ T2662] __x64_sys_bpf+0x73/0xb0 [ 2449.724383][ T2662] do_syscall_64+0xfa/0x790 [ 2449.728890][ T2662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2449.737737][ T2662] RIP: 0033:0x45a919 [ 2449.741637][ T2662] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2449.761255][ T2662] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2449.769684][ T2662] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2449.777648][ T2662] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2449.785609][ T2662] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2449.793660][ T2662] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2449.801649][ T2662] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000300)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r3, 0x56, 0x18}, 0xc) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) 18:04:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x10, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000006, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:36 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x600, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:36 executing program 3 (fault-call:1 fault-nth:5): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2449.987787][ T2675] FAULT_INJECTION: forcing a failure. [ 2449.987787][ T2675] name failslab, interval 1, probability 0, space 0, times 0 18:04:36 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x700, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000007, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2450.065824][ T2675] CPU: 1 PID: 2675 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2450.074457][ T2675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2450.084527][ T2675] Call Trace: [ 2450.087845][ T2675] dump_stack+0x197/0x210 [ 2450.092207][ T2675] should_fail.cold+0xa/0x15 [ 2450.096919][ T2675] ? fault_create_debugfs_attr+0x180/0x180 [ 2450.102763][ T2675] ? ___might_sleep+0x163/0x2c0 [ 2450.107625][ T2675] __should_failslab+0x121/0x190 [ 2450.107644][ T2675] should_failslab+0x9/0x14 [ 2450.107663][ T2675] kmem_cache_alloc_node_trace+0x274/0x750 [ 2450.122895][ T2675] ? do_raw_spin_unlock+0x178/0x270 [ 2450.122927][ T2675] __kmalloc_node+0x3d/0x70 [ 2450.132619][ T2675] __vmalloc_node_range+0x1db/0x810 [ 2450.137842][ T2675] ? bpf_map_area_alloc+0x20/0x30 [ 2450.142889][ T2675] __vmalloc_node_flags_caller+0x71/0x90 [ 2450.148559][ T2675] ? bpf_map_area_alloc+0x20/0x30 [ 2450.148579][ T2675] __bpf_map_area_alloc+0xde/0xf0 [ 2450.148600][ T2675] bpf_map_area_alloc+0x20/0x30 [ 2450.163478][ T2675] htab_map_alloc+0x8d3/0x11c0 [ 2450.168269][ T2675] ? htab_map_update_elem+0xca0/0xca0 [ 2450.173650][ T2675] __do_sys_bpf+0x478/0x3610 [ 2450.173674][ T2675] ? bpf_prog_load+0x1960/0x1960 [ 2450.173688][ T2675] ? __kasan_check_write+0x14/0x20 [ 2450.173705][ T2675] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2450.173720][ T2675] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2450.173736][ T2675] ? wait_for_completion+0x440/0x440 [ 2450.173759][ T2675] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2450.210742][ T2675] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2450.216227][ T2675] ? do_syscall_64+0x26/0x790 [ 2450.221013][ T2675] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2450.227101][ T2675] ? do_syscall_64+0x26/0x790 [ 2450.231809][ T2675] __x64_sys_bpf+0x73/0xb0 [ 2450.236251][ T2675] do_syscall_64+0xfa/0x790 [ 2450.240892][ T2675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2450.246806][ T2675] RIP: 0033:0x45a919 18:04:36 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x900, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2450.250718][ T2675] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2450.270334][ T2675] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2450.278768][ T2675] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2450.286768][ T2675] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2450.294737][ T2675] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2450.294746][ T2675] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 18:04:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x4, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x11, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2450.294754][ T2675] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000008, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:37 executing program 5: socketpair(0xa, 0x1, 0x2, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:37 executing program 3 (fault-call:1 fault-nth:6): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x60, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xa00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x5, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000009, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xe00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2450.937932][ T2727] FAULT_INJECTION: forcing a failure. [ 2450.937932][ T2727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2450.988586][ T2727] CPU: 1 PID: 2727 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2450.997657][ T2727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2451.008272][ T2727] Call Trace: [ 2451.011581][ T2727] dump_stack+0x197/0x210 [ 2451.015934][ T2727] should_fail.cold+0xa/0x15 [ 2451.020645][ T2727] ? fault_create_debugfs_attr+0x180/0x180 [ 2451.026637][ T2727] ? ___might_sleep+0x163/0x2c0 [ 2451.031495][ T2727] should_fail_alloc_page+0x50/0x60 [ 2451.031510][ T2727] __alloc_pages_nodemask+0x1a1/0x910 [ 2451.031526][ T2727] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2451.031545][ T2727] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2451.053675][ T2727] ? kasan_unpoison_shadow+0x35/0x50 [ 2451.058994][ T2727] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2451.065272][ T2727] alloc_pages_current+0x107/0x210 [ 2451.070416][ T2727] __vmalloc_node_range+0x4f8/0x810 [ 2451.075648][ T2727] ? bpf_map_area_alloc+0x20/0x30 [ 2451.080699][ T2727] __vmalloc_node_flags_caller+0x71/0x90 [ 2451.086383][ T2727] ? bpf_map_area_alloc+0x20/0x30 [ 2451.091442][ T2727] __bpf_map_area_alloc+0xde/0xf0 [ 2451.096494][ T2727] bpf_map_area_alloc+0x20/0x30 [ 2451.101632][ T2727] htab_map_alloc+0x8d3/0x11c0 [ 2451.106438][ T2727] ? htab_map_update_elem+0xca0/0xca0 [ 2451.111833][ T2727] __do_sys_bpf+0x478/0x3610 [ 2451.116472][ T2727] ? bpf_prog_load+0x1960/0x1960 [ 2451.121446][ T2727] ? __kasan_check_write+0x14/0x20 [ 2451.126574][ T2727] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2451.132129][ T2727] ? rcu_read_lock_bh_held+0xb0/0xb0 18:04:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1100, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x7, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2451.137972][ T2727] ? wait_for_completion+0x440/0x440 [ 2451.143284][ T2727] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2451.149578][ T2727] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2451.155056][ T2727] ? do_syscall_64+0x26/0x790 [ 2451.159727][ T2727] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2451.159746][ T2727] ? do_syscall_64+0x26/0x790 [ 2451.170839][ T2727] __x64_sys_bpf+0x73/0xb0 [ 2451.175291][ T2727] do_syscall_64+0xfa/0x790 [ 2451.179823][ T2727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2451.185859][ T2727] RIP: 0033:0x45a919 [ 2451.189773][ T2727] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2451.209469][ T2727] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2451.209484][ T2727] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2451.209492][ T2727] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 18:04:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000000a, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfc, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2451.209499][ T2727] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2451.209507][ T2727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2451.209515][ T2727] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:37 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000880)='/dev/\x16\n\x92\x03]y\xc0\xf2', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x15, 0x40, 0xffffffbc, 0x3ff, 0x80, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r2, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000840)='/dev/net/tun\x00', 0x280000, 0x0) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000440)=""/218, 0xda}, {&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000540)=""/80, 0x50}, {&(0x7f00000005c0)=""/89, 0x59}, {&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f0000000640)=""/73, 0x49}], 0x7, &(0x7f0000000740)=""/137, 0x89}, 0x9fa23b6e141768ba) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x4, 0xb94, 0x0, 0x7049, 0x200, 0xffffffffffffffff, 0x1, [], r3, 0xffffffffffffffff, 0x4, 0x1}, 0x3c) 18:04:37 executing program 3 (fault-call:1 fault-nth:7): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x1200, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x8, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x300, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000000b, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:38 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0xbf67, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x51089, 0x0, 0x0, 0x0, 0x3ffc}, r1, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x6158cd3856fec948, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\xfc', 0x248800) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp, 0x1, 0x2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x20, 0x1f, 0x5, 0x81, 0x0, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x4, 0xa80}, 0x29082, 0x0, 0x8d, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x1, r3, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000ac0)={r5, &(0x7f00000009c0)="5fc2bf912ecee8593e041a842eb11c02d8e5a9c4f8fefb247828b7a666ef7bf3b0f04d2cf79014677016ce581bd8c02bcb347bac0ea4edbe4af981fb8dff95968754560a749264ef019a4baa611d153c06898dc2c1402e35759aabf10af2feadb7f134e355e8e01acf0cdbd64d3a5b51769a72324c90f2bd87bf8499931221f1ee79e7ecc7c3ec9b16fb27cb", &(0x7f0000000a80)=""/34}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000080)='\x00', r7}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg(r8, &(0x7f0000000980)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2, 0x2, 0x0, 0x3}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000380)="9039945dc4c9390d19f2492fdb58a23060693db8cbd6218c93977c33a73aab552b89dde06065d81e499472df2a1e2d4e021a28db513744b6", 0x38}, {&(0x7f0000000540)="9d55fe584cd9956ed95e7ff01efe38c2941db15b287a2c553ab0b22aea4297db92a9ff9d5ee30b5bca68e8b51ce13857e6692c23de52b7d8b7f35e33a90de5e2deddcb13399b5c7ce116825646bbc3e24228df542b43e25bed5f5ff4d52fbe69b3545f27856781b75e7fc0d9", 0x6c}, {&(0x7f00000005c0)="3f9f084d863973c3a2be3a69b68652c43594c4a1b49cfc766eb0e5d6abe84eb355791a7ea62bbe3fb168529bcdb32017b968af229a6d977df234a17c18618bd0f5bcbc7a6c84dfbcffba0b42247b866cfdd65a47b4647700e34fcecce92efdba9d18bee0dcec8faddc870b", 0x6b}, {&(0x7f0000000640)="e2486d9a45861ea59b4d5103bdd6556fbf0e8e4935e3f1c94a4b595effcde268b5b130e15d0df2e8feac1a328f58bd3c0c13fa13ca7126e3cd8464b4395a240186b40d8d29da8c6629c9f7cb55d4e867c5e8c92fe796daec937baa15b47e9d7259382f54b9d9e29982af39e178cc597a8c5838be9a5cb73324ba7871b1429ea9096857e20c48eb6640563f74e97394a7b05646131346be2b58e3b17810d84e6468e36222ee2e0049744ca94a9fd46220ed7103e6b6309b846b1ad696", 0xbc}, {&(0x7f0000000700)="43ceef141a7b1d7211ac16af4e42fa18dd334018abde558d58712799619266449c5396f7d152c192b82431b913bcee966c6c7f0a8abc15a18c563e5e5af28eb0892248f2d5434fcadaeb0e5dc22a550bdd01b2b16c5aa0b8a5316bb5e8d9dc5164ef5bf87b9f62bcaa30e190d16e57e3cc464f77af2af3cb519329c2db", 0x7d}, {&(0x7f0000000780)="420e82b8df441ca9b61d62e1287e73683df3cfe4e9e5cc0aedcf6782c2a277617cff411b706a93eb0576715c0a7b8d9ce607cb185973e627e5b3aa8a8b18bc836f11f8f58dbcf2a891c99393d6f1a1609ce2ccfd7494677166929590ef26135dd63f8ce8ef13b1a5a136b3ad1a61c5f42f9cc0ca", 0x74}], 0x6, &(0x7f0000000880)=[{0xf8, 0x100, 0xba23, "b1c96936e1e7fbec19671b3807b0323dfad049b6f408030eae37d0489c9df36d0b05daf5da288518216c0ed4079236ff1ed9fa067bc7eff37c7274e830a113ce2b71b19e03c5ef43319e76ff3d78c20c53e97a88199d76b05df8082cf5bb1b618ef50d4f23239f5765f13ddd34e418b4f60ce69c672f9c9b1393d36a384325d1f6df574251767990a8275172fcac9a76bf20083964f9eaed16a82f4a86616a2a6f0371a63a216b3f99f7e7208a8d8b50535c5d3651cfcf5bd85ef6529738ac756666ce2691cedd1ae3d6f990830b0cbfffe3d676152d47cd3115a2e651f059264f"}], 0xf8}, 0x24008000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='nr0\x01\x00', r7}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40042409, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x430, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2451.627267][ T2785] FAULT_INJECTION: forcing a failure. [ 2451.627267][ T2785] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:38 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3004, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x9, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000000c, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2451.791489][ T2785] CPU: 0 PID: 2785 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2451.800138][ T2785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2451.810218][ T2785] Call Trace: [ 2451.813527][ T2785] dump_stack+0x197/0x210 [ 2451.813557][ T2785] should_fail.cold+0xa/0x15 [ 2451.822482][ T2785] ? fault_create_debugfs_attr+0x180/0x180 [ 2451.828319][ T2785] ? ___might_sleep+0x163/0x2c0 [ 2451.833821][ T2785] should_fail_alloc_page+0x50/0x60 [ 2451.839046][ T2785] __alloc_pages_nodemask+0x1a1/0x910 [ 2451.845431][ T2785] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2451.845449][ T2785] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2451.845469][ T2785] ? kasan_unpoison_shadow+0x35/0x50 [ 2451.845488][ T2785] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2451.845508][ T2785] alloc_pages_current+0x107/0x210 [ 2451.845522][ T2785] ? ___might_sleep+0x163/0x2c0 [ 2451.845541][ T2785] __vmalloc_node_range+0x4f8/0x810 [ 2451.845566][ T2785] ? bpf_map_area_alloc+0x20/0x30 18:04:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x438, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2451.845583][ T2785] __vmalloc_node_flags_caller+0x71/0x90 [ 2451.845597][ T2785] ? bpf_map_area_alloc+0x20/0x30 [ 2451.845618][ T2785] __bpf_map_area_alloc+0xde/0xf0 [ 2451.895490][ T2785] bpf_map_area_alloc+0x20/0x30 [ 2451.895510][ T2785] htab_map_alloc+0x8d3/0x11c0 [ 2451.895540][ T2785] ? htab_map_update_elem+0xca0/0xca0 [ 2451.920766][ T2785] __do_sys_bpf+0x478/0x3610 [ 2451.925380][ T2785] ? bpf_prog_load+0x1960/0x1960 [ 2451.925399][ T2785] ? __kasan_check_write+0x14/0x20 [ 2451.925414][ T2785] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2451.925434][ T2785] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2451.947273][ T2785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2451.947290][ T2785] ? debug_smp_processor_id+0x33/0x18a [ 2451.947309][ T2785] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2451.947341][ T2785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2451.947362][ T2785] ? do_syscall_64+0x26/0x790 [ 2451.975349][ T2785] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2451.981436][ T2785] ? do_syscall_64+0x26/0x790 [ 2451.986142][ T2785] __x64_sys_bpf+0x73/0xb0 [ 2451.990583][ T2785] do_syscall_64+0xfa/0x790 [ 2451.995109][ T2785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2452.001094][ T2785] RIP: 0033:0x45a919 [ 2452.001114][ T2785] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2452.001122][ T2785] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2452.001138][ T2785] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 18:04:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xa, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2452.001146][ T2785] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2452.001153][ T2785] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2452.001161][ T2785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2452.001170][ T2785] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:38 executing program 3 (fault-call:1 fault-nth:8): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:38 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3804, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x460, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000000d, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2452.354324][ T2831] FAULT_INJECTION: forcing a failure. [ 2452.354324][ T2831] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2452.506582][ T2831] CPU: 0 PID: 2831 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2452.515226][ T2831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2452.525559][ T2831] Call Trace: [ 2452.528872][ T2831] dump_stack+0x197/0x210 [ 2452.533225][ T2831] should_fail.cold+0xa/0x15 [ 2452.537845][ T2831] ? fault_create_debugfs_attr+0x180/0x180 [ 2452.543984][ T2831] ? ___might_sleep+0x163/0x2c0 [ 2452.548970][ T2831] should_fail_alloc_page+0x50/0x60 [ 2452.554192][ T2831] __alloc_pages_nodemask+0x1a1/0x910 [ 2452.559567][ T2831] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2452.565316][ T2831] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2452.571065][ T2831] ? kasan_unpoison_shadow+0x35/0x50 [ 2452.576374][ T2831] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2452.582641][ T2831] alloc_pages_current+0x107/0x210 [ 2452.587773][ T2831] ? ___might_sleep+0x163/0x2c0 [ 2452.592650][ T2831] __vmalloc_node_range+0x4f8/0x810 [ 2452.597861][ T2831] ? bpf_map_area_alloc+0x20/0x30 [ 2452.602878][ T2831] __vmalloc_node_flags_caller+0x71/0x90 [ 2452.608503][ T2831] ? bpf_map_area_alloc+0x20/0x30 [ 2452.613520][ T2831] __bpf_map_area_alloc+0xde/0xf0 [ 2452.618646][ T2831] bpf_map_area_alloc+0x20/0x30 [ 2452.623848][ T2831] htab_map_alloc+0x8d3/0x11c0 [ 2452.628613][ T2831] ? htab_map_update_elem+0xca0/0xca0 [ 2452.633980][ T2831] __do_sys_bpf+0x478/0x3610 [ 2452.638581][ T2831] ? bpf_prog_load+0x1960/0x1960 [ 2452.643513][ T2831] ? __kasan_check_write+0x14/0x20 [ 2452.649673][ T2831] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2452.655239][ T2831] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2452.660560][ T2831] ? wait_for_completion+0x440/0x440 [ 2452.665864][ T2831] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2452.672099][ T2831] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2452.677561][ T2831] ? do_syscall_64+0x26/0x790 [ 2452.682233][ T2831] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2452.688389][ T2831] ? do_syscall_64+0x26/0x790 [ 2452.693107][ T2831] __x64_sys_bpf+0x73/0xb0 [ 2452.697573][ T2831] do_syscall_64+0xfa/0x790 [ 2452.702079][ T2831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2452.707963][ T2831] RIP: 0033:0x45a919 [ 2452.711856][ T2831] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2452.731971][ T2831] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2452.741098][ T2831] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2452.749645][ T2831] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2452.757628][ T2831] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2452.765591][ T2831] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2452.773571][ T2831] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:39 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x7, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x500, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x3f00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:39 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x10, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000000e, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:39 executing program 3 (fault-call:1 fault-nth:9): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:39 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x11, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x5ac, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2453.032071][ T2858] FAULT_INJECTION: forcing a failure. [ 2453.032071][ T2858] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x4000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000000f, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2453.136518][ T2858] CPU: 0 PID: 2858 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2453.145162][ T2858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2453.155256][ T2858] Call Trace: [ 2453.158578][ T2858] dump_stack+0x197/0x210 [ 2453.163212][ T2858] should_fail.cold+0xa/0x15 [ 2453.167844][ T2858] ? fault_create_debugfs_attr+0x180/0x180 [ 2453.173934][ T2858] ? ___might_sleep+0x163/0x2c0 [ 2453.178884][ T2858] should_fail_alloc_page+0x50/0x60 [ 2453.184103][ T2858] __alloc_pages_nodemask+0x1a1/0x910 [ 2453.189498][ T2858] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2453.195083][ T2858] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2453.200805][ T2858] ? kasan_unpoison_shadow+0x35/0x50 [ 2453.200823][ T2858] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2453.200842][ T2858] alloc_pages_current+0x107/0x210 [ 2453.200855][ T2858] ? ___might_sleep+0x163/0x2c0 [ 2453.200874][ T2858] __vmalloc_node_range+0x4f8/0x810 [ 2453.200897][ T2858] ? bpf_map_area_alloc+0x20/0x30 [ 2453.200917][ T2858] __vmalloc_node_flags_caller+0x71/0x90 [ 2453.239133][ T2858] ? bpf_map_area_alloc+0x20/0x30 [ 2453.244184][ T2858] __bpf_map_area_alloc+0xde/0xf0 [ 2453.249240][ T2858] bpf_map_area_alloc+0x20/0x30 [ 2453.255023][ T2858] htab_map_alloc+0x8d3/0x11c0 [ 2453.259820][ T2858] ? htab_map_update_elem+0xca0/0xca0 [ 2453.265205][ T2858] __do_sys_bpf+0x478/0x3610 [ 2453.269831][ T2858] ? bpf_prog_load+0x1960/0x1960 [ 2453.274957][ T2858] ? __kasan_check_write+0x14/0x20 [ 2453.280091][ T2858] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2453.285656][ T2858] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2453.291136][ T2858] ? wait_for_completion+0x440/0x440 [ 2453.296436][ T2858] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2453.302713][ T2858] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2453.308196][ T2858] ? do_syscall_64+0x26/0x790 [ 2453.314634][ T2858] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2453.320720][ T2858] ? do_syscall_64+0x26/0x790 [ 2453.325514][ T2858] __x64_sys_bpf+0x73/0xb0 [ 2453.329954][ T2858] do_syscall_64+0xfa/0x790 [ 2453.334486][ T2858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2453.340390][ T2858] RIP: 0033:0x45a919 [ 2453.344307][ T2858] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2453.364210][ T2858] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2453.364224][ T2858] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 18:04:39 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x12, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x600, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2453.364232][ T2858] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2453.364240][ T2858] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2453.364248][ T2858] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2453.364256][ T2858] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:40 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ed0486dd07"], 0x90ad) 18:04:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000010, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x60, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:40 executing program 3 (fault-call:1 fault-nth:10): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x700, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2453.837882][ T2895] FAULT_INJECTION: forcing a failure. [ 2453.837882][ T2895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2453.890080][ T2895] CPU: 0 PID: 2895 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2453.898734][ T2895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2453.908916][ T2895] Call Trace: [ 2453.912422][ T2895] dump_stack+0x197/0x210 [ 2453.912442][ T2895] should_fail.cold+0xa/0x15 [ 2453.912464][ T2895] ? fault_create_debugfs_attr+0x180/0x180 [ 2453.927303][ T2895] ? ___might_sleep+0x163/0x2c0 [ 2453.932183][ T2895] should_fail_alloc_page+0x50/0x60 [ 2453.937412][ T2895] __alloc_pages_nodemask+0x1a1/0x910 [ 2453.942805][ T2895] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2453.948450][ T2895] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2453.954173][ T2895] ? kasan_unpoison_shadow+0x35/0x50 [ 2453.959461][ T2895] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2453.965848][ T2895] alloc_pages_current+0x107/0x210 [ 2453.970965][ T2895] ? ___might_sleep+0x163/0x2c0 [ 2453.975887][ T2895] __vmalloc_node_range+0x4f8/0x810 [ 2453.981127][ T2895] ? bpf_map_area_alloc+0x20/0x30 [ 2453.986160][ T2895] __vmalloc_node_flags_caller+0x71/0x90 [ 2453.991811][ T2895] ? bpf_map_area_alloc+0x20/0x30 [ 2453.996838][ T2895] __bpf_map_area_alloc+0xde/0xf0 [ 2454.001861][ T2895] bpf_map_area_alloc+0x20/0x30 [ 2454.006882][ T2895] htab_map_alloc+0x8d3/0x11c0 [ 2454.011665][ T2895] ? htab_map_update_elem+0xca0/0xca0 [ 2454.017076][ T2895] __do_sys_bpf+0x478/0x3610 [ 2454.021796][ T2895] ? bpf_prog_load+0x1960/0x1960 [ 2454.026733][ T2895] ? __kasan_check_write+0x14/0x20 [ 2454.031841][ T2895] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2454.037376][ T2895] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2454.042651][ T2895] ? wait_for_completion+0x440/0x440 [ 2454.049430][ T2895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2454.055755][ T2895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2454.061199][ T2895] ? do_syscall_64+0x26/0x790 [ 2454.065865][ T2895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2454.071926][ T2895] ? do_syscall_64+0x26/0x790 [ 2454.076688][ T2895] __x64_sys_bpf+0x73/0xb0 [ 2454.081095][ T2895] do_syscall_64+0xfa/0x790 [ 2454.085686][ T2895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2454.091581][ T2895] RIP: 0033:0x45a919 [ 2454.095462][ T2895] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2454.115048][ T2895] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2454.123442][ T2895] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2454.131412][ T2895] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 18:04:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x6004, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2454.139387][ T2895] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2454.147345][ T2895] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2454.155303][ T2895] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfc, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000011, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x900, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x80fe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x300, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xa00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000012, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xac05, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 3 (fault-call:1 fault-nth:11): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x430, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x438, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xe00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000013, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2454.811711][ T2949] FAULT_INJECTION: forcing a failure. [ 2454.811711][ T2949] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2454.889724][ T2949] CPU: 1 PID: 2949 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2454.898370][ T2949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2454.908791][ T2949] Call Trace: [ 2454.912108][ T2949] dump_stack+0x197/0x210 [ 2454.912129][ T2949] should_fail.cold+0xa/0x15 [ 2454.912147][ T2949] ? fault_create_debugfs_attr+0x180/0x180 [ 2454.912163][ T2949] ? ___might_sleep+0x163/0x2c0 [ 2454.912190][ T2949] should_fail_alloc_page+0x50/0x60 [ 2454.938479][ T2949] __alloc_pages_nodemask+0x1a1/0x910 [ 2454.943994][ T2949] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2454.949693][ T2949] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2454.955447][ T2949] ? kasan_unpoison_shadow+0x35/0x50 [ 2454.960761][ T2949] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2454.967046][ T2949] alloc_pages_current+0x107/0x210 [ 2454.972177][ T2949] ? ___might_sleep+0x163/0x2c0 [ 2454.977218][ T2949] __vmalloc_node_range+0x4f8/0x810 [ 2454.982451][ T2949] ? bpf_map_area_alloc+0x20/0x30 [ 2454.987581][ T2949] __vmalloc_node_flags_caller+0x71/0x90 [ 2454.993354][ T2949] ? bpf_map_area_alloc+0x20/0x30 [ 2454.998408][ T2949] __bpf_map_area_alloc+0xde/0xf0 [ 2455.003458][ T2949] bpf_map_area_alloc+0x20/0x30 [ 2455.008334][ T2949] htab_map_alloc+0x8d3/0x11c0 [ 2455.013134][ T2949] ? htab_map_update_elem+0xca0/0xca0 [ 2455.018968][ T2949] __do_sys_bpf+0x478/0x3610 [ 2455.023592][ T2949] ? bpf_prog_load+0x1960/0x1960 [ 2455.028553][ T2949] ? __kasan_check_write+0x14/0x20 [ 2455.033685][ T2949] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2455.039253][ T2949] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2455.044580][ T2949] ? wait_for_completion+0x440/0x440 [ 2455.049897][ T2949] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2455.056171][ T2949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2455.061654][ T2949] ? do_syscall_64+0x26/0x790 [ 2455.066531][ T2949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2455.072616][ T2949] ? do_syscall_64+0x26/0x790 [ 2455.078254][ T2949] __x64_sys_bpf+0x73/0xb0 [ 2455.082713][ T2949] do_syscall_64+0xfa/0x790 [ 2455.087235][ T2949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2455.093142][ T2949] RIP: 0033:0x45a919 [ 2455.097489][ T2949] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2455.117823][ T2949] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2455.126258][ T2949] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 18:04:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xc0fe, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x460, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfc00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2455.135030][ T2949] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2455.143021][ T2949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2455.151007][ T2949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2455.158998][ T2949] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:42 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r1, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r4 = socket$kcm(0x2, 0x1, 0x84) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r5, 0xb) setsockopt$sock_attach_bpf(r4, 0x10d, 0xb, &(0x7f0000000000)=r5, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r5, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r7 = socket$kcm(0x2, 0x1, 0x84) close(r7) r8 = socket$kcm(0xa, 0x6, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x10d, 0xb, &(0x7f0000000000)=r9, 0xb) setsockopt$sock_attach_bpf(r7, 0x10d, 0xb, &(0x7f0000000000)=r9, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa45}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, @generic={0x3, 0x1, 0x2, 0x3, 0x7fffffff}, @alu={0x0, 0x1, 0x0, 0x3, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r2, 0x19, r3, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r6, r9}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r6}, 0x78) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r6, 0x98b3fcae50eac592) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x3}, 0x0, 0x0, &(0x7f0000000380)={0x5, 0x9, 0x8, 0x5}, &(0x7f00000003c0)=0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0xeab}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r10, 0x10, &(0x7f0000000580)={&(0x7f00000001c0)=""/75, 0x4b, r11}}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r13 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0x3e, &(0x7f00000002c0)=r12, 0x161) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r15 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r15, 0x1, 0x3e, &(0x7f00000002c0)=r14, 0x161) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000600)=r14, 0x4) ioctl$TUNSETIFINDEX(r12, 0x400454da, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:42 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x500, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x1100, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfe80, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:42 executing program 3 (fault-call:1 fault-nth:12): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000014, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:42 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x5ac, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000015, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2455.618458][ T2992] FAULT_INJECTION: forcing a failure. [ 2455.618458][ T2992] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2455.675628][ T2992] CPU: 0 PID: 2992 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2455.685225][ T2992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2455.695548][ T2992] Call Trace: [ 2455.695576][ T2992] dump_stack+0x197/0x210 [ 2455.695597][ T2992] should_fail.cold+0xa/0x15 [ 2455.695614][ T2992] ? fault_create_debugfs_attr+0x180/0x180 [ 2455.695630][ T2992] ? ___might_sleep+0x163/0x2c0 [ 2455.695655][ T2992] should_fail_alloc_page+0x50/0x60 [ 2455.695669][ T2992] __alloc_pages_nodemask+0x1a1/0x910 [ 2455.695688][ T2992] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2455.695703][ T2992] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2455.695727][ T2992] ? kasan_unpoison_shadow+0x35/0x50 [ 2455.695750][ T2992] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2455.723828][ T2992] alloc_pages_current+0x107/0x210 [ 2455.757324][ T2992] ? ___might_sleep+0x163/0x2c0 [ 2455.757351][ T2992] __vmalloc_node_range+0x4f8/0x810 [ 2455.767398][ T2992] ? bpf_map_area_alloc+0x20/0x30 [ 2455.772444][ T2992] __vmalloc_node_flags_caller+0x71/0x90 [ 2455.778266][ T2992] ? bpf_map_area_alloc+0x20/0x30 [ 2455.778286][ T2992] __bpf_map_area_alloc+0xde/0xf0 [ 2455.778305][ T2992] bpf_map_area_alloc+0x20/0x30 [ 2455.778325][ T2992] htab_map_alloc+0x8d3/0x11c0 [ 2455.798796][ T2992] ? htab_map_update_elem+0xca0/0xca0 [ 2455.804227][ T2992] __do_sys_bpf+0x478/0x3610 [ 2455.808851][ T2992] ? bpf_prog_load+0x1960/0x1960 [ 2455.813990][ T2992] ? __kasan_check_write+0x14/0x20 [ 2455.819136][ T2992] ? __mutex_unlock_slowpath+0xf0/0x6a0 18:04:42 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x600, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2455.824709][ T2992] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2455.830016][ T2992] ? wait_for_completion+0x440/0x440 [ 2455.835317][ T2992] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2455.841563][ T2992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2455.841579][ T2992] ? do_syscall_64+0x26/0x790 [ 2455.841596][ T2992] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2455.841610][ T2992] ? do_syscall_64+0x26/0x790 [ 2455.841635][ T2992] __x64_sys_bpf+0x73/0xb0 [ 2455.866922][ T2992] do_syscall_64+0xfa/0x790 [ 2455.871451][ T2992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2455.877360][ T2992] RIP: 0033:0x45a919 [ 2455.881279][ T2992] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2455.900928][ T2992] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2455.909366][ T2992] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2455.917337][ T2992] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 18:04:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3004, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:42 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x700, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xfec0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2455.917346][ T2992] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2455.917353][ T2992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2455.917361][ T2992] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000016, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3804, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:42 executing program 3 (fault-call:1 fault-nth:13): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:42 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x900, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:42 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$TUNSETLINK(r1, 0x400454cd, 0x201) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0xff00, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000017, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2456.488095][ T3041] FAULT_INJECTION: forcing a failure. [ 2456.488095][ T3041] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3f00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2456.551515][ T3041] CPU: 1 PID: 3041 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2456.560147][ T3041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2456.560155][ T3041] Call Trace: [ 2456.560179][ T3041] dump_stack+0x197/0x210 [ 2456.560202][ T3041] should_fail.cold+0xa/0x15 [ 2456.560221][ T3041] ? fault_create_debugfs_attr+0x180/0x180 [ 2456.560242][ T3041] ? ___might_sleep+0x163/0x2c0 [ 2456.593416][ T3041] should_fail_alloc_page+0x50/0x60 [ 2456.593436][ T3041] __alloc_pages_nodemask+0x1a1/0x910 [ 2456.604011][ T3041] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2456.609585][ T3041] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2456.615331][ T3041] ? kasan_unpoison_shadow+0x35/0x50 [ 2456.620629][ T3041] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2456.626886][ T3041] alloc_pages_current+0x107/0x210 [ 2456.632167][ T3041] ? ___might_sleep+0x163/0x2c0 [ 2456.632187][ T3041] __vmalloc_node_range+0x4f8/0x810 [ 2456.632210][ T3041] ? bpf_map_area_alloc+0x20/0x30 [ 2456.632226][ T3041] __vmalloc_node_flags_caller+0x71/0x90 [ 2456.632241][ T3041] ? bpf_map_area_alloc+0x20/0x30 [ 2456.632260][ T3041] __bpf_map_area_alloc+0xde/0xf0 [ 2456.663086][ T3041] bpf_map_area_alloc+0x20/0x30 [ 2456.667960][ T3041] htab_map_alloc+0x8d3/0x11c0 [ 2456.672762][ T3041] ? htab_map_update_elem+0xca0/0xca0 [ 2456.678942][ T3041] __do_sys_bpf+0x478/0x3610 [ 2456.683575][ T3041] ? bpf_prog_load+0x1960/0x1960 [ 2456.688623][ T3041] ? __kasan_check_write+0x14/0x20 [ 2456.693765][ T3041] ? __mutex_unlock_slowpath+0xf0/0x6a0 18:04:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x4000, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2456.699330][ T3041] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2456.704643][ T3041] ? wait_for_completion+0x440/0x440 [ 2456.709961][ T3041] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2456.716234][ T3041] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2456.722159][ T3041] ? do_syscall_64+0x26/0x790 [ 2456.726838][ T3041] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2456.733151][ T3041] ? do_syscall_64+0x26/0x790 [ 2456.737860][ T3041] __x64_sys_bpf+0x73/0xb0 [ 2456.742306][ T3041] do_syscall_64+0xfa/0x790 [ 2456.746847][ T3041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2456.752758][ T3041] RIP: 0033:0x45a919 [ 2456.756680][ T3041] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2456.776300][ T3041] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2456.785365][ T3041] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2456.793348][ T3041] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 18:04:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6000, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:43 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xa00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2456.801337][ T3041] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2456.809314][ T3041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2456.817302][ T3041] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000018, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:43 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xe00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:43 executing program 3 (fault-call:1 fault-nth:14): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x2, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2457.178037][ T3086] FAULT_INJECTION: forcing a failure. [ 2457.178037][ T3086] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2457.244080][ T3086] CPU: 0 PID: 3086 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2457.252744][ T3086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2457.262907][ T3086] Call Trace: [ 2457.266224][ T3086] dump_stack+0x197/0x210 [ 2457.270564][ T3086] should_fail.cold+0xa/0x15 [ 2457.275164][ T3086] ? fault_create_debugfs_attr+0x180/0x180 [ 2457.281011][ T3086] ? ___might_sleep+0x163/0x2c0 [ 2457.286086][ T3086] should_fail_alloc_page+0x50/0x60 [ 2457.291294][ T3086] __alloc_pages_nodemask+0x1a1/0x910 [ 2457.296691][ T3086] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2457.302250][ T3086] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2457.307973][ T3086] ? kasan_unpoison_shadow+0x35/0x50 [ 2457.315297][ T3086] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2457.321604][ T3086] alloc_pages_current+0x107/0x210 [ 2457.326756][ T3086] ? ___might_sleep+0x163/0x2c0 [ 2457.331686][ T3086] __vmalloc_node_range+0x4f8/0x810 [ 2457.336934][ T3086] ? bpf_map_area_alloc+0x20/0x30 [ 2457.341967][ T3086] __vmalloc_node_flags_caller+0x71/0x90 [ 2457.347946][ T3086] ? bpf_map_area_alloc+0x20/0x30 [ 2457.353114][ T3086] __bpf_map_area_alloc+0xde/0xf0 [ 2457.358163][ T3086] bpf_map_area_alloc+0x20/0x30 [ 2457.363019][ T3086] htab_map_alloc+0x8d3/0x11c0 [ 2457.367792][ T3086] ? htab_map_update_elem+0xca0/0xca0 [ 2457.373217][ T3086] __do_sys_bpf+0x478/0x3610 [ 2457.377847][ T3086] ? bpf_prog_load+0x1960/0x1960 [ 2457.382929][ T3086] ? __kasan_check_write+0x14/0x20 [ 2457.388076][ T3086] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2457.393629][ T3086] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2457.398958][ T3086] ? wait_for_completion+0x440/0x440 [ 2457.404319][ T3086] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2457.410574][ T3086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2457.416076][ T3086] ? do_syscall_64+0x26/0x790 [ 2457.420807][ T3086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2457.427098][ T3086] ? do_syscall_64+0x26/0x790 [ 2457.431889][ T3086] __x64_sys_bpf+0x73/0xb0 [ 2457.436329][ T3086] do_syscall_64+0xfa/0x790 [ 2457.440847][ T3086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2457.446795][ T3086] RIP: 0033:0x45a919 [ 2457.451102][ T3086] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2457.471965][ T3086] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2457.480388][ T3086] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2457.488444][ T3086] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2457.496415][ T3086] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2457.504535][ T3086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2457.512507][ T3086] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6004, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:44 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x1100, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000021, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:44 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r1 = socket$kcm(0x2b, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r1) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0xbf67, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x51089, 0x0, 0x0, 0x0, 0x3ffc}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp, 0x1, 0x2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x20, 0x1f, 0x5, 0x81, 0x0, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x4, 0xa80}, 0x29082, 0x0, 0x8d, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x1, r4, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r5, 0x0, 0x1, &(0x7f0000000080)='\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001680)={r2, r3, 0x0, 0xe, &(0x7f0000001640)='memory.events\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='nr0\x01\x00', r6}, 0x30) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) r10 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r10, &(0x7f0000000380)=0x81, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000200)='/dev/net/tun\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r7, r8, 0x0, 0x5, &(0x7f00000001c0)='nr0\x01\x00', r11}, 0x30) write$cgroup_subtree(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="000486dd0761cb01ada644b4620aba4124b81b32a8c21dad628de5e89dedfda3e4ede636ace0477742e04bc5315c33f17a28ceda2cf03c9ae975e7c48a1d2f2852450218cfd635fa61ce756be2d2a242d67cbfb8fad01dbfe4af7d21e070388afbff92b43cc079e41154d451cc541fee818fc4d6f6770cc080b8cace5168ed0dd238275b215276db1718533bf55085da966e4d67a36118a3c9fb5406000000f269a94317db48a23cff44195813c4fa130e8fb9d576d52ede60c91ed6f57cbd48f406b44c00"], 0x90ad) 18:04:44 executing program 3 (fault-call:1 fault-nth:15): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2457.765630][ T3105] FAULT_INJECTION: forcing a failure. [ 2457.765630][ T3105] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2457.826036][ T3105] CPU: 1 PID: 3105 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2457.834811][ T3105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2457.845246][ T3105] Call Trace: [ 2457.848810][ T3105] dump_stack+0x197/0x210 [ 2457.848832][ T3105] should_fail.cold+0xa/0x15 [ 2457.848853][ T3105] ? fault_create_debugfs_attr+0x180/0x180 [ 2457.863684][ T3105] ? ___might_sleep+0x163/0x2c0 [ 2457.868577][ T3105] should_fail_alloc_page+0x50/0x60 [ 2457.873809][ T3105] __alloc_pages_nodemask+0x1a1/0x910 [ 2457.879435][ T3105] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2457.885032][ T3105] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2457.890929][ T3105] ? kasan_unpoison_shadow+0x35/0x50 [ 2457.890949][ T3105] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2457.890968][ T3105] alloc_pages_current+0x107/0x210 [ 2457.890982][ T3105] ? ___might_sleep+0x163/0x2c0 [ 2457.891002][ T3105] __vmalloc_node_range+0x4f8/0x810 [ 2457.891028][ T3105] ? bpf_map_area_alloc+0x20/0x30 [ 2457.891050][ T3105] __vmalloc_node_flags_caller+0x71/0x90 [ 2457.902588][ T3105] ? bpf_map_area_alloc+0x20/0x30 [ 2457.902606][ T3105] __bpf_map_area_alloc+0xde/0xf0 [ 2457.902623][ T3105] bpf_map_area_alloc+0x20/0x30 [ 2457.902639][ T3105] htab_map_alloc+0x8d3/0x11c0 [ 2457.902672][ T3105] ? htab_map_update_elem+0xca0/0xca0 [ 2457.955390][ T3105] __do_sys_bpf+0x478/0x3610 [ 2457.960243][ T3105] ? bpf_prog_load+0x1960/0x1960 [ 2457.965193][ T3105] ? __kasan_check_write+0x14/0x20 [ 2457.970541][ T3105] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2457.976186][ T3105] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2457.981559][ T3105] ? wait_for_completion+0x440/0x440 [ 2457.986900][ T3105] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2457.993502][ T3105] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2457.999060][ T3105] ? do_syscall_64+0x26/0x790 [ 2458.003767][ T3105] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2458.011136][ T3105] ? do_syscall_64+0x26/0x790 [ 2458.015820][ T3105] __x64_sys_bpf+0x73/0xb0 [ 2458.020290][ T3105] do_syscall_64+0xfa/0x790 [ 2458.024829][ T3105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2458.030806][ T3105] RIP: 0033:0x45a919 [ 2458.034813][ T3105] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2458.054674][ T3105] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2458.063085][ T3105] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 18:04:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x80fe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000022, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x4, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:44 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x1200, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2458.071092][ T3105] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2458.079187][ T3105] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2458.087533][ T3105] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2458.095602][ T3105] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x5, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000030, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xac05, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:44 executing program 3 (fault-call:1 fault-nth:16): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:44 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3004, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2458.545422][ T3149] FAULT_INJECTION: forcing a failure. [ 2458.545422][ T3149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2458.585914][ T3149] CPU: 1 PID: 3149 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2458.594658][ T3149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2458.604760][ T3149] Call Trace: [ 2458.608369][ T3149] dump_stack+0x197/0x210 [ 2458.612826][ T3149] should_fail.cold+0xa/0x15 [ 2458.617632][ T3149] ? fault_create_debugfs_attr+0x180/0x180 [ 2458.623594][ T3149] ? ___might_sleep+0x163/0x2c0 [ 2458.628494][ T3149] should_fail_alloc_page+0x50/0x60 [ 2458.633821][ T3149] __alloc_pages_nodemask+0x1a1/0x910 [ 2458.639221][ T3149] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2458.644795][ T3149] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2458.650560][ T3149] ? kasan_unpoison_shadow+0x35/0x50 [ 2458.656092][ T3149] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2458.662347][ T3149] alloc_pages_current+0x107/0x210 [ 2458.662362][ T3149] ? ___might_sleep+0x163/0x2c0 [ 2458.662379][ T3149] __vmalloc_node_range+0x4f8/0x810 [ 2458.662403][ T3149] ? bpf_map_area_alloc+0x20/0x30 [ 2458.662417][ T3149] __vmalloc_node_flags_caller+0x71/0x90 [ 2458.662436][ T3149] ? bpf_map_area_alloc+0x20/0x30 [ 2458.688670][ T3149] __bpf_map_area_alloc+0xde/0xf0 [ 2458.698945][ T3149] bpf_map_area_alloc+0x20/0x30 [ 2458.703824][ T3149] htab_map_alloc+0x8d3/0x11c0 [ 2458.708747][ T3149] ? htab_map_update_elem+0xca0/0xca0 [ 2458.714147][ T3149] __do_sys_bpf+0x478/0x3610 [ 2458.718802][ T3149] ? bpf_prog_load+0x1960/0x1960 [ 2458.723765][ T3149] ? __kasan_check_write+0x14/0x20 [ 2458.728907][ T3149] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2458.734780][ T3149] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2458.740103][ T3149] ? wait_for_completion+0x440/0x440 [ 2458.745431][ T3149] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2458.751804][ T3149] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2458.757294][ T3149] ? do_syscall_64+0x26/0x790 [ 2458.762019][ T3149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2458.768213][ T3149] ? do_syscall_64+0x26/0x790 [ 2458.773004][ T3149] __x64_sys_bpf+0x73/0xb0 [ 2458.777469][ T3149] do_syscall_64+0xfa/0x790 [ 2458.782012][ T3149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2458.788018][ T3149] RIP: 0033:0x45a919 [ 2458.791957][ T3149] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2458.811674][ T3149] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2458.820204][ T3149] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2458.828205][ T3149] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2458.836203][ T3149] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2458.844333][ T3149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2458.852355][ T3149] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:45 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$cgroup_subtree(r4, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000540)=ANY=[@ANYRES32=r5, @ANYRES64=r1, @ANYRESHEX, @ANYRES64=0x0, @ANYRESDEC=r6, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYBLOB="f43bbcc85a0ffadd1dd45cfcd1d41003ca7d343c65a8ae1cda25988482b01ea1d2e24def99a02d2ea2e80820001c28185380bbb3189aa7a58b61ecd899b08dd14e7ed6b6df37387f1d6808846b58eddab2ca19a186dc653c"], @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES16=r7, @ANYRESDEC, @ANYRESOCT=0x0, @ANYRES16=r1, @ANYPTR, @ANYBLOB="45f3843df78512c19bb02c7f510eb858e8b14730934c86794d4efdc5cf72eac8d30148af208013e75483e10b7d4369258c6c0ef54046fdc4988904938a8051ed5f1e642dac035688842ebaac89f2ecf768dead0df3b04710b3a82f9698565d0d75c6075416ff3ef873502e9ef3a9c80b0e390103510e73", @ANYRES64, @ANYRESDEC=r8, @ANYRESOCT=r9, @ANYRES64], @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESDEC=r1, @ANYRES32, @ANYPTR64, @ANYBLOB="b0fca846bf7fd133a910267052a96c1706f0463902d310ac36b545a5f60e86004d473c2fbe8cf4ff190e0619"]]], 0x8) close(r0) 18:04:45 executing program 3 (fault-call:1 fault-nth:17): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:45 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3804, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xc0fe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x7, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000060, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2459.084356][ T3168] FAULT_INJECTION: forcing a failure. [ 2459.084356][ T3168] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:45 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3f00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x8, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2459.145604][ T3168] CPU: 1 PID: 3168 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2459.154253][ T3168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2459.165694][ T3168] Call Trace: [ 2459.169173][ T3168] dump_stack+0x197/0x210 [ 2459.173561][ T3168] should_fail.cold+0xa/0x15 [ 2459.178334][ T3168] ? fault_create_debugfs_attr+0x180/0x180 [ 2459.184260][ T3168] ? ___might_sleep+0x163/0x2c0 [ 2459.189673][ T3168] should_fail_alloc_page+0x50/0x60 18:04:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000000a0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfc00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2459.194942][ T3168] __alloc_pages_nodemask+0x1a1/0x910 [ 2459.200654][ T3168] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2459.206323][ T3168] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2459.212792][ T3168] ? kasan_unpoison_shadow+0x35/0x50 [ 2459.218114][ T3168] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2459.224503][ T3168] alloc_pages_current+0x107/0x210 [ 2459.229644][ T3168] ? ___might_sleep+0x163/0x2c0 [ 2459.234532][ T3168] __vmalloc_node_range+0x4f8/0x810 [ 2459.239784][ T3168] ? bpf_map_area_alloc+0x20/0x30 [ 2459.244968][ T3168] __vmalloc_node_flags_caller+0x71/0x90 [ 2459.250634][ T3168] ? bpf_map_area_alloc+0x20/0x30 [ 2459.255834][ T3168] __bpf_map_area_alloc+0xde/0xf0 [ 2459.261082][ T3168] bpf_map_area_alloc+0x20/0x30 [ 2459.266062][ T3168] htab_map_alloc+0x8d3/0x11c0 [ 2459.271036][ T3168] ? htab_map_update_elem+0xca0/0xca0 [ 2459.276530][ T3168] __do_sys_bpf+0x478/0x3610 [ 2459.281155][ T3168] ? bpf_prog_load+0x1960/0x1960 [ 2459.286125][ T3168] ? __kasan_check_write+0x14/0x20 [ 2459.291358][ T3168] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2459.297059][ T3168] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2459.302725][ T3168] ? wait_for_completion+0x440/0x440 [ 2459.308296][ T3168] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2459.314887][ T3168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2459.320469][ T3168] ? do_syscall_64+0x26/0x790 [ 2459.325187][ T3168] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2459.331275][ T3168] ? do_syscall_64+0x26/0x790 [ 2459.337027][ T3168] __x64_sys_bpf+0x73/0xb0 [ 2459.341468][ T3168] do_syscall_64+0xfa/0x790 18:04:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000000c0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:45 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x4000, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2459.345998][ T3168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2459.351907][ T3168] RIP: 0033:0x45a919 [ 2459.356059][ T3168] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2459.375699][ T3168] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2459.384572][ T3168] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2459.393379][ T3168] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2459.401871][ T3168] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2459.410131][ T3168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2459.418485][ T3168] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:46 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000001c0)=""/192) 18:04:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfe80, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:46 executing program 3 (fault-call:1 fault-nth:18): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x9, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000000e0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:46 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6000, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2460.017605][ T3211] FAULT_INJECTION: forcing a failure. [ 2460.017605][ T3211] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2460.031919][ T3211] CPU: 1 PID: 3211 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2460.040692][ T3211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2460.040700][ T3211] Call Trace: [ 2460.040727][ T3211] dump_stack+0x197/0x210 [ 2460.040747][ T3211] should_fail.cold+0xa/0x15 [ 2460.040765][ T3211] ? fault_create_debugfs_attr+0x180/0x180 [ 2460.040784][ T3211] ? ___might_sleep+0x163/0x2c0 [ 2460.040811][ T3211] should_fail_alloc_page+0x50/0x60 [ 2460.040826][ T3211] __alloc_pages_nodemask+0x1a1/0x910 [ 2460.040844][ T3211] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2460.040866][ T3211] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2460.040887][ T3211] ? kasan_unpoison_shadow+0x35/0x50 [ 2460.040910][ T3211] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2460.109882][ T3211] alloc_pages_current+0x107/0x210 [ 2460.115025][ T3211] ? ___might_sleep+0x163/0x2c0 [ 2460.120013][ T3211] __vmalloc_node_range+0x4f8/0x810 [ 2460.120039][ T3211] ? bpf_map_area_alloc+0x20/0x30 [ 2460.120056][ T3211] __vmalloc_node_flags_caller+0x71/0x90 [ 2460.120071][ T3211] ? bpf_map_area_alloc+0x20/0x30 [ 2460.120095][ T3211] __bpf_map_area_alloc+0xde/0xf0 [ 2460.146213][ T3211] bpf_map_area_alloc+0x20/0x30 [ 2460.151184][ T3211] htab_map_alloc+0x8d3/0x11c0 [ 2460.156222][ T3211] ? htab_map_update_elem+0xca0/0xca0 [ 2460.161625][ T3211] __do_sys_bpf+0x478/0x3610 [ 2460.166247][ T3211] ? bpf_prog_load+0x1960/0x1960 [ 2460.171225][ T3211] ? __kasan_check_write+0x14/0x20 [ 2460.176362][ T3211] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2460.181954][ T3211] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2460.187356][ T3211] ? wait_for_completion+0x440/0x440 [ 2460.192671][ T3211] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2460.192700][ T3211] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2460.205502][ T3211] ? do_syscall_64+0x26/0x790 [ 2460.210299][ T3211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 18:04:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000120, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:46 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6004, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2460.210316][ T3211] ? do_syscall_64+0x26/0x790 [ 2460.210337][ T3211] __x64_sys_bpf+0x73/0xb0 [ 2460.210358][ T3211] do_syscall_64+0xfa/0x790 [ 2460.230179][ T3211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2460.236080][ T3211] RIP: 0033:0x45a919 [ 2460.236098][ T3211] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2460.236105][ T3211] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:04:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xa, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfec0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2460.236120][ T3211] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2460.236128][ T3211] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2460.236143][ T3211] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2460.260170][ T3211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2460.260179][ T3211] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:46 executing program 3 (fault-call:1 fault-nth:19): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:46 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x80fe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2460.558569][ T3249] FAULT_INJECTION: forcing a failure. [ 2460.558569][ T3249] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2460.592615][ T3249] CPU: 1 PID: 3249 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2460.601437][ T3249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2460.611515][ T3249] Call Trace: [ 2460.614842][ T3249] dump_stack+0x197/0x210 [ 2460.619207][ T3249] should_fail.cold+0xa/0x15 [ 2460.623932][ T3249] ? fault_create_debugfs_attr+0x180/0x180 [ 2460.623950][ T3249] ? ___might_sleep+0x163/0x2c0 [ 2460.623975][ T3249] should_fail_alloc_page+0x50/0x60 [ 2460.623988][ T3249] __alloc_pages_nodemask+0x1a1/0x910 [ 2460.624002][ T3249] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2460.624018][ T3249] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2460.624041][ T3249] ? kasan_unpoison_shadow+0x35/0x50 [ 2460.624060][ T3249] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2460.624079][ T3249] alloc_pages_current+0x107/0x210 [ 2460.624092][ T3249] ? ___might_sleep+0x163/0x2c0 [ 2460.624112][ T3249] __vmalloc_node_range+0x4f8/0x810 [ 2460.624139][ T3249] ? bpf_map_area_alloc+0x20/0x30 [ 2460.624156][ T3249] __vmalloc_node_flags_caller+0x71/0x90 [ 2460.624172][ T3249] ? bpf_map_area_alloc+0x20/0x30 [ 2460.624187][ T3249] __bpf_map_area_alloc+0xde/0xf0 [ 2460.624206][ T3249] bpf_map_area_alloc+0x20/0x30 [ 2460.709807][ T3249] htab_map_alloc+0x8d3/0x11c0 [ 2460.714721][ T3249] ? htab_map_update_elem+0xca0/0xca0 [ 2460.720129][ T3249] __do_sys_bpf+0x478/0x3610 [ 2460.724915][ T3249] ? bpf_prog_load+0x1960/0x1960 [ 2460.730009][ T3249] ? __kasan_check_write+0x14/0x20 [ 2460.735154][ T3249] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2460.740734][ T3249] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2460.746052][ T3249] ? wait_for_completion+0x440/0x440 [ 2460.751393][ T3249] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2460.757767][ T3249] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2460.763344][ T3249] ? do_syscall_64+0x26/0x790 [ 2460.768042][ T3249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2460.774695][ T3249] ? do_syscall_64+0x26/0x790 [ 2460.779587][ T3249] __x64_sys_bpf+0x73/0xb0 [ 2460.784156][ T3249] do_syscall_64+0xfa/0x790 [ 2460.788686][ T3249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2460.794616][ T3249] RIP: 0033:0x45a919 [ 2460.798719][ T3249] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2460.820171][ T3249] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2460.820187][ T3249] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2460.820195][ T3249] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2460.820203][ T3249] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2460.820211][ T3249] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2460.820219][ T3249] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000140, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xff00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:47 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xac05, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:47 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x101, 0x81, 0x5, 0x5}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0004860101"], 0x90ad) 18:04:47 executing program 3 (fault-call:1 fault-nth:20): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2461.089588][ T3264] FAULT_INJECTION: forcing a failure. [ 2461.089588][ T3264] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2461.118941][ T3264] CPU: 0 PID: 3264 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2461.127744][ T3264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2461.138095][ T3264] Call Trace: [ 2461.141424][ T3264] dump_stack+0x197/0x210 [ 2461.145878][ T3264] should_fail.cold+0xa/0x15 [ 2461.151360][ T3264] ? fault_create_debugfs_attr+0x180/0x180 [ 2461.157281][ T3264] ? ___might_sleep+0x163/0x2c0 [ 2461.162174][ T3264] should_fail_alloc_page+0x50/0x60 [ 2461.168273][ T3264] __alloc_pages_nodemask+0x1a1/0x910 [ 2461.174187][ T3264] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2461.174205][ T3264] ? __alloc_pages_slowpath+0x2920/0x2920 18:04:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000160, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x10, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2461.174228][ T3264] ? kasan_unpoison_shadow+0x35/0x50 [ 2461.174245][ T3264] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2461.174269][ T3264] alloc_pages_current+0x107/0x210 [ 2461.191288][ T3264] ? ___might_sleep+0x163/0x2c0 [ 2461.191316][ T3264] __vmalloc_node_range+0x4f8/0x810 [ 2461.191342][ T3264] ? bpf_map_area_alloc+0x20/0x30 [ 2461.191357][ T3264] __vmalloc_node_flags_caller+0x71/0x90 [ 2461.191378][ T3264] ? bpf_map_area_alloc+0x20/0x30 [ 2461.218518][ T3264] __bpf_map_area_alloc+0xde/0xf0 [ 2461.218538][ T3264] bpf_map_area_alloc+0x20/0x30 [ 2461.218559][ T3264] htab_map_alloc+0x8d3/0x11c0 [ 2461.230087][ T3264] ? htab_map_update_elem+0xca0/0xca0 [ 2461.230105][ T3264] __do_sys_bpf+0x478/0x3610 [ 2461.230126][ T3264] ? bpf_prog_load+0x1960/0x1960 [ 2461.240090][ T3264] ? __kasan_check_write+0x14/0x20 [ 2461.240105][ T3264] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2461.240120][ T3264] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2461.240136][ T3264] ? wait_for_completion+0x440/0x440 [ 2461.240161][ T3264] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2461.270924][ T3264] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2461.270942][ T3264] ? do_syscall_64+0x26/0x790 [ 2461.270960][ T3264] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2461.270972][ T3264] ? do_syscall_64+0x26/0x790 [ 2461.270994][ T3264] __x64_sys_bpf+0x73/0xb0 [ 2461.288885][ T3264] do_syscall_64+0xfa/0x790 [ 2461.299358][ T3264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2461.299373][ T3264] RIP: 0033:0x45a919 [ 2461.299388][ T3264] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2461.299402][ T3264] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2461.329164][ T3264] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2461.329175][ T3264] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2461.329185][ T3264] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2461.329195][ T3264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2461.329204][ T3264] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xc0fe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x11, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000180, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:48 executing program 3 (fault-call:1 fault-nth:21): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfc00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x12, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x2, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2461.778138][ T3316] FAULT_INJECTION: forcing a failure. [ 2461.778138][ T3316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:48 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x0, 0x74, 0x9, 0x1}, {0xbb, 0xe7, 0x6, 0x9}, {0x9, 0x7, 0x4, 0x4}, {0x912, 0x4, 0x9, 0xea}, {0x9, 0x0, 0x5, 0x16dd}, {0xfff9, 0x2, 0x5, 0x6}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00040137e5"], 0x90ad) 18:04:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000001a0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2461.885932][ T3316] CPU: 1 PID: 3316 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2461.894580][ T3316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2461.904676][ T3316] Call Trace: [ 2461.908206][ T3316] dump_stack+0x197/0x210 [ 2461.912684][ T3316] should_fail.cold+0xa/0x15 [ 2461.917405][ T3316] ? fault_create_debugfs_attr+0x180/0x180 [ 2461.923241][ T3316] ? ___might_sleep+0x163/0x2c0 [ 2461.928138][ T3316] should_fail_alloc_page+0x50/0x60 [ 2461.933376][ T3316] __alloc_pages_nodemask+0x1a1/0x910 [ 2461.938842][ T3316] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2461.944608][ T3316] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2461.950976][ T3316] ? kasan_unpoison_shadow+0x35/0x50 [ 2461.956406][ T3316] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2461.962684][ T3316] alloc_pages_current+0x107/0x210 [ 2461.968037][ T3316] ? ___might_sleep+0x163/0x2c0 [ 2461.972926][ T3316] __vmalloc_node_range+0x4f8/0x810 [ 2461.978524][ T3316] ? bpf_map_area_alloc+0x20/0x30 [ 2461.983673][ T3316] __vmalloc_node_flags_caller+0x71/0x90 [ 2461.989350][ T3316] ? bpf_map_area_alloc+0x20/0x30 [ 2462.013944][ T3316] __bpf_map_area_alloc+0xde/0xf0 [ 2462.019128][ T3316] bpf_map_area_alloc+0x20/0x30 [ 2462.024016][ T3316] htab_map_alloc+0x8d3/0x11c0 [ 2462.028825][ T3316] ? htab_map_update_elem+0xca0/0xca0 [ 2462.034512][ T3316] __do_sys_bpf+0x478/0x3610 [ 2462.039177][ T3316] ? bpf_prog_load+0x1960/0x1960 [ 2462.044274][ T3316] ? __kasan_check_write+0x14/0x20 [ 2462.049416][ T3316] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2462.054981][ T3316] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2462.060291][ T3316] ? wait_for_completion+0x440/0x440 [ 2462.060317][ T3316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2462.060345][ T3316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2462.060360][ T3316] ? do_syscall_64+0x26/0x790 [ 2462.060375][ T3316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2462.060390][ T3316] ? do_syscall_64+0x26/0x790 [ 2462.060412][ T3316] __x64_sys_bpf+0x73/0xb0 [ 2462.060427][ T3316] do_syscall_64+0xfa/0x790 [ 2462.060451][ T3316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2462.082765][ T3316] RIP: 0033:0x45a919 [ 2462.082782][ T3316] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:04:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfe80, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000001c0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x60, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2462.082798][ T3316] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2462.134821][ T3316] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2462.134831][ T3316] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2462.134839][ T3316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2462.134847][ T3316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2462.134864][ T3316] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfc, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:48 executing program 3 (fault-call:1 fault-nth:22): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000001e0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfec0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2462.493359][ T3372] FAULT_INJECTION: forcing a failure. [ 2462.493359][ T3372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x300, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2462.574453][ T3372] CPU: 0 PID: 3372 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2462.584313][ T3372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2462.594483][ T3372] Call Trace: [ 2462.597811][ T3372] dump_stack+0x197/0x210 [ 2462.602245][ T3372] should_fail.cold+0xa/0x15 [ 2462.606870][ T3372] ? fault_create_debugfs_attr+0x180/0x180 [ 2462.612912][ T3372] ? ___might_sleep+0x163/0x2c0 [ 2462.612941][ T3372] should_fail_alloc_page+0x50/0x60 [ 2462.612955][ T3372] __alloc_pages_nodemask+0x1a1/0x910 [ 2462.612970][ T3372] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2462.612993][ T3372] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2462.641243][ T3372] ? kasan_unpoison_shadow+0x35/0x50 [ 2462.646680][ T3372] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2462.653052][ T3372] alloc_pages_current+0x107/0x210 [ 2462.658189][ T3372] ? ___might_sleep+0x163/0x2c0 [ 2462.663076][ T3372] __vmalloc_node_range+0x4f8/0x810 [ 2462.668371][ T3372] ? bpf_map_area_alloc+0x20/0x30 [ 2462.673433][ T3372] __vmalloc_node_flags_caller+0x71/0x90 [ 2462.679097][ T3372] ? bpf_map_area_alloc+0x20/0x30 [ 2462.684155][ T3372] __bpf_map_area_alloc+0xde/0xf0 [ 2462.689215][ T3372] bpf_map_area_alloc+0x20/0x30 [ 2462.694271][ T3372] htab_map_alloc+0x8d3/0x11c0 [ 2462.699347][ T3372] ? htab_map_update_elem+0xca0/0xca0 [ 2462.704765][ T3372] __do_sys_bpf+0x478/0x3610 [ 2462.710089][ T3372] ? bpf_prog_load+0x1960/0x1960 [ 2462.715059][ T3372] ? __kasan_check_write+0x14/0x20 [ 2462.720212][ T3372] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2462.725934][ T3372] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2462.731253][ T3372] ? wait_for_completion+0x440/0x440 [ 2462.736580][ T3372] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2462.744548][ T3372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2462.750039][ T3372] ? do_syscall_64+0x26/0x790 [ 2462.755182][ T3372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2462.761296][ T3372] ? do_syscall_64+0x26/0x790 [ 2462.766266][ T3372] __x64_sys_bpf+0x73/0xb0 [ 2462.770692][ T3372] do_syscall_64+0xfa/0x790 [ 2462.770715][ T3372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2462.770726][ T3372] RIP: 0033:0x45a919 [ 2462.770741][ T3372] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2462.770753][ T3372] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2462.814081][ T3372] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 18:04:49 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000000)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xa, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, [@map, @ldst={0x4, 0x3, 0x2, 0x7cb787813097e053, 0xfe35b0a5d2b9459, 0x80, 0xffffffffffffffff}, @generic={0xff, 0x6, 0x8, 0x5, 0x8}, @jmp={0x5, 0x0, 0x0, 0x6, 0x8, 0xffffffffffffffe0, 0xfffffffffffffffc}, @map={0x18, 0x8, 0x1, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000440)=""/4096, 0x41000, 0x2, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x7, 0x3, 0x1}, 0x10, 0x0, r3}, 0x78) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000340)=r5) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xff00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x430, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2462.822602][ T3372] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2462.831003][ T3372] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2462.839086][ T3372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2462.847078][ T3372] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000220, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:49 executing program 3 (fault-call:1 fault-nth:23): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x438, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2463.107995][ T3413] FAULT_INJECTION: forcing a failure. [ 2463.107995][ T3413] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2463.177744][ T3413] CPU: 0 PID: 3413 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2463.187364][ T3413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2463.198138][ T3413] Call Trace: [ 2463.201667][ T3413] dump_stack+0x197/0x210 [ 2463.206473][ T3413] should_fail.cold+0xa/0x15 [ 2463.211388][ T3413] ? fault_create_debugfs_attr+0x180/0x180 [ 2463.218495][ T3413] ? ___might_sleep+0x163/0x2c0 18:04:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000240, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x2, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2463.223485][ T3413] should_fail_alloc_page+0x50/0x60 [ 2463.229081][ T3413] __alloc_pages_nodemask+0x1a1/0x910 [ 2463.234840][ T3413] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2463.240524][ T3413] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2463.246275][ T3413] ? kasan_unpoison_shadow+0x35/0x50 [ 2463.251594][ T3413] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2463.258573][ T3413] alloc_pages_current+0x107/0x210 [ 2463.263718][ T3413] ? ___might_sleep+0x163/0x2c0 [ 2463.268749][ T3413] __vmalloc_node_range+0x4f8/0x810 18:04:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000260, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2463.273995][ T3413] ? bpf_map_area_alloc+0x20/0x30 [ 2463.279153][ T3413] __vmalloc_node_flags_caller+0x71/0x90 [ 2463.284817][ T3413] ? bpf_map_area_alloc+0x20/0x30 [ 2463.290179][ T3413] __bpf_map_area_alloc+0xde/0xf0 [ 2463.295245][ T3413] bpf_map_area_alloc+0x20/0x30 [ 2463.300127][ T3413] htab_map_alloc+0x8d3/0x11c0 [ 2463.304935][ T3413] ? htab_map_update_elem+0xca0/0xca0 [ 2463.310448][ T3413] __do_sys_bpf+0x478/0x3610 [ 2463.315411][ T3413] ? bpf_prog_load+0x1960/0x1960 [ 2463.320500][ T3413] ? __kasan_check_write+0x14/0x20 [ 2463.325650][ T3413] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2463.331416][ T3413] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2463.336882][ T3413] ? wait_for_completion+0x440/0x440 [ 2463.342206][ T3413] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2463.348504][ T3413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2463.354228][ T3413] ? do_syscall_64+0x26/0x790 [ 2463.358937][ T3413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2463.365880][ T3413] ? do_syscall_64+0x26/0x790 [ 2463.370767][ T3413] __x64_sys_bpf+0x73/0xb0 [ 2463.375220][ T3413] do_syscall_64+0xfa/0x790 [ 2463.380104][ T3413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2463.386019][ T3413] RIP: 0033:0x45a919 [ 2463.389969][ T3413] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2463.409941][ T3413] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2463.418533][ T3413] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2463.426688][ T3413] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2463.434827][ T3413] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2463.443175][ T3413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2463.451319][ T3413] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000280, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x460, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x7, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:50 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000a40)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000ac0)=""/215, 0xd7}], 0x1}, 0x10000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d40)={r4, 0x10, &(0x7f0000000d00)={&(0x7f0000000c80)=""/82, 0x52, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r8 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x13, 0x7, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x1f}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x45}]}, &(0x7f0000000dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000e40)={0x5, 0x1, 0x9c3, 0xa54b}, 0x10, 0xffffffffffffffff, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0xa, 0x6, &(0x7f0000000040)=@raw=[@ldst={0x0, 0x0, 0x1, 0x7, 0x1, 0x80, 0x39f0da6f4187f9cc}, @exit, @map={0x18, 0xe8712474cfd4edef}, @jmp={0x5, 0x1, 0x6, 0xb, 0x2, 0x20, 0x8}, @generic={0x9, 0xe, 0x9, 0x262, 0x7ff}], &(0x7f0000000100)='GPL\x00', 0x3ff, 0x0, 0x0, 0x41000, 0x10, [], r1, 0x8, r2, 0x8, &(0x7f0000000c00)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x4, 0x3, 0x1, 0x1}, 0x10, r6, r9}, 0x78) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:50 executing program 3 (fault-call:1 fault-nth:24): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2463.863644][ T3460] FAULT_INJECTION: forcing a failure. [ 2463.863644][ T3460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2463.883826][ T3460] CPU: 0 PID: 3460 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2463.892943][ T3460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2463.903546][ T3460] Call Trace: [ 2463.907137][ T3460] dump_stack+0x197/0x210 [ 2463.911502][ T3460] should_fail.cold+0xa/0x15 [ 2463.916218][ T3460] ? fault_create_debugfs_attr+0x180/0x180 [ 2463.922063][ T3460] ? ___might_sleep+0x163/0x2c0 [ 2463.926974][ T3460] should_fail_alloc_page+0x50/0x60 [ 2463.932433][ T3460] __alloc_pages_nodemask+0x1a1/0x910 [ 2463.937839][ T3460] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2463.943418][ T3460] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2463.949290][ T3460] ? kasan_unpoison_shadow+0x35/0x50 [ 2463.954610][ T3460] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 18:04:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x500, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2463.960886][ T3460] alloc_pages_current+0x107/0x210 [ 2463.966026][ T3460] ? ___might_sleep+0x163/0x2c0 [ 2463.971081][ T3460] __vmalloc_node_range+0x4f8/0x810 [ 2463.976319][ T3460] ? bpf_map_area_alloc+0x20/0x30 [ 2463.981369][ T3460] __vmalloc_node_flags_caller+0x71/0x90 [ 2463.987119][ T3460] ? bpf_map_area_alloc+0x20/0x30 [ 2463.992173][ T3460] __bpf_map_area_alloc+0xde/0xf0 [ 2463.997224][ T3460] bpf_map_area_alloc+0x20/0x30 [ 2464.002109][ T3460] htab_map_alloc+0x8d3/0x11c0 [ 2464.006916][ T3460] ? htab_map_update_elem+0xca0/0xca0 18:04:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000002a0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x8, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2464.012406][ T3460] __do_sys_bpf+0x478/0x3610 [ 2464.017200][ T3460] ? bpf_prog_load+0x1960/0x1960 [ 2464.022170][ T3460] ? __kasan_check_write+0x14/0x20 [ 2464.022188][ T3460] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2464.022208][ T3460] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2464.022224][ T3460] ? wait_for_completion+0x440/0x440 [ 2464.022251][ T3460] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2464.049847][ T3460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2464.055428][ T3460] ? do_syscall_64+0x26/0x790 [ 2464.060258][ T3460] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2464.066341][ T3460] ? do_syscall_64+0x26/0x790 [ 2464.066364][ T3460] __x64_sys_bpf+0x73/0xb0 [ 2464.066384][ T3460] do_syscall_64+0xfa/0x790 [ 2464.066413][ T3460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2464.086145][ T3460] RIP: 0033:0x45a919 [ 2464.090063][ T3460] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2464.110148][ T3460] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2464.110164][ T3460] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2464.110174][ T3460] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2464.110183][ T3460] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2464.110192][ T3460] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2464.110201][ T3460] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x5ac, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x9, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000002c0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x600, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:51 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[], 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0xc1, 0xe1, 0x3, 0x6}, {0x40, 0x80, 0x40, 0xfffffffe}, {0xd4, 0x9, 0x4, 0x659b}, {0x3, 0x8, 0x4, 0x4}, {0x584, 0x9b, 0x6, 0x2}, {0x9, 0x80, 0x81, 0x200}, {0x8, 0x20, 0x5, 0x4c48}]}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) 18:04:51 executing program 3 (fault-call:1 fault-nth:25): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:51 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x7, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000002e0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x700, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2464.853277][ T3552] FAULT_INJECTION: forcing a failure. [ 2464.853277][ T3552] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2464.890853][ T3552] CPU: 1 PID: 3552 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2464.899506][ T3552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2464.909580][ T3552] Call Trace: [ 2464.912901][ T3552] dump_stack+0x197/0x210 [ 2464.917263][ T3552] should_fail.cold+0xa/0x15 [ 2464.921973][ T3552] ? fault_create_debugfs_attr+0x180/0x180 [ 2464.927900][ T3552] ? ___might_sleep+0x163/0x2c0 [ 2464.932878][ T3552] should_fail_alloc_page+0x50/0x60 [ 2464.938114][ T3552] __alloc_pages_nodemask+0x1a1/0x910 [ 2464.944082][ T3552] ? rcu_read_lock_sched_held+0x9c/0xd0 18:04:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x10, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2464.949663][ T3552] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2464.955420][ T3552] ? kasan_unpoison_shadow+0x35/0x50 [ 2464.960816][ T3552] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2464.967287][ T3552] alloc_pages_current+0x107/0x210 [ 2464.972552][ T3552] ? ___might_sleep+0x163/0x2c0 [ 2464.977439][ T3552] __vmalloc_node_range+0x4f8/0x810 [ 2464.982681][ T3552] ? bpf_map_area_alloc+0x20/0x30 [ 2464.987736][ T3552] __vmalloc_node_flags_caller+0x71/0x90 [ 2464.993702][ T3552] ? bpf_map_area_alloc+0x20/0x30 [ 2464.998772][ T3552] __bpf_map_area_alloc+0xde/0xf0 [ 2465.003828][ T3552] bpf_map_area_alloc+0x20/0x30 [ 2465.008737][ T3552] htab_map_alloc+0x8d3/0x11c0 [ 2465.013649][ T3552] ? htab_map_update_elem+0xca0/0xca0 [ 2465.019140][ T3552] __do_sys_bpf+0x478/0x3610 [ 2465.023864][ T3552] ? bpf_prog_load+0x1960/0x1960 [ 2465.028834][ T3552] ? __kasan_check_write+0x14/0x20 [ 2465.034341][ T3552] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2465.040875][ T3552] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2465.046661][ T3552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2465.053046][ T3552] ? debug_smp_processor_id+0x33/0x18a [ 2465.058619][ T3552] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2465.064830][ T3552] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2465.070328][ T3552] ? do_syscall_64+0x26/0x790 [ 2465.076309][ T3552] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2465.082418][ T3552] ? do_syscall_64+0x26/0x790 [ 2465.087733][ T3552] __x64_sys_bpf+0x73/0xb0 [ 2465.092346][ T3552] do_syscall_64+0xfa/0x790 [ 2465.097441][ T3552] entry_SYSCALL_64_after_hwframe+0x49/0xbe 18:04:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x11, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2465.104257][ T3552] RIP: 0033:0x45a919 [ 2465.108696][ T3552] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2465.129461][ T3552] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2465.137901][ T3552] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2465.145894][ T3552] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 18:04:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x900, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:51 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x8, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000300, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2465.154064][ T3552] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2465.162198][ T3552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2465.170236][ T3552] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000031e, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:52 executing program 3 (fault-call:1 fault-nth:26): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x60, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xa00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:52 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x9, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfc, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2465.655470][ T3606] FAULT_INJECTION: forcing a failure. [ 2465.655470][ T3606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xe00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:52 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xa9, 0x5, 0x1, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r1, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x0, 0x4, 0x0, r1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r3}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r3, 0x0, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000001c0)='./file0\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xa9, 0x5, 0x1, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r5, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r5, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x0, 0x4, 0x0, r5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r7, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r10 = socket$kcm(0x2, 0x1, 0x84) close(r10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r12 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f00000002c0)=r11, 0x161) r13 = openat$cgroup(r11, &(0x7f0000001b80)='syz0\x00', 0x200002, 0x0) r14 = openat$cgroup_ro(r13, &(0x7f0000001b40)='cpuset.memory_pressure\x00', 0x2761, 0x0) r15 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r15, 0x10d, 0xb, &(0x7f0000000000)=r14, 0x4) setsockopt$sock_attach_bpf(r10, 0x10d, 0xb, &(0x7f0000000000)=r14, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r14, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r17 = socket$kcm(0x2, 0x1, 0x84) close(r17) r18 = socket$kcm(0xa, 0x6, 0x0) r19 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r18, 0x10d, 0xb, &(0x7f0000000000)=r19, 0xb) setsockopt$sock_attach_bpf(r17, 0x10d, 0xb, &(0x7f0000000000)=r19, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa45}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, @generic={0x3, 0x1, 0x2, 0x3, 0x7fffffff}, @alu={0x0, 0x1, 0x0, 0x3, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r8, 0x19, r9, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r16, r19}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r16}, 0xfffffff8) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r21 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r21, 0x1, 0x3e, &(0x7f00000002c0)=r20, 0x161) r22 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0xf, 0x5, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf4c}, [@exit, @generic={0x6, 0x4, 0xb, 0x8, 0xffff}]}, &(0x7f0000001440)='GPL\x00', 0x401, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000001480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000014c0)={0x1, 0xb, 0x2, 0x1}, 0x10, r16, r20}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000340)='nr0\x01\x00', r22}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r23}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r23, 0x4, 0x4}, 0xc) r24 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r25 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r25, 0x1, 0x3e, &(0x7f00000002c0)=r24, 0x161) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r24, 0x25, &(0x7f0000000100)}, 0xb181069bf68759f8) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000320, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:52 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2465.757760][ T3606] CPU: 0 PID: 3606 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2465.766741][ T3606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2465.776914][ T3606] Call Trace: [ 2465.780350][ T3606] dump_stack+0x197/0x210 [ 2465.780371][ T3606] should_fail.cold+0xa/0x15 [ 2465.780390][ T3606] ? fault_create_debugfs_attr+0x180/0x180 [ 2465.780406][ T3606] ? ___might_sleep+0x163/0x2c0 [ 2465.780430][ T3606] should_fail_alloc_page+0x50/0x60 [ 2465.805368][ T3606] __alloc_pages_nodemask+0x1a1/0x910 [ 2465.805385][ T3606] ? find_held_lock+0x35/0x130 [ 2465.805405][ T3606] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2465.821737][ T3606] ? lock_downgrade+0x920/0x920 [ 2465.826644][ T3606] ? rwlock_bug.part.0+0x90/0x90 [ 2465.831628][ T3606] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2465.837995][ T3606] alloc_pages_current+0x107/0x210 [ 2465.843146][ T3606] __get_free_pages+0xc/0x40 [ 2465.847935][ T3606] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2465.853839][ T3606] apply_to_page_range+0x445/0x700 [ 2465.859160][ T3606] ? memset+0x40/0x40 [ 2465.863265][ T3606] kasan_populate_vmalloc+0x68/0x90 [ 2465.871517][ T3606] __vmalloc_node_range+0x47e/0x810 [ 2465.871549][ T3606] ? bpf_map_area_alloc+0x20/0x30 [ 2465.871566][ T3606] __vmalloc_node_flags_caller+0x71/0x90 [ 2465.871580][ T3606] ? bpf_map_area_alloc+0x20/0x30 [ 2465.871600][ T3606] __bpf_map_area_alloc+0xde/0xf0 [ 2465.898372][ T3606] bpf_map_area_alloc+0x20/0x30 [ 2465.903355][ T3606] htab_map_alloc+0x8d3/0x11c0 [ 2465.908474][ T3606] ? htab_map_update_elem+0xca0/0xca0 [ 2465.913870][ T3606] __do_sys_bpf+0x478/0x3610 [ 2465.918578][ T3606] ? bpf_prog_load+0x1960/0x1960 [ 2465.923820][ T3606] ? __kasan_check_write+0x14/0x20 [ 2465.928960][ T3606] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2465.934547][ T3606] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2465.939936][ T3606] ? wait_for_completion+0x440/0x440 [ 2465.939962][ T3606] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2465.939991][ T3606] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2465.940017][ T3606] ? do_syscall_64+0x26/0x790 [ 2465.957321][ T3606] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2465.957345][ T3606] ? do_syscall_64+0x26/0x790 [ 2465.972881][ T3606] __x64_sys_bpf+0x73/0xb0 [ 2465.977342][ T3606] do_syscall_64+0xfa/0x790 [ 2465.982071][ T3606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2465.988074][ T3606] RIP: 0033:0x45a919 18:04:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x1100, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2465.991986][ T3606] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2465.991995][ T3606] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2465.992014][ T3606] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2465.992025][ T3606] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2465.992033][ T3606] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2465.992041][ T3606] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 18:04:52 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2465.992055][ T3606] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000340, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:52 executing program 3 (fault-call:1 fault-nth:27): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x300, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x1200, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000360, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:52 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x10, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2466.405358][ T3648] FAULT_INJECTION: forcing a failure. [ 2466.405358][ T3648] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x430, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2466.459520][ T3648] CPU: 0 PID: 3648 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2466.468269][ T3648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2466.478760][ T3648] Call Trace: [ 2466.482133][ T3648] dump_stack+0x197/0x210 [ 2466.482156][ T3648] should_fail.cold+0xa/0x15 [ 2466.482173][ T3648] ? fault_create_debugfs_attr+0x180/0x180 [ 2466.482195][ T3648] ? ___might_sleep+0x163/0x2c0 [ 2466.502014][ T3648] should_fail_alloc_page+0x50/0x60 [ 2466.507244][ T3648] __alloc_pages_nodemask+0x1a1/0x910 [ 2466.512650][ T3648] ? find_held_lock+0x35/0x130 [ 2466.517710][ T3648] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2466.523467][ T3648] ? lock_downgrade+0x920/0x920 [ 2466.528448][ T3648] ? rwlock_bug.part.0+0x90/0x90 [ 2466.533414][ T3648] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2466.539775][ T3648] alloc_pages_current+0x107/0x210 [ 2466.544944][ T3648] __get_free_pages+0xc/0x40 [ 2466.549775][ T3648] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2466.549801][ T3648] apply_to_page_range+0x445/0x700 [ 2466.561147][ T3648] ? memset+0x40/0x40 [ 2466.565258][ T3648] kasan_populate_vmalloc+0x68/0x90 [ 2466.570491][ T3648] __vmalloc_node_range+0x47e/0x810 [ 2466.575725][ T3648] ? bpf_map_area_alloc+0x20/0x30 [ 2466.580786][ T3648] __vmalloc_node_flags_caller+0x71/0x90 [ 2466.586840][ T3648] ? bpf_map_area_alloc+0x20/0x30 [ 2466.591889][ T3648] __bpf_map_area_alloc+0xde/0xf0 [ 2466.591907][ T3648] bpf_map_area_alloc+0x20/0x30 [ 2466.591922][ T3648] htab_map_alloc+0x8d3/0x11c0 [ 2466.591948][ T3648] ? htab_map_update_elem+0xca0/0xca0 [ 2466.591969][ T3648] __do_sys_bpf+0x478/0x3610 [ 2466.617046][ T3648] ? bpf_prog_load+0x1960/0x1960 [ 2466.622018][ T3648] ? __kasan_check_write+0x14/0x20 [ 2466.627161][ T3648] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2466.632735][ T3648] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2466.638046][ T3648] ? wait_for_completion+0x440/0x440 [ 2466.643358][ T3648] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2466.643386][ T3648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2466.643407][ T3648] ? do_syscall_64+0x26/0x790 [ 2466.660034][ T3648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2466.666128][ T3648] ? do_syscall_64+0x26/0x790 [ 2466.670844][ T3648] __x64_sys_bpf+0x73/0xb0 [ 2466.675305][ T3648] do_syscall_64+0xfa/0x790 [ 2466.679849][ T3648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2466.685765][ T3648] RIP: 0033:0x45a919 [ 2466.689720][ T3648] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2466.710236][ T3648] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2466.719632][ T3648] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2466.727712][ T3648] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2466.727722][ T3648] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2466.727731][ T3648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2466.727746][ T3648] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:53 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000000)="09aaae32e0e388769caba44a0c846f26ca201eb9a8a5", &(0x7f00000001c0)="b2a280df31aa4940545f151569cb2305b25c542dfd93fcb1ceb44deec7bf27aa9b37366e643068489a39ad981bd2773cc3a62a9984bb49596da8715f27785430248df27b1b407e5f7fe80baf73c5f077fad7c7011834cbb0cc9d58ea0481307061bcc57f623056ecb8bbf289f7e267048d124f0cd35959ec56bd85506a3c6774e071d9e574e7a400474e4d34993e33968e4710d95244dd6008eddc454756bad06afe8c", 0x1}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000380)={0x5, &(0x7f0000000340)=[{0x8000, 0x8, 0x8, 0xffffffc5}, {0x8001, 0xff, 0x1f, 0x1f}, {0x800, 0x7f, 0x18, 0x401}, {0x401, 0x2, 0xfa, 0xfffff364}, {0x4, 0x1, 0x7f, 0x1}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0xffffffffffffff50) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmsg(r4, &(0x7f0000007980)={&(0x7f0000003580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007880)=[{&(0x7f0000003600)=""/163, 0xa3}, {&(0x7f00000036c0)=""/254, 0xfe}, {&(0x7f00000037c0)=""/70, 0x46}, {&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000004840)=""/4096, 0x1000}, {&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/4096, 0x1000}, {&(0x7f0000007840)=""/10, 0xa}], 0x8, &(0x7f0000007900)=""/83, 0x53}, 0x2003) sendmsg$inet(r1, &(0x7f00000007c0)={&(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000440)="a04da9d0b75da3eace69f33e5d52c92cafcea5f9d3f98ac2d488a526", 0x1c}, {&(0x7f0000000480)="944fb69acd260bc873", 0x9}, {&(0x7f00000004c0)="2666b351c77dc7", 0x7}, {&(0x7f0000000500)="073595ae8aaa0d14ef936534d081591311445c7a4e266af957ca79a012f99eec077b54a3046180db8c4518ffbecea7c36c23702ee0bb8968403fba3ebd46a0b7299acfc1271a04e9e3ae331bd6a89a0327f551d2712dbd83475ff550fe0b8f32eb1668ff20c72dcd42bd1e7b59347425bce176595bd88ef3f28a3782d4987ff5e32be1f14fd66344c4cd657bd6259a2218461688c40107bd92fee21fbf7af83c5d05d68a1eefdb833b35ba8daafe76104fa4d3ebb770016f481e0032e515c015c7be8ce4fb42969c839e", 0xca}, {&(0x7f0000000600)="f00249981910c0d2a8cce50cb3daef188a6c77e1f627a618c360e7cfb1f1a503ffc987c675a60353e8250ed50a7d593f2e94a4ed0ce1a7f225d3c4be9e5549ae384513908798c5047663c807788a479bd50e6c631d18b5d33a7d277fa735b60886d910c6edf03b4804a8cf28c1de5733555defd44675b50b41c47745868610f88db19f442d5ac9af826d64140acaede7384f81f5fefef0aa059ce5648d188719aab79725b5351416854033cc1fb5cb873a9192c8b2e6dabce91efcc1fdc79eea9ec1ef38", 0xc4}], 0x5, &(0x7f0000000780)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @rand_addr, @local}}}], 0x20}, 0x44) write$cgroup_subtree(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="1564d84a287dbd31600ca8eec059d7bd6b3efa9948657fbd6efdfa38b5be6205209b2b0ce50fed61533e8110fbfec1eb6bee638b1c02f8e4caaff33746184588797a456975d87145433f9bdf8dacdaf13108cea6d78308c096747d414057d293507a16f72728a44c5fab09749b3d3289f74c5b696f01917abc68fda58bf6a25eb4f9c2cf6dc555d95dc66698d3ec44668738def51edcfa3760463fa6af4c1e90aea341f22085bbfbf3b88d1172975015b1ff3c6cb1a7f91734cc2a9e6e30fb5a00aa6207cb233b9324c128845687900de812123a480136515f2efbe35aea9a0ba522bb0b4a2b66a5e6394ad3796a4b88aef0278843b2b97a15f67673c1506cbf89fd1767c654ecf296fac0e473d403abcc0fb1c6e0f78293bee9fda273b60f49487aab590bc72c30b2fb320ff3c1a936d784553da3545b128a59ca945029787fed1c2a72157a509da9a4d6b6d84c7fa7f0c368c8b3694a59adb62831752788196383e9fe72fe3fd8809862e25ad5d63b20"], 0xffffffffffffff89) 18:04:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3004, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x438, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000380, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:53 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x11, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:53 executing program 3 (fault-call:1 fault-nth:28): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3804, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:53 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x12, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x460, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000003a0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2467.078843][ T3688] FAULT_INJECTION: forcing a failure. [ 2467.078843][ T3688] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x3f00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2467.194353][ T3688] CPU: 0 PID: 3688 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2467.204109][ T3688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2467.217010][ T3688] Call Trace: [ 2467.220339][ T3688] dump_stack+0x197/0x210 [ 2467.224795][ T3688] should_fail.cold+0xa/0x15 [ 2467.229419][ T3688] ? fault_create_debugfs_attr+0x180/0x180 [ 2467.235253][ T3688] ? ___might_sleep+0x163/0x2c0 18:04:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x4000, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2467.240142][ T3688] should_fail_alloc_page+0x50/0x60 [ 2467.245369][ T3688] __alloc_pages_nodemask+0x1a1/0x910 [ 2467.250777][ T3688] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2467.256538][ T3688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2467.262819][ T3688] ? find_next_bit+0x107/0x130 [ 2467.267621][ T3688] pcpu_populate_chunk+0xf8/0x940 [ 2467.272689][ T3688] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2467.278576][ T3688] ? find_next_bit+0xc7/0x130 [ 2467.283286][ T3688] pcpu_alloc+0xd5b/0x1380 [ 2467.287740][ T3688] ? pcpu_alloc_area+0x820/0x820 [ 2467.292707][ T3688] ? bpf_map_area_alloc+0x20/0x30 [ 2467.297777][ T3688] __alloc_percpu_gfp+0x28/0x30 [ 2467.302804][ T3688] htab_map_alloc+0xdb9/0x11c0 [ 2467.307700][ T3688] ? htab_map_update_elem+0xca0/0xca0 [ 2467.313103][ T3688] __do_sys_bpf+0x478/0x3610 [ 2467.317910][ T3688] ? bpf_prog_load+0x1960/0x1960 [ 2467.322877][ T3688] ? __kasan_check_write+0x14/0x20 [ 2467.328020][ T3688] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2467.333597][ T3688] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2467.339173][ T3688] ? wait_for_completion+0x440/0x440 [ 2467.344500][ T3688] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2467.350792][ T3688] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2467.356287][ T3688] ? do_syscall_64+0x26/0x790 [ 2467.360999][ T3688] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2467.367148][ T3688] ? do_syscall_64+0x26/0x790 [ 2467.371995][ T3688] __x64_sys_bpf+0x73/0xb0 [ 2467.376567][ T3688] do_syscall_64+0xfa/0x790 [ 2467.381086][ T3688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2467.387085][ T3688] RIP: 0033:0x45a919 [ 2467.390997][ T3688] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2467.410613][ T3688] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2467.419196][ T3688] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2467.427369][ T3688] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2467.435459][ T3688] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2467.444150][ T3688] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2467.453807][ T3688] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:54 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c", 0x5}, 0x19) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6000, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000003c0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:54 executing program 3 (fault-call:1 fault-nth:29): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x60, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x500, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2467.967663][ T3728] FAULT_INJECTION: forcing a failure. [ 2467.967663][ T3728] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x6004, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2468.021449][ T3728] CPU: 0 PID: 3728 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2468.030181][ T3728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2468.040251][ T3728] Call Trace: [ 2468.043565][ T3728] dump_stack+0x197/0x210 [ 2468.047918][ T3728] should_fail.cold+0xa/0x15 [ 2468.052534][ T3728] ? fault_create_debugfs_attr+0x180/0x180 [ 2468.058376][ T3728] ? ___might_sleep+0x163/0x2c0 [ 2468.063279][ T3728] should_fail_alloc_page+0x50/0x60 18:04:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5ac, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2468.063299][ T3728] __alloc_pages_nodemask+0x1a1/0x910 [ 2468.073851][ T3728] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2468.073875][ T3728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2468.073890][ T3728] ? find_next_bit+0x107/0x130 [ 2468.073914][ T3728] pcpu_populate_chunk+0xf8/0x940 [ 2468.095807][ T3728] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2468.101552][ T3728] ? find_next_bit+0xc7/0x130 [ 2468.106261][ T3728] pcpu_alloc+0xd5b/0x1380 [ 2468.110707][ T3728] ? pcpu_alloc_area+0x820/0x820 [ 2468.115662][ T3728] ? bpf_map_area_alloc+0x20/0x30 [ 2468.120733][ T3728] __alloc_percpu_gfp+0x28/0x30 [ 2468.120750][ T3728] htab_map_alloc+0xdb9/0x11c0 [ 2468.120778][ T3728] ? htab_map_update_elem+0xca0/0xca0 [ 2468.120802][ T3728] __do_sys_bpf+0x478/0x3610 [ 2468.140838][ T3728] ? bpf_prog_load+0x1960/0x1960 [ 2468.145820][ T3728] ? __kasan_check_write+0x14/0x20 [ 2468.150956][ T3728] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2468.156528][ T3728] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2468.161832][ T3728] ? wait_for_completion+0x440/0x440 18:04:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000003e0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x80fe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2468.167151][ T3728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2468.173425][ T3728] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2468.179081][ T3728] ? do_syscall_64+0x26/0x790 [ 2468.183766][ T3728] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2468.189852][ T3728] ? do_syscall_64+0x26/0x790 [ 2468.189876][ T3728] __x64_sys_bpf+0x73/0xb0 [ 2468.189894][ T3728] do_syscall_64+0xfa/0x790 [ 2468.189913][ T3728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2468.189929][ T3728] RIP: 0033:0x45a919 [ 2468.213631][ T3728] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2468.233327][ T3728] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2468.233341][ T3728] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2468.233350][ T3728] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2468.233358][ T3728] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:04:54 executing program 3 (fault-call:1 fault-nth:30): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfc, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2468.233367][ T3728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2468.233375][ T3728] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 2468.422734][ T3760] FAULT_INJECTION: forcing a failure. [ 2468.422734][ T3760] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2468.474855][ T3760] CPU: 1 PID: 3760 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2468.483493][ T3760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2468.493567][ T3760] Call Trace: [ 2468.496882][ T3760] dump_stack+0x197/0x210 [ 2468.501270][ T3760] should_fail.cold+0xa/0x15 [ 2468.505887][ T3760] ? fault_create_debugfs_attr+0x180/0x180 [ 2468.511807][ T3760] ? ___might_sleep+0x163/0x2c0 [ 2468.516778][ T3760] should_fail_alloc_page+0x50/0x60 [ 2468.521999][ T3760] __alloc_pages_nodemask+0x1a1/0x910 [ 2468.528616][ T3760] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2468.534456][ T3760] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2468.540717][ T3760] ? find_next_bit+0x107/0x130 [ 2468.545503][ T3760] pcpu_populate_chunk+0xf8/0x940 [ 2468.550547][ T3760] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2468.556279][ T3760] ? find_next_bit+0xc7/0x130 [ 2468.561350][ T3760] pcpu_alloc+0xd5b/0x1380 [ 2468.565806][ T3760] ? pcpu_alloc_area+0x820/0x820 [ 2468.570765][ T3760] ? bpf_map_area_alloc+0x20/0x30 [ 2468.575818][ T3760] __alloc_percpu_gfp+0x28/0x30 [ 2468.580690][ T3760] htab_map_alloc+0xdb9/0x11c0 [ 2468.585488][ T3760] ? htab_map_update_elem+0xca0/0xca0 [ 2468.590878][ T3760] __do_sys_bpf+0x478/0x3610 [ 2468.595481][ T3760] ? bpf_prog_load+0x1960/0x1960 [ 2468.600422][ T3760] ? __kasan_check_write+0x14/0x20 [ 2468.605537][ T3760] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2468.611084][ T3760] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2468.616363][ T3760] ? wait_for_completion+0x440/0x440 [ 2468.621644][ T3760] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2468.627892][ T3760] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2468.633345][ T3760] ? do_syscall_64+0x26/0x790 [ 2468.638008][ T3760] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2468.644069][ T3760] ? do_syscall_64+0x26/0x790 [ 2468.648758][ T3760] __x64_sys_bpf+0x73/0xb0 [ 2468.653165][ T3760] do_syscall_64+0xfa/0x790 [ 2468.657672][ T3760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2468.663547][ T3760] RIP: 0033:0x45a919 [ 2468.667440][ T3760] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2468.687040][ T3760] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2468.695438][ T3760] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2468.703527][ T3760] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2468.711493][ T3760] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2468.719501][ T3760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2468.727468][ T3760] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x600, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000500, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:55 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x300, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xac05, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:55 executing program 3 (fault-call:1 fault-nth:31): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:55 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) ioctl$TUNSETFILTEREBPF(r1, 0x6628, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r2, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r5 = socket$kcm(0x2, 0x1, 0x84) close(r5) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r6, 0xb) setsockopt$sock_attach_bpf(r5, 0x10d, 0xb, &(0x7f0000000000)=r6, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r6, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r8 = socket$kcm(0x2, 0x1, 0x84) close(r8) r9 = socket$kcm(0xa, 0x6, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r9, 0x10d, 0xb, &(0x7f0000000000)=r10, 0xb) setsockopt$sock_attach_bpf(r8, 0x10d, 0xb, &(0x7f0000000000)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa45}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, @generic={0x3, 0x1, 0x2, 0x3, 0x7fffffff}, @alu={0x0, 0x1, 0x0, 0x3, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r3, 0x19, r4, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r7, r10}, 0x78) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r12 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f00000002c0)=r11, 0x161) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r13, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r16 = socket$kcm(0x2, 0x1, 0x84) close(r16) r17 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r17, 0xb) setsockopt$sock_attach_bpf(r16, 0x10d, 0xb, &(0x7f0000000000)=r17, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r17, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r19 = socket$kcm(0x2, 0x1, 0x84) close(r19) r20 = socket$kcm(0xa, 0x6, 0x0) r21 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r20, 0x10d, 0xb, &(0x7f0000000000)=r21, 0xb) setsockopt$sock_attach_bpf(r19, 0x10d, 0xb, &(0x7f0000000000)=r21, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa45}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, @generic={0x3, 0x1, 0x2, 0x3, 0x7fffffff}, @alu={0x0, 0x1, 0x0, 0x3, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r14, 0x19, r15, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r18, r21}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r18}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r11, 0x10, &(0x7f0000000300)={&(0x7f0000000440)=""/4096, 0x1000, r18}}, 0x10) r23 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x17, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401}, [@map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x2a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001}, @alu={0x7, 0x1, 0x7, 0x4, 0x4, 0xfffffffffffffee0, 0xfffffffffffffff8}, @ldst={0x2, 0x6, 0x1, 0xb, 0x5, 0x200, 0x10}, @call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f0000000000)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x4, [], r3, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x1, 0xffffffff, 0x80000001}, 0x10, r22, r23}, 0x78) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xc0fe, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2469.186799][ T3782] FAULT_INJECTION: forcing a failure. [ 2469.186799][ T3782] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2469.228477][ T3782] CPU: 0 PID: 3782 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2469.237222][ T3782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2469.247362][ T3782] Call Trace: [ 2469.250827][ T3782] dump_stack+0x197/0x210 [ 2469.255187][ T3782] should_fail.cold+0xa/0x15 [ 2469.259805][ T3782] ? fault_create_debugfs_attr+0x180/0x180 [ 2469.265648][ T3782] ? ___might_sleep+0x163/0x2c0 [ 2469.270506][ T3782] should_fail_alloc_page+0x50/0x60 [ 2469.270520][ T3782] __alloc_pages_nodemask+0x1a1/0x910 [ 2469.270537][ T3782] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2469.270559][ T3782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2469.270580][ T3782] ? find_next_bit+0x107/0x130 [ 2469.298029][ T3782] pcpu_populate_chunk+0xf8/0x940 [ 2469.303077][ T3782] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2469.308905][ T3782] ? find_next_bit+0xc7/0x130 [ 2469.313621][ T3782] pcpu_alloc+0xd5b/0x1380 [ 2469.318084][ T3782] ? pcpu_alloc_area+0x820/0x820 [ 2469.323060][ T3782] ? bpf_map_area_alloc+0x20/0x30 [ 2469.323094][ T3782] __alloc_percpu_gfp+0x28/0x30 [ 2469.323120][ T3782] htab_map_alloc+0xdb9/0x11c0 [ 2469.337787][ T3782] ? htab_map_update_elem+0xca0/0xca0 [ 2469.343189][ T3782] __do_sys_bpf+0x478/0x3610 [ 2469.347808][ T3782] ? bpf_prog_load+0x1960/0x1960 [ 2469.352770][ T3782] ? __kasan_check_write+0x14/0x20 [ 2469.357901][ T3782] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2469.363482][ T3782] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2469.368896][ T3782] ? wait_for_completion+0x440/0x440 [ 2469.374229][ T3782] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2469.380538][ T3782] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2469.386057][ T3782] ? do_syscall_64+0x26/0x790 [ 2469.390762][ T3782] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2469.396846][ T3782] ? do_syscall_64+0x26/0x790 [ 2469.401547][ T3782] __x64_sys_bpf+0x73/0xb0 [ 2469.406010][ T3782] do_syscall_64+0xfa/0x790 [ 2469.410538][ T3782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2469.416432][ T3782] RIP: 0033:0x45a919 18:04:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000600, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfc00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x430, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2469.420329][ T3782] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2469.420338][ T3782] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2469.420352][ T3782] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2469.420360][ T3782] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2469.420369][ T3782] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:04:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x700, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2469.420383][ T3782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2469.480271][ T3782] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000700, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:56 executing program 3 (fault-call:1 fault-nth:32): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfe80, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x438, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x900, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2469.776142][ T3816] FAULT_INJECTION: forcing a failure. [ 2469.776142][ T3816] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000900, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2469.853634][ T3816] CPU: 0 PID: 3816 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2469.862273][ T3816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2469.872340][ T3816] Call Trace: [ 2469.875653][ T3816] dump_stack+0x197/0x210 [ 2469.879997][ T3816] should_fail.cold+0xa/0x15 [ 2469.880016][ T3816] ? fault_create_debugfs_attr+0x180/0x180 [ 2469.880031][ T3816] ? ___might_sleep+0x163/0x2c0 [ 2469.880061][ T3816] should_fail_alloc_page+0x50/0x60 [ 2469.890522][ T3816] __alloc_pages_nodemask+0x1a1/0x910 [ 2469.890540][ T3816] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2469.890562][ T3816] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2469.890577][ T3816] ? find_next_bit+0x107/0x130 [ 2469.890599][ T3816] pcpu_populate_chunk+0xf8/0x940 [ 2469.927697][ T3816] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2469.933422][ T3816] ? find_next_bit+0xc7/0x130 [ 2469.933446][ T3816] pcpu_alloc+0xd5b/0x1380 [ 2469.933474][ T3816] ? pcpu_alloc_area+0x820/0x820 [ 2469.947485][ T3816] ? bpf_map_area_alloc+0x20/0x30 [ 2469.952541][ T3816] __alloc_percpu_gfp+0x28/0x30 [ 2469.957405][ T3816] htab_map_alloc+0xdb9/0x11c0 [ 2469.962185][ T3816] ? htab_map_update_elem+0xca0/0xca0 [ 2469.962202][ T3816] __do_sys_bpf+0x478/0x3610 [ 2469.962223][ T3816] ? bpf_prog_load+0x1960/0x1960 [ 2469.977098][ T3816] ? __kasan_check_write+0x14/0x20 [ 2469.982238][ T3816] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2469.988180][ T3816] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2469.993867][ T3816] ? wait_for_completion+0x440/0x440 [ 2469.999185][ T3816] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2470.005501][ T3816] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2470.011001][ T3816] ? do_syscall_64+0x26/0x790 [ 2470.015697][ T3816] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2470.021787][ T3816] ? do_syscall_64+0x26/0x790 [ 2470.026540][ T3816] __x64_sys_bpf+0x73/0xb0 [ 2470.030985][ T3816] do_syscall_64+0xfa/0x790 [ 2470.035525][ T3816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2470.041442][ T3816] RIP: 0033:0x45a919 [ 2470.045358][ T3816] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2470.065673][ T3816] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2470.074138][ T3816] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2470.082119][ T3816] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2470.090076][ T3816] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2470.098043][ T3816] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2470.106006][ T3816] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:56 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000340)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r2, &(0x7f00000001c0)="02c23371655386f8342841d254fbad21475ec2c70ae4829dfad0287ce7b2c9df645fda8b32e1696524c029975b91deceef334832174040401328ec249f6882b0f3eb98031ae47ae443ed73b8b2dac3e6e14758ce116a0400000000000000d5c59df3166c97e9700032745d9cea9daf92f8d87a4ffbf7f0c710091d523651cc49fea1a466834690ceae25fbfffffffffffffff9eda9e0f725bd91"}, 0x20) gettid() write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1a88000000"], 0x90ad) 18:04:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xfec0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:56 executing program 3 (fault-call:1 fault-nth:33): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000a00, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x460, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2470.356233][ T3846] FAULT_INJECTION: forcing a failure. [ 2470.356233][ T3846] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2470.402919][ T3846] CPU: 1 PID: 3846 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2470.411556][ T3846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2470.421624][ T3846] Call Trace: [ 2470.424935][ T3846] dump_stack+0x197/0x210 [ 2470.429283][ T3846] should_fail.cold+0xa/0x15 [ 2470.433889][ T3846] ? fault_create_debugfs_attr+0x180/0x180 [ 2470.439704][ T3846] ? ___might_sleep+0x163/0x2c0 [ 2470.444582][ T3846] should_fail_alloc_page+0x50/0x60 18:04:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xe00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000b00, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2470.449797][ T3846] __alloc_pages_nodemask+0x1a1/0x910 [ 2470.455203][ T3846] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2470.460975][ T3846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2470.467230][ T3846] ? find_next_bit+0x107/0x130 [ 2470.472020][ T3846] pcpu_populate_chunk+0xf8/0x940 [ 2470.477068][ T3846] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2470.482794][ T3846] ? find_next_bit+0xc7/0x130 [ 2470.482818][ T3846] pcpu_alloc+0xd5b/0x1380 [ 2470.482848][ T3846] ? pcpu_alloc_area+0x820/0x820 [ 2470.482867][ T3846] ? bpf_map_area_alloc+0x20/0x30 [ 2470.482902][ T3846] __alloc_percpu_gfp+0x28/0x30 [ 2470.506792][ T3846] htab_map_alloc+0xdb9/0x11c0 [ 2470.506826][ T3846] ? htab_map_update_elem+0xca0/0xca0 [ 2470.516976][ T3846] __do_sys_bpf+0x478/0x3610 [ 2470.521598][ T3846] ? bpf_prog_load+0x1960/0x1960 [ 2470.526638][ T3846] ? __kasan_check_write+0x14/0x20 [ 2470.531766][ T3846] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2470.537853][ T3846] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2470.543172][ T3846] ? wait_for_completion+0x440/0x440 [ 2470.548506][ T3846] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2470.554757][ T3846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2470.554775][ T3846] ? do_syscall_64+0x26/0x790 [ 2470.554792][ T3846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2470.554807][ T3846] ? do_syscall_64+0x26/0x790 [ 2470.554829][ T3846] __x64_sys_bpf+0x73/0xb0 [ 2470.554846][ T3846] do_syscall_64+0xfa/0x790 [ 2470.554868][ T3846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2470.554879][ T3846] RIP: 0033:0x45a919 18:04:57 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x500, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2470.554894][ T3846] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2470.554907][ T3846] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2470.622988][ T3846] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2470.622997][ T3846] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2470.623005][ T3846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:04:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xff00, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2470.623014][ T3846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2470.623021][ T3846] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000c00, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x1100, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:57 executing program 3 (fault-call:1 fault-nth:34): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:57 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5ac, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3004, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000d00, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:57 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r5, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r8 = socket$kcm(0x2, 0x1, 0x84) close(r8) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r9, 0xb) setsockopt$sock_attach_bpf(r8, 0x10d, 0xb, &(0x7f0000000000)=r9, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r9, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r11 = socket$kcm(0x2, 0x1, 0x84) close(r11) r12 = socket$kcm(0xa, 0x6, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r12, 0x10d, 0xb, &(0x7f0000000000)=r13, 0xb) setsockopt$sock_attach_bpf(r11, 0x10d, 0xb, &(0x7f0000000000)=r13, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa45}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, @generic={0x3, 0x1, 0x2, 0x3, 0x7fffffff}, @alu={0x0, 0x1, 0x0, 0x3, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r6, 0x19, r7, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r10, r13}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r10}, 0x78) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r15 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r15, 0x1, 0x3e, &(0x7f00000002c0)=r14, 0x161) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xa, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000010040000001081f0ff010000003d250800fcffffff0415ac00046e00000000a300000000000000e2ebf1fcffffff950000000000000001cc02950000000600000000000000000073025b2c8eb16ab3"], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x1a, &(0x7f0000000200)=""/26, 0x41000, 0x6, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000240)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x5, 0xfff, 0x4f4e}, 0x10, r10, r14}, 0x78) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000380)=r16) r17 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) close(r17) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) [ 2471.264080][ T3891] FAULT_INJECTION: forcing a failure. [ 2471.264080][ T3891] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:04:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000e00, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x2, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2471.364531][ T3891] CPU: 0 PID: 3891 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2471.373170][ T3891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2471.383237][ T3891] Call Trace: [ 2471.386536][ T3891] dump_stack+0x197/0x210 [ 2471.390865][ T3891] should_fail.cold+0xa/0x15 [ 2471.390883][ T3891] ? fault_create_debugfs_attr+0x180/0x180 [ 2471.390898][ T3891] ? ___might_sleep+0x163/0x2c0 [ 2471.390923][ T3891] should_fail_alloc_page+0x50/0x60 [ 2471.390941][ T3891] __alloc_pages_nodemask+0x1a1/0x910 [ 2471.417117][ T3891] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2471.423824][ T3891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2471.430082][ T3891] ? find_next_bit+0x107/0x130 [ 2471.435068][ T3891] pcpu_populate_chunk+0xf8/0x940 [ 2471.440106][ T3891] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2471.440124][ T3891] ? find_next_bit+0xc7/0x130 [ 2471.440148][ T3891] pcpu_alloc+0xd5b/0x1380 [ 2471.440172][ T3891] ? pcpu_alloc_area+0x820/0x820 [ 2471.440193][ T3891] ? bpf_map_area_alloc+0x20/0x30 [ 2471.459926][ T3891] __alloc_percpu_gfp+0x28/0x30 [ 2471.459946][ T3891] htab_map_alloc+0xdb9/0x11c0 [ 2471.459976][ T3891] ? htab_map_update_elem+0xca0/0xca0 [ 2471.459994][ T3891] __do_sys_bpf+0x478/0x3610 [ 2471.460021][ T3891] ? bpf_prog_load+0x1960/0x1960 [ 2471.489509][ T3891] ? __kasan_check_write+0x14/0x20 [ 2471.494638][ T3891] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2471.500220][ T3891] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2471.505612][ T3891] ? wait_for_completion+0x440/0x440 18:04:57 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x600, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3804, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2471.510924][ T3891] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2471.517372][ T3891] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2471.522860][ T3891] ? do_syscall_64+0x26/0x790 [ 2471.527554][ T3891] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2471.533641][ T3891] ? do_syscall_64+0x26/0x790 [ 2471.538324][ T3891] __x64_sys_bpf+0x73/0xb0 [ 2471.542752][ T3891] do_syscall_64+0xfa/0x790 [ 2471.548747][ T3891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2471.554643][ T3891] RIP: 0033:0x45a919 [ 2471.558553][ T3891] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2471.578177][ T3891] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2471.578192][ T3891] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2471.578200][ T3891] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2471.578208][ T3891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:04:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3f00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2471.578216][ T3891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2471.578224][ T3891] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:58 executing program 3 (fault-call:1 fault-nth:35): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000f00, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:58 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x700, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2471.846200][ T3938] FAULT_INJECTION: forcing a failure. [ 2471.846200][ T3938] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2471.890105][ T3938] CPU: 1 PID: 3938 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2471.898751][ T3938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2471.908816][ T3938] Call Trace: [ 2471.912156][ T3938] dump_stack+0x197/0x210 [ 2471.916508][ T3938] should_fail.cold+0xa/0x15 [ 2471.921293][ T3938] ? fault_create_debugfs_attr+0x180/0x180 [ 2471.927112][ T3938] ? ___might_sleep+0x163/0x2c0 [ 2471.931989][ T3938] should_fail_alloc_page+0x50/0x60 [ 2471.937198][ T3938] __alloc_pages_nodemask+0x1a1/0x910 [ 2471.942588][ T3938] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2471.948418][ T3938] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2471.954669][ T3938] ? find_next_bit+0x107/0x130 [ 2471.959425][ T3938] pcpu_populate_chunk+0xf8/0x940 [ 2471.964452][ T3938] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2471.970167][ T3938] ? find_next_bit+0xc7/0x130 [ 2471.974853][ T3938] pcpu_alloc+0xd5b/0x1380 [ 2471.979269][ T3938] ? pcpu_alloc_area+0x820/0x820 [ 2471.984199][ T3938] ? bpf_map_area_alloc+0x20/0x30 [ 2471.989218][ T3938] __alloc_percpu_gfp+0x28/0x30 [ 2471.994060][ T3938] htab_map_alloc+0xdb9/0x11c0 [ 2471.998915][ T3938] ? htab_map_update_elem+0xca0/0xca0 [ 2472.004432][ T3938] __do_sys_bpf+0x478/0x3610 [ 2472.009022][ T3938] ? bpf_prog_load+0x1960/0x1960 [ 2472.013949][ T3938] ? __kasan_check_write+0x14/0x20 [ 2472.019052][ T3938] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2472.024584][ T3938] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2472.030380][ T3938] ? wait_for_completion+0x440/0x440 [ 2472.035671][ T3938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2472.041906][ T3938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2472.047349][ T3938] ? do_syscall_64+0x26/0x790 [ 2472.052010][ T3938] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2472.058062][ T3938] ? do_syscall_64+0x26/0x790 [ 2472.062728][ T3938] __x64_sys_bpf+0x73/0xb0 [ 2472.067148][ T3938] do_syscall_64+0xfa/0x790 [ 2472.071643][ T3938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2472.077536][ T3938] RIP: 0033:0x45a919 [ 2472.081427][ T3938] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2472.101013][ T3938] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2472.109419][ T3938] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2472.117475][ T3938] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2472.125440][ T3938] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2472.133395][ T3938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 18:04:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001100, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2472.141349][ T3938] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:58 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000486dd0781c4842450329e7008caab599dec47c7fe13a2c03867a1740eac6981558fe12000000000f81f000098eeb60767c00c329abea3cd9dfd01bcb6d79a7ad90633977106db0b63d7fe86a2889d708564abe830657192368ce9c97c57ad1b61df5d00"], 0x5) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f00000001c0)={r6}) r7 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f00000000c0)=0x3ff) 18:04:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:58 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x900, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001200, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:59 executing program 3 (fault-call:1 fault-nth:36): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001300, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6004, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2472.726241][ T3991] FAULT_INJECTION: forcing a failure. [ 2472.726241][ T3991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2472.758340][ T3991] CPU: 1 PID: 3991 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2472.766991][ T3991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2472.777057][ T3991] Call Trace: [ 2472.780372][ T3991] dump_stack+0x197/0x210 [ 2472.784749][ T3991] should_fail.cold+0xa/0x15 [ 2472.789379][ T3991] ? fault_create_debugfs_attr+0x180/0x180 [ 2472.795204][ T3991] ? ___might_sleep+0x163/0x2c0 [ 2472.800087][ T3991] should_fail_alloc_page+0x50/0x60 [ 2472.805302][ T3991] __alloc_pages_nodemask+0x1a1/0x910 [ 2472.810704][ T3991] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2472.816459][ T3991] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2472.822714][ T3991] ? find_next_bit+0x107/0x130 [ 2472.827511][ T3991] pcpu_populate_chunk+0xf8/0x940 [ 2472.832554][ T3991] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2472.838289][ T3991] ? find_next_bit+0xc7/0x130 [ 2472.843102][ T3991] pcpu_alloc+0xd5b/0x1380 [ 2472.847556][ T3991] ? pcpu_alloc_area+0x820/0x820 [ 2472.852502][ T3991] ? bpf_map_area_alloc+0x20/0x30 [ 2472.857555][ T3991] __alloc_percpu_gfp+0x28/0x30 [ 2472.863455][ T3991] htab_map_alloc+0xdb9/0x11c0 [ 2472.863483][ T3991] ? htab_map_update_elem+0xca0/0xca0 [ 2472.863500][ T3991] __do_sys_bpf+0x478/0x3610 [ 2472.863519][ T3991] ? bpf_prog_load+0x1960/0x1960 [ 2472.863534][ T3991] ? __kasan_check_write+0x14/0x20 [ 2472.863549][ T3991] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2472.863563][ T3991] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2472.863584][ T3991] ? wait_for_completion+0x440/0x440 [ 2472.875198][ T3991] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2472.875229][ T3991] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2472.875245][ T3991] ? do_syscall_64+0x26/0x790 [ 2472.875261][ T3991] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2472.875276][ T3991] ? do_syscall_64+0x26/0x790 [ 2472.875297][ T3991] __x64_sys_bpf+0x73/0xb0 [ 2472.884902][ T3991] do_syscall_64+0xfa/0x790 [ 2472.884925][ T3991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2472.884942][ T3991] RIP: 0033:0x45a919 [ 2472.917842][ T3991] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:04:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001400, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:59 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000200)="4e422466ed63bac40dad40918ae13bcb13831b3d07ac67624b2c09544aa776bd1eb89dccded0ca8a62e84d2f9f4593a29c1b0430bb9d87f28660dfb5e7465ba71050fb713736f4a359d1d793beba551d6bf4fbd7aa448a38cdc050c18bffd07c858e5aa409c89b244f05f5f3501609b37890ea1294dbbe707fca"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'lapb0\x00', @dev={[], 0x1d}}) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:04:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xe00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001500, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2472.971524][ T3991] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2472.979958][ T3991] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2472.988121][ T3991] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2472.996201][ T3991] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2473.004179][ T3991] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2473.012182][ T3991] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:04:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001600, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:59 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x7, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x80fe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:59 executing program 3 (fault-call:1 fault-nth:37): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x1100, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:04:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001700, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:04:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xac05, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:00 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x1200, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:00 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x8, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2473.496968][ T4043] FAULT_INJECTION: forcing a failure. [ 2473.496968][ T4043] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2473.551784][ T4043] CPU: 0 PID: 4043 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2473.560859][ T4043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2473.560867][ T4043] Call Trace: [ 2473.560896][ T4043] dump_stack+0x197/0x210 [ 2473.560916][ T4043] should_fail.cold+0xa/0x15 [ 2473.560937][ T4043] ? fault_create_debugfs_attr+0x180/0x180 [ 2473.589006][ T4043] ? ___might_sleep+0x163/0x2c0 [ 2473.593878][ T4043] should_fail_alloc_page+0x50/0x60 [ 2473.599083][ T4043] __alloc_pages_nodemask+0x1a1/0x910 [ 2473.604480][ T4043] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2473.610306][ T4043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2473.610322][ T4043] ? find_next_bit+0x107/0x130 [ 2473.610346][ T4043] pcpu_populate_chunk+0xf8/0x940 [ 2473.621404][ T4043] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2473.621418][ T4043] ? find_next_bit+0xc7/0x130 [ 2473.621440][ T4043] pcpu_alloc+0xd5b/0x1380 [ 2473.621464][ T4043] ? pcpu_alloc_area+0x820/0x820 [ 2473.621484][ T4043] ? bpf_map_area_alloc+0x20/0x30 [ 2473.652047][ T4043] __alloc_percpu_gfp+0x28/0x30 [ 2473.656917][ T4043] htab_map_alloc+0xdb9/0x11c0 [ 2473.661804][ T4043] ? htab_map_update_elem+0xca0/0xca0 [ 2473.667194][ T4043] __do_sys_bpf+0x478/0x3610 [ 2473.671787][ T4043] ? bpf_prog_load+0x1960/0x1960 [ 2473.671803][ T4043] ? __kasan_check_write+0x14/0x20 [ 2473.671819][ T4043] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2473.671834][ T4043] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2473.671858][ T4043] ? wait_for_completion+0x440/0x440 [ 2473.697992][ T4043] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2473.704285][ T4043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2473.709892][ T4043] ? do_syscall_64+0x26/0x790 [ 2473.714591][ T4043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2473.720679][ T4043] ? do_syscall_64+0x26/0x790 [ 2473.725384][ T4043] __x64_sys_bpf+0x73/0xb0 [ 2473.729820][ T4043] do_syscall_64+0xfa/0x790 [ 2473.734347][ T4043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2473.740253][ T4043] RIP: 0033:0x45a919 [ 2473.744163][ T4043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2473.764835][ T4043] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2473.773246][ T4043] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2473.781739][ T4043] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2473.790203][ T4043] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2473.798768][ T4043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2473.806730][ T4043] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:00 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={r1, &(0x7f00000001c0)="721b4b8c14fbc896df2ab0c6be5990c0fef525f1c93fc4a5a3fa00c80200d700732690373f0e9333dff77f01898f102215533fb47b8c4e8b9f058a", &(0x7f00000002c0)=""/204, 0x4}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000003c0)={'bridge_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmsg$kcm(r5, &(0x7f0000000a80)={&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000540)=""/196, 0xc4}, {&(0x7f00000000c0)=""/37, 0x25}, {&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/202, 0xca}, {&(0x7f0000000840)=""/252, 0xfc}, {&(0x7f0000000940)}, {&(0x7f0000000980)=""/115, 0x73}], 0x7}, 0x40000003) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES64=r3, @ANYRESOCT=r3, @ANYRESDEC=r2, @ANYRES16=0x0, @ANYRESHEX=r4, @ANYRES16, @ANYRESOCT, @ANYRES32=r4, @ANYRES64=r6], 0x70) 18:05:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xc0fe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001800, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:00 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x9, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:00 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3004, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:00 executing program 3 (fault-call:1 fault-nth:38): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2474.042424][ T4067] FAULT_INJECTION: forcing a failure. [ 2474.042424][ T4067] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:05:00 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3804, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfc00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2474.107169][ T4067] CPU: 0 PID: 4067 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2474.116159][ T4067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2474.126241][ T4067] Call Trace: [ 2474.129559][ T4067] dump_stack+0x197/0x210 [ 2474.133922][ T4067] should_fail.cold+0xa/0x15 [ 2474.138529][ T4067] ? fault_create_debugfs_attr+0x180/0x180 [ 2474.144418][ T4067] ? ___might_sleep+0x163/0x2c0 [ 2474.144444][ T4067] should_fail_alloc_page+0x50/0x60 [ 2474.144458][ T4067] __alloc_pages_nodemask+0x1a1/0x910 [ 2474.144475][ T4067] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2474.144499][ T4067] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2474.165631][ T4067] ? find_next_bit+0x107/0x130 [ 2474.165655][ T4067] pcpu_populate_chunk+0xf8/0x940 [ 2474.165669][ T4067] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2474.165688][ T4067] ? find_next_bit+0xc7/0x130 [ 2474.176687][ T4067] pcpu_alloc+0xd5b/0x1380 [ 2474.176713][ T4067] ? pcpu_alloc_area+0x820/0x820 [ 2474.201559][ T4067] ? bpf_map_area_alloc+0x20/0x30 18:05:00 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2474.206624][ T4067] __alloc_percpu_gfp+0x28/0x30 [ 2474.211502][ T4067] htab_map_alloc+0xdb9/0x11c0 [ 2474.216316][ T4067] ? htab_map_update_elem+0xca0/0xca0 [ 2474.221714][ T4067] __do_sys_bpf+0x478/0x3610 [ 2474.226333][ T4067] ? bpf_prog_load+0x1960/0x1960 [ 2474.231302][ T4067] ? __kasan_check_write+0x14/0x20 [ 2474.236434][ T4067] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2474.242092][ T4067] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2474.247405][ T4067] ? wait_for_completion+0x440/0x440 [ 2474.252722][ T4067] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2474.258998][ T4067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2474.264492][ T4067] ? do_syscall_64+0x26/0x790 [ 2474.269197][ T4067] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2474.275378][ T4067] ? do_syscall_64+0x26/0x790 [ 2474.280091][ T4067] __x64_sys_bpf+0x73/0xb0 [ 2474.284539][ T4067] do_syscall_64+0xfa/0x790 [ 2474.289087][ T4067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2474.295947][ T4067] RIP: 0033:0x45a919 18:05:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001e03, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2474.300141][ T4067] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2474.319951][ T4067] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2474.319966][ T4067] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2474.319974][ T4067] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2474.319982][ T4067] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2474.319990][ T4067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2474.319998][ T4067] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:00 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3f00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:01 executing program 3 (fault-call:1 fault-nth:39): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2474.505668][ T4099] FAULT_INJECTION: forcing a failure. [ 2474.505668][ T4099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2474.567271][ T4099] CPU: 0 PID: 4099 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2474.575912][ T4099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2474.586071][ T4099] Call Trace: [ 2474.589388][ T4099] dump_stack+0x197/0x210 [ 2474.593746][ T4099] should_fail.cold+0xa/0x15 [ 2474.598357][ T4099] ? fault_create_debugfs_attr+0x180/0x180 [ 2474.604215][ T4099] ? ___might_sleep+0x163/0x2c0 [ 2474.609103][ T4099] should_fail_alloc_page+0x50/0x60 [ 2474.614324][ T4099] __alloc_pages_nodemask+0x1a1/0x910 [ 2474.619715][ T4099] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2474.625455][ T4099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2474.632730][ T4099] ? find_next_bit+0x107/0x130 [ 2474.637487][ T4099] pcpu_populate_chunk+0xf8/0x940 [ 2474.642590][ T4099] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2474.648299][ T4099] ? find_next_bit+0xc7/0x130 [ 2474.652983][ T4099] pcpu_alloc+0xd5b/0x1380 [ 2474.657394][ T4099] ? pcpu_alloc_area+0x820/0x820 [ 2474.662402][ T4099] ? bpf_map_area_alloc+0x20/0x30 [ 2474.667432][ T4099] __alloc_percpu_gfp+0x28/0x30 [ 2474.672281][ T4099] htab_map_alloc+0xdb9/0x11c0 [ 2474.677063][ T4099] ? htab_map_update_elem+0xca0/0xca0 [ 2474.682424][ T4099] __do_sys_bpf+0x478/0x3610 [ 2474.687005][ T4099] ? bpf_prog_load+0x1960/0x1960 [ 2474.691932][ T4099] ? __kasan_check_write+0x14/0x20 [ 2474.697119][ T4099] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2474.703259][ T4099] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2474.708549][ T4099] ? wait_for_completion+0x440/0x440 [ 2474.713828][ T4099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2474.720088][ T4099] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2474.726254][ T4099] ? do_syscall_64+0x26/0x790 [ 2474.730937][ T4099] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2474.737024][ T4099] ? do_syscall_64+0x26/0x790 [ 2474.741703][ T4099] __x64_sys_bpf+0x73/0xb0 [ 2474.746115][ T4099] do_syscall_64+0xfa/0x790 [ 2474.750614][ T4099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2474.756501][ T4099] RIP: 0033:0x45a919 [ 2474.760416][ T4099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2474.780970][ T4099] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2474.789368][ T4099] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2474.797341][ T4099] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2474.805487][ T4099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2474.813449][ T4099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2474.821433][ T4099] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:01 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x154, &(0x7f0000000100)}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:05:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001e20, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfe80, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x10, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfec0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001e40, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:01 executing program 3 (fault-call:1 fault-nth:40): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x11, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6004, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2475.343274][ T4142] FAULT_INJECTION: forcing a failure. [ 2475.343274][ T4142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2475.375755][ T4142] CPU: 0 PID: 4142 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2475.384396][ T4142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2475.394463][ T4142] Call Trace: [ 2475.394492][ T4142] dump_stack+0x197/0x210 [ 2475.394514][ T4142] should_fail.cold+0xa/0x15 [ 2475.394538][ T4142] ? fault_create_debugfs_attr+0x180/0x180 [ 2475.394559][ T4142] ? ___might_sleep+0x163/0x2c0 [ 2475.417450][ T4142] should_fail_alloc_page+0x50/0x60 [ 2475.422955][ T4142] __alloc_pages_nodemask+0x1a1/0x910 [ 2475.428367][ T4142] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2475.428390][ T4142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2475.428443][ T4142] ? find_next_bit+0x107/0x130 [ 2475.445149][ T4142] pcpu_populate_chunk+0xf8/0x940 [ 2475.450214][ T4142] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2475.455970][ T4142] ? find_next_bit+0xc7/0x130 [ 2475.460684][ T4142] pcpu_alloc+0xd5b/0x1380 [ 2475.465237][ T4142] ? pcpu_alloc_area+0x820/0x820 [ 2475.470727][ T4142] ? bpf_map_area_alloc+0x20/0x30 [ 2475.475928][ T4142] __alloc_percpu_gfp+0x28/0x30 [ 2475.480827][ T4142] htab_map_alloc+0xdb9/0x11c0 [ 2475.485899][ T4142] ? htab_map_update_elem+0xca0/0xca0 [ 2475.491285][ T4142] __do_sys_bpf+0x478/0x3610 [ 2475.495866][ T4142] ? bpf_prog_load+0x1960/0x1960 [ 2475.500860][ T4142] ? __kasan_check_write+0x14/0x20 [ 2475.505957][ T4142] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2475.511489][ T4142] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2475.517738][ T4142] ? wait_for_completion+0x440/0x440 [ 2475.523067][ T4142] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2475.529403][ T4142] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2475.535034][ T4142] ? do_syscall_64+0x26/0x790 [ 2475.539803][ T4142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2475.545865][ T4142] ? do_syscall_64+0x26/0x790 [ 2475.550538][ T4142] __x64_sys_bpf+0x73/0xb0 [ 2475.556205][ T4142] do_syscall_64+0xfa/0x790 [ 2475.560732][ T4142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2475.566813][ T4142] RIP: 0033:0x45a919 [ 2475.570707][ T4142] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2475.590533][ T4142] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2475.598950][ T4142] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2475.607413][ T4142] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2475.615723][ T4142] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2475.623681][ T4142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2475.631637][ T4142] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:02 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socketpair(0x9, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000001c0)={r2}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_int(r1, &(0x7f0000000300)=0x2, 0x12) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) mkdirat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x1ff) 18:05:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001e60, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:02 executing program 3 (fault-call:1 fault-nth:41): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x12, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x80fe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2475.873527][ T4166] FAULT_INJECTION: forcing a failure. [ 2475.873527][ T4166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2475.899975][ T4166] CPU: 1 PID: 4166 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2475.908613][ T4166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2475.918700][ T4166] Call Trace: [ 2475.922023][ T4166] dump_stack+0x197/0x210 [ 2475.926379][ T4166] should_fail.cold+0xa/0x15 [ 2475.930991][ T4166] ? fault_create_debugfs_attr+0x180/0x180 [ 2475.936823][ T4166] ? ___might_sleep+0x163/0x2c0 [ 2475.941689][ T4166] should_fail_alloc_page+0x50/0x60 [ 2475.947051][ T4166] __alloc_pages_nodemask+0x1a1/0x910 [ 2475.952858][ T4166] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2475.958587][ T4166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2475.964815][ T4166] ? find_next_bit+0x107/0x130 [ 2475.969592][ T4166] pcpu_populate_chunk+0xf8/0x940 [ 2475.974618][ T4166] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2475.980425][ T4166] ? find_next_bit+0xc7/0x130 [ 2475.985105][ T4166] pcpu_alloc+0xd5b/0x1380 [ 2475.989517][ T4166] ? pcpu_alloc_area+0x820/0x820 [ 2475.994449][ T4166] ? bpf_map_area_alloc+0x20/0x30 [ 2475.999470][ T4166] __alloc_percpu_gfp+0x28/0x30 [ 2476.004656][ T4166] htab_map_alloc+0xdb9/0x11c0 [ 2476.009415][ T4166] ? htab_map_update_elem+0xca0/0xca0 [ 2476.014775][ T4166] __do_sys_bpf+0x478/0x3610 [ 2476.019355][ T4166] ? bpf_prog_load+0x1960/0x1960 [ 2476.024278][ T4166] ? __kasan_check_write+0x14/0x20 [ 2476.029375][ T4166] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2476.034908][ T4166] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2476.040182][ T4166] ? wait_for_completion+0x440/0x440 [ 2476.045473][ T4166] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2476.051721][ T4166] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2476.057167][ T4166] ? do_syscall_64+0x26/0x790 [ 2476.061849][ T4166] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2476.067909][ T4166] ? do_syscall_64+0x26/0x790 [ 2476.072581][ T4166] __x64_sys_bpf+0x73/0xb0 [ 2476.076989][ T4166] do_syscall_64+0xfa/0x790 [ 2476.081485][ T4166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2476.087722][ T4166] RIP: 0033:0x45a919 [ 2476.091865][ T4166] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2476.111804][ T4166] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:05:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001e80, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x60, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2476.120216][ T4166] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2476.128180][ T4166] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2476.138050][ T4166] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2476.146008][ T4166] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2476.153967][ T4166] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xac05, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x20480, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001ea0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:03 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfc, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xc0fe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x34000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:03 executing program 3 (fault-call:1 fault-nth:42): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001ec0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:03 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x300, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:03 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r1, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r4 = socket$kcm(0x2, 0x1, 0x84) close(r4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r5, 0xb) setsockopt$sock_attach_bpf(r4, 0x10d, 0xb, &(0x7f0000000000)=r5, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r5, 0x395, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x3, 0x4, 0x3, 0x80000000}, &(0x7f0000000440)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0xbe) r7 = socket$kcm(0x2, 0x1, 0x84) close(r7) r8 = socket$kcm(0xa, 0x6, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x10d, 0xb, &(0x7f0000000000)=r9, 0xb) setsockopt$sock_attach_bpf(r7, 0x10d, 0xb, &(0x7f0000000000)=r9, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa45}}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r2, 0x19, r3, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x1, 0x3, 0x7, 0x100}, 0x10, r6, r9}, 0x78) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r10, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r13 = socket$kcm(0x2, 0x1, 0x84) close(r13) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r14, 0xb) setsockopt$sock_attach_bpf(r13, 0x10d, 0xb, &(0x7f0000000000)=r14, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r14, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r16 = socket$kcm(0x2, 0x1, 0x84) close(r16) r17 = socket$kcm(0xa, 0x2, 0x0) r18 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r17, 0x10d, 0xb, &(0x7f0000000000)=r18, 0xb) setsockopt$sock_attach_bpf(r16, 0x10d, 0xb, &(0x7f0000000000)=r18, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000080000000000000045fa0000180000002000000000aa0c00070000de048d00032103010009ff7f08785004fcffffff9500000000000000075d7a635c748c2945f6ff592a46775809f24e518dff7e7eb4f79a27f16be479da0000000000000000"], &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r11, 0x19, r12, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r15, r18}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r15}, 0x78) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x4, 0x0, 0x2, 0x4, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x9, 0xac, &(0x7f00000001c0)=""/172, 0x0, 0x9, [], r2, 0x14, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x4, 0x80}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x1, 0x11, 0xb}, 0x10, r15}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000003c0)=r19, 0x4) 18:05:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001ee0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2476.878299][ T4212] FAULT_INJECTION: forcing a failure. [ 2476.878299][ T4212] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:05:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfc00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2476.947586][ T4212] CPU: 0 PID: 4212 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2476.956224][ T4212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2476.966294][ T4212] Call Trace: [ 2476.969613][ T4212] dump_stack+0x197/0x210 [ 2476.973973][ T4212] should_fail.cold+0xa/0x15 [ 2476.978588][ T4212] ? fault_create_debugfs_attr+0x180/0x180 [ 2476.984420][ T4212] ? ___might_sleep+0x163/0x2c0 [ 2476.989293][ T4212] should_fail_alloc_page+0x50/0x60 18:05:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x40000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:03 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x430, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2476.994521][ T4212] __alloc_pages_nodemask+0x1a1/0x910 [ 2476.999925][ T4212] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2477.005676][ T4212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2477.011938][ T4212] ? find_next_bit+0x107/0x130 [ 2477.016731][ T4212] pcpu_populate_chunk+0xf8/0x940 [ 2477.021767][ T4212] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2477.021783][ T4212] ? find_next_bit+0xc7/0x130 [ 2477.021806][ T4212] pcpu_alloc+0xd5b/0x1380 [ 2477.021830][ T4212] ? pcpu_alloc_area+0x820/0x820 [ 2477.041555][ T4212] ? bpf_map_area_alloc+0x20/0x30 [ 2477.046613][ T4212] __alloc_percpu_gfp+0x28/0x30 [ 2477.051487][ T4212] htab_map_alloc+0xdb9/0x11c0 [ 2477.056640][ T4212] ? htab_map_update_elem+0xca0/0xca0 [ 2477.062054][ T4212] __do_sys_bpf+0x478/0x3610 [ 2477.066645][ T4212] ? bpf_prog_load+0x1960/0x1960 [ 2477.072097][ T4212] ? __kasan_check_write+0x14/0x20 [ 2477.077255][ T4212] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2477.082822][ T4212] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2477.088133][ T4212] ? wait_for_completion+0x440/0x440 [ 2477.093426][ T4212] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2477.093455][ T4212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2477.093469][ T4212] ? do_syscall_64+0x26/0x790 [ 2477.093489][ T4212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2477.117121][ T4212] ? do_syscall_64+0x26/0x790 [ 2477.122782][ T4212] __x64_sys_bpf+0x73/0xb0 [ 2477.127232][ T4212] do_syscall_64+0xfa/0x790 [ 2477.131766][ T4212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2477.137929][ T4212] RIP: 0033:0x45a919 [ 2477.142536][ T4212] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2477.162160][ T4212] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2477.170598][ T4212] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2477.178576][ T4212] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2477.186538][ T4212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2477.194497][ T4212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2477.202462][ T4212] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001f00, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:03 executing program 3 (fault-call:1 fault-nth:43): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:03 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x438, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x100000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:03 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfe80, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2477.385815][ T4243] FAULT_INJECTION: forcing a failure. [ 2477.385815][ T4243] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2477.409556][ T4243] CPU: 0 PID: 4243 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2477.418198][ T4243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2477.428261][ T4243] Call Trace: [ 2477.431577][ T4243] dump_stack+0x197/0x210 [ 2477.435936][ T4243] should_fail.cold+0xa/0x15 [ 2477.440574][ T4243] ? fault_create_debugfs_attr+0x180/0x180 [ 2477.440591][ T4243] ? ___might_sleep+0x163/0x2c0 [ 2477.440618][ T4243] should_fail_alloc_page+0x50/0x60 [ 2477.456529][ T4243] __alloc_pages_nodemask+0x1a1/0x910 [ 2477.461933][ T4243] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2477.468036][ T4243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2477.468057][ T4243] ? find_next_bit+0x107/0x130 [ 2477.479944][ T4243] pcpu_populate_chunk+0xf8/0x940 [ 2477.484994][ T4243] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2477.490911][ T4243] ? find_next_bit+0xc7/0x130 [ 2477.495621][ T4243] pcpu_alloc+0xd5b/0x1380 [ 2477.500076][ T4243] ? pcpu_alloc_area+0x820/0x820 [ 2477.505042][ T4243] ? bpf_map_area_alloc+0x20/0x30 [ 2477.510188][ T4243] __alloc_percpu_gfp+0x28/0x30 [ 2477.515058][ T4243] htab_map_alloc+0xdb9/0x11c0 [ 2477.519884][ T4243] ? htab_map_update_elem+0xca0/0xca0 [ 2477.519903][ T4243] __do_sys_bpf+0x478/0x3610 [ 2477.519927][ T4243] ? bpf_prog_load+0x1960/0x1960 [ 2477.535416][ T4243] ? __kasan_check_write+0x14/0x20 [ 2477.540539][ T4243] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2477.546108][ T4243] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2477.551415][ T4243] ? wait_for_completion+0x440/0x440 [ 2477.556743][ T4243] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2477.563027][ T4243] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2477.568625][ T4243] ? do_syscall_64+0x26/0x790 [ 2477.573333][ T4243] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2477.579446][ T4243] ? do_syscall_64+0x26/0x790 [ 2477.584285][ T4243] __x64_sys_bpf+0x73/0xb0 [ 2477.588726][ T4243] do_syscall_64+0xfa/0x790 [ 2477.593230][ T4243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2477.599140][ T4243] RIP: 0033:0x45a919 [ 2477.603036][ T4243] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2477.622636][ T4243] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:05:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001f20, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2477.631067][ T4243] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2477.639037][ T4243] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2477.647183][ T4243] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2477.655398][ T4243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2477.663554][ T4243] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001f40, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x40106614, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x10) write$cgroup_pid(r2, &(0x7f0000000280)=r3, 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x6, 0x6, 0x3, 0x2, 0x0, 0x10000, 0x42082, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x2, @perf_config_ext={0x9, 0x101}, 0x8000, 0x3, 0x32b0d365, 0x7, 0x7, 0x5, 0xb}, r3, 0x2, r4, 0x9) perf_event_open$cgroup(&(0x7f00000004c0)={0x3, 0x70, 0x81, 0x4, 0x6, 0x1f, 0x0, 0x200, 0x2, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x200, 0x7, @perf_bp={&(0x7f0000000380), 0x4}, 0x0, 0xff, 0x9, 0x2, 0x3, 0x0, 0x9}, r0, 0x10, r6, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) socket$kcm(0x29, 0x5, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x6, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000001e00)={&(0x7f0000001880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001900)=""/65, 0x41}, {&(0x7f0000001980)=""/245, 0xf5}, {&(0x7f0000001a80)=""/24, 0x18}, {&(0x7f0000001ac0)=""/216, 0xd8}, {&(0x7f0000001bc0)=""/150, 0x96}], 0x5, &(0x7f0000001d00)=""/242, 0xf2}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000001c0)='/dev/net/tun\x00'}, 0x30) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r12 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f00000002c0)=r11, 0x161) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='/dev/net/tun\x00', r11}, 0x10) r14 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0xbf67, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x51089, 0x0, 0x0, 0x0, 0x3ffc}, r14, 0x0, 0xffffffffffffffff, 0x0) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r15, &(0x7f0000000000)='threaded\xfc', 0x248800) r16 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp, 0x1, 0x2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r17 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x20, 0x1f, 0x5, 0x81, 0x0, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x4, 0xa80}, 0x29082, 0x0, 0x8d, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x1, r16, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r18}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r17, 0x0, 0x1, &(0x7f0000000080)='\x00', r18}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001680)={r14, r15, 0x0, 0xe, &(0x7f0000001640)='memory.events\x00', r18}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r10, r13, 0x0, 0x14, &(0x7f0000000300)='trusted:/{\xa9/-+ppp0,\x00', r18}, 0x30) r19 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001fc0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000001f00)=""/141, 0xa2, 0x8d}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000002000)={0x10, 0x80, 0x55, 0x80000001, 0x40, r8, 0x596, [], r9, r19, 0x5, 0x4}, 0x3c) write$cgroup_subtree(r7, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:05:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfec0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:04 executing program 3 (fault-call:1 fault-nth:44): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001f60, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x400300, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x460, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001f80, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x500, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2478.101201][ T4285] FAULT_INJECTION: forcing a failure. [ 2478.101201][ T4285] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:05:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa000a0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2478.158322][ T4285] CPU: 0 PID: 4285 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2478.166974][ T4285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2478.177475][ T4285] Call Trace: [ 2478.180801][ T4285] dump_stack+0x197/0x210 [ 2478.185166][ T4285] should_fail.cold+0xa/0x15 [ 2478.189783][ T4285] ? fault_create_debugfs_attr+0x180/0x180 [ 2478.195617][ T4285] ? ___might_sleep+0x163/0x2c0 [ 2478.200496][ T4285] should_fail_alloc_page+0x50/0x60 [ 2478.205694][ T4285] __alloc_pages_nodemask+0x1a1/0x910 [ 2478.211066][ T4285] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2478.216795][ T4285] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2478.223024][ T4285] ? find_next_bit+0x107/0x130 [ 2478.227784][ T4285] pcpu_populate_chunk+0xf8/0x940 [ 2478.232797][ T4285] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2478.238516][ T4285] ? find_next_bit+0xc7/0x130 [ 2478.243196][ T4285] pcpu_alloc+0xd5b/0x1380 [ 2478.247716][ T4285] ? pcpu_alloc_area+0x820/0x820 [ 2478.252662][ T4285] ? bpf_map_area_alloc+0x20/0x30 [ 2478.257688][ T4285] __alloc_percpu_gfp+0x28/0x30 [ 2478.262531][ T4285] htab_map_alloc+0xdb9/0x11c0 [ 2478.267300][ T4285] ? htab_map_update_elem+0xca0/0xca0 [ 2478.272659][ T4285] __do_sys_bpf+0x478/0x3610 [ 2478.277239][ T4285] ? bpf_prog_load+0x1960/0x1960 [ 2478.282177][ T4285] ? __kasan_check_write+0x14/0x20 [ 2478.287301][ T4285] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2478.292848][ T4285] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2478.298147][ T4285] ? wait_for_completion+0x440/0x440 [ 2478.303428][ T4285] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2478.310097][ T4285] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2478.315543][ T4285] ? do_syscall_64+0x26/0x790 [ 2478.320227][ T4285] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2478.326367][ T4285] ? do_syscall_64+0x26/0x790 [ 2478.331039][ T4285] __x64_sys_bpf+0x73/0xb0 [ 2478.335446][ T4285] do_syscall_64+0xfa/0x790 [ 2478.339940][ T4285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2478.345829][ T4285] RIP: 0033:0x45a919 [ 2478.349906][ T4285] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2478.369673][ T4285] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2478.379113][ T4285] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2478.387161][ T4285] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2478.395119][ T4285] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:05:04 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2478.403512][ T4285] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2478.411645][ T4285] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x1000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001fa0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:05 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0xa, 0x3, 0xe62, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6ad79a000000000486dd07daaccbff6c8667474b1b8045c5bc3ed2d5943737358cee4ea03189133571f46868ca4626d9c8d144154f658a18859397a7dcdb8a3cb65b114a885f18986f0a081d3223063fcf4ea6e293b74cbd1b07b4041fd574a04ec7a147eeedba36687f74602cf30e7a3faf656798a55a2472e43889c47987412da82f2a77d545c2114595e0ab8a32338f3c56961b22ec757fc4bc7bad3f65bf9e6bb5c3778d8512ab058adc5085c3735d375774ed7c45992c305f12b7d67bdb34978ae91eac8f961effcf32741c5b389df784"], 0x90ad) 18:05:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5ac, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:05 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x20480, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:05 executing program 3 (fault-call:1 fault-nth:45): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x2000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001fc0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2479.028869][ T4326] FAULT_INJECTION: forcing a failure. [ 2479.028869][ T4326] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:05:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x600, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2479.110457][ T4326] CPU: 0 PID: 4326 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2479.119541][ T4326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2479.129622][ T4326] Call Trace: [ 2479.132921][ T4326] dump_stack+0x197/0x210 [ 2479.132942][ T4326] should_fail.cold+0xa/0x15 [ 2479.132960][ T4326] ? fault_create_debugfs_attr+0x180/0x180 [ 2479.132976][ T4326] ? ___might_sleep+0x163/0x2c0 [ 2479.133002][ T4326] should_fail_alloc_page+0x50/0x60 18:05:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000001fe0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2479.157836][ T4326] __alloc_pages_nodemask+0x1a1/0x910 [ 2479.163234][ T4326] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2479.169008][ T4326] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2479.175318][ T4326] ? find_next_bit+0x107/0x130 [ 2479.180111][ T4326] pcpu_populate_chunk+0xf8/0x940 [ 2479.185157][ T4326] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2479.190883][ T4326] ? find_next_bit+0xc7/0x130 [ 2479.190908][ T4326] pcpu_alloc+0xd5b/0x1380 [ 2479.190932][ T4326] ? pcpu_alloc_area+0x820/0x820 [ 2479.190952][ T4326] ? bpf_map_area_alloc+0x20/0x30 [ 2479.200036][ T4326] __alloc_percpu_gfp+0x28/0x30 [ 2479.200056][ T4326] htab_map_alloc+0xdb9/0x11c0 [ 2479.200086][ T4326] ? htab_map_update_elem+0xca0/0xca0 [ 2479.200103][ T4326] __do_sys_bpf+0x478/0x3610 [ 2479.200124][ T4326] ? bpf_prog_load+0x1960/0x1960 [ 2479.235045][ T4326] ? __kasan_check_write+0x14/0x20 [ 2479.240182][ T4326] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2479.245758][ T4326] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2479.251076][ T4326] ? wait_for_completion+0x440/0x440 18:05:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2479.256396][ T4326] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2479.262685][ T4326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2479.268168][ T4326] ? do_syscall_64+0x26/0x790 [ 2479.272947][ T4326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2479.279046][ T4326] ? do_syscall_64+0x26/0x790 [ 2479.283835][ T4326] __x64_sys_bpf+0x73/0xb0 [ 2479.288295][ T4326] do_syscall_64+0xfa/0x790 [ 2479.292841][ T4326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2479.298738][ T4326] RIP: 0033:0x45a919 [ 2479.302632][ T4326] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2479.302640][ T4326] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2479.302653][ T4326] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2479.302661][ T4326] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2479.302670][ T4326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:05:05 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x34000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:05 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x40000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2479.302678][ T4326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2479.302686][ T4326] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:06 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000486e73ba3638f6995cd0f813053585468a5d98da7f0731c6de328ec022400005d80492d324cfbbd266c80a295840c19f1e196a449e5a844189fdceb966d0d458e4a5952273d0a4bf82c50b0e89b6c7726d23cc7bdf455fcfa175883b8ef7c1421645fd98eaafe8955cd17df372dfeb811393fd1a7ab6a0c"], 0x90ad) 18:05:06 executing program 3 (fault-call:1 fault-nth:46): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x700, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x100000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002001, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002002, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2479.864587][ T4375] FAULT_INJECTION: forcing a failure. [ 2479.864587][ T4375] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:05:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2479.936195][ T4375] CPU: 0 PID: 4375 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2479.944857][ T4375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2479.954911][ T4375] Call Trace: [ 2479.954937][ T4375] dump_stack+0x197/0x210 [ 2479.954956][ T4375] should_fail.cold+0xa/0x15 [ 2479.954973][ T4375] ? fault_create_debugfs_attr+0x180/0x180 [ 2479.954989][ T4375] ? ___might_sleep+0x163/0x2c0 [ 2479.955016][ T4375] should_fail_alloc_page+0x50/0x60 [ 2479.983465][ T4375] __alloc_pages_nodemask+0x1a1/0x910 [ 2479.988858][ T4375] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2479.994615][ T4375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2480.000872][ T4375] ? find_next_bit+0x107/0x130 [ 2480.005658][ T4375] pcpu_populate_chunk+0xf8/0x940 [ 2480.010706][ T4375] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2480.016450][ T4375] ? find_next_bit+0xc7/0x130 [ 2480.021155][ T4375] pcpu_alloc+0xd5b/0x1380 [ 2480.025602][ T4375] ? pcpu_alloc_area+0x820/0x820 [ 2480.030581][ T4375] __alloc_percpu_gfp+0x28/0x30 [ 2480.030597][ T4375] htab_map_alloc+0xdb9/0x11c0 [ 2480.030624][ T4375] ? htab_map_update_elem+0xca0/0xca0 [ 2480.040220][ T4375] __do_sys_bpf+0x478/0x3610 [ 2480.040241][ T4375] ? bpf_prog_load+0x1960/0x1960 [ 2480.040255][ T4375] ? __kasan_check_write+0x14/0x20 [ 2480.040276][ T4375] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2480.065839][ T4375] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2480.071152][ T4375] ? wait_for_completion+0x440/0x440 [ 2480.076466][ T4375] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 18:05:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x900, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:06 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x400300, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2480.082742][ T4375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2480.088238][ T4375] ? do_syscall_64+0x26/0x790 [ 2480.093032][ T4375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2480.099119][ T4375] ? do_syscall_64+0x26/0x790 [ 2480.103812][ T4375] __x64_sys_bpf+0x73/0xb0 [ 2480.108229][ T4375] do_syscall_64+0xfa/0x790 [ 2480.112727][ T4375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2480.118616][ T4375] RIP: 0033:0x45a919 [ 2480.122526][ T4375] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2480.142311][ T4375] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2480.142327][ T4375] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2480.142335][ T4375] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2480.142344][ T4375] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2480.142352][ T4375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2480.142369][ T4375] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:06 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:07 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa000a0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:07 executing program 3 (fault-call:1 fault-nth:47): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002003, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x7000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xe00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:07 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0xa9, 0x5, 0x1, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r1, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x0, 0x4, 0x0, r1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r3}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r3, 0xff, 0x8}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r6, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r9 = socket$kcm(0x2, 0x1, 0x84) close(r9) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r10, 0xb) setsockopt$sock_attach_bpf(r9, 0x10d, 0xb, &(0x7f0000000000)=r10, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r10, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r12 = socket$kcm(0x2, 0x1, 0x84) close(r12) r13 = socket$kcm(0xa, 0x6, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r13, 0x10d, 0xb, &(0x7f0000000000)=r14, 0xb) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r16 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r16, 0x1, 0x3e, &(0x7f00000002c0)=r15, 0x161) r17 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r18 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r18, 0x10d, 0xb, &(0x7f0000000000)=r15, 0x4) r19 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r20 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r20, 0x1, 0x3e, &(0x7f00000002c0)=r19, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x8, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff28c2, 0x0, 0x0, 0x0, 0xfa45}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x6, 0x2, 0x0, r19, 0x0, 0x0, 0x0, 0x8}, @alu={0x0, 0x1, 0x0, 0x3, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r7, 0x19, r8, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r11, r14}, 0x78) r21 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r22 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r22, 0x1, 0x3e, &(0x7f00000002c0)=r21, 0x161) r23 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x13, 0xce7, 0x2, 0x3, 0x650, r4, 0x6, [], r7, r21, 0x2, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r23, 0xfffffffffffffe2c, &(0x7f0000000340)}, 0xfffffedc) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="100486dd07"], 0x90ad) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) [ 2481.030759][ T4417] FAULT_INJECTION: forcing a failure. [ 2481.030759][ T4417] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2481.079684][ T4417] CPU: 1 PID: 4417 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2481.088324][ T4417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2481.098479][ T4417] Call Trace: [ 2481.101790][ T4417] dump_stack+0x197/0x210 [ 2481.106150][ T4417] should_fail.cold+0xa/0x15 [ 2481.110757][ T4417] ? fault_create_debugfs_attr+0x180/0x180 [ 2481.116679][ T4417] ? ___might_sleep+0x163/0x2c0 [ 2481.121575][ T4417] should_fail_alloc_page+0x50/0x60 [ 2481.126793][ T4417] __alloc_pages_nodemask+0x1a1/0x910 [ 2481.132716][ T4417] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2481.138472][ T4417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2481.144734][ T4417] ? find_next_bit+0x107/0x130 [ 2481.149524][ T4417] pcpu_populate_chunk+0xf8/0x940 [ 2481.154581][ T4417] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2481.160333][ T4417] ? find_next_bit+0xc7/0x130 [ 2481.165031][ T4417] pcpu_alloc+0xd5b/0x1380 [ 2481.169476][ T4417] ? pcpu_alloc_area+0x820/0x820 [ 2481.174521][ T4417] ? bpf_map_area_alloc+0x20/0x30 [ 2481.179582][ T4417] __alloc_percpu_gfp+0x28/0x30 [ 2481.184459][ T4417] htab_map_alloc+0xdb9/0x11c0 [ 2481.189260][ T4417] ? htab_map_update_elem+0xca0/0xca0 [ 2481.194665][ T4417] __do_sys_bpf+0x478/0x3610 [ 2481.199283][ T4417] ? bpf_prog_load+0x1960/0x1960 [ 2481.204242][ T4417] ? __kasan_check_write+0x14/0x20 [ 2481.209809][ T4417] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2481.215389][ T4417] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2481.220692][ T4417] ? wait_for_completion+0x440/0x440 18:05:07 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x1100, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:07 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x1000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x8000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2481.220718][ T4417] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2481.220749][ T4417] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2481.232446][ T4417] ? do_syscall_64+0x26/0x790 [ 2481.232462][ T4417] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2481.232476][ T4417] ? do_syscall_64+0x26/0x790 [ 2481.232498][ T4417] __x64_sys_bpf+0x73/0xb0 [ 2481.232518][ T4417] do_syscall_64+0xfa/0x790 [ 2481.263486][ T4417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2481.269825][ T4417] RIP: 0033:0x45a919 [ 2481.273839][ T4417] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2481.293537][ T4417] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2481.301937][ T4417] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2481.309896][ T4417] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2481.317855][ T4417] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:05:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000201e, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2481.326080][ T4417] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2481.334066][ T4417] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000201f, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x2000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:08 executing program 3 (fault-call:1 fault-nth:48): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:08 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x1200, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002020, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x9000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2481.634877][ T4456] FAULT_INJECTION: forcing a failure. [ 2481.634877][ T4456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2481.710270][ T4456] CPU: 1 PID: 4456 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2481.718915][ T4456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2481.729571][ T4456] Call Trace: [ 2481.732891][ T4456] dump_stack+0x197/0x210 [ 2481.737253][ T4456] should_fail.cold+0xa/0x15 [ 2481.741873][ T4456] ? fault_create_debugfs_attr+0x180/0x180 [ 2481.748412][ T4456] ? ___might_sleep+0x163/0x2c0 [ 2481.753315][ T4456] should_fail_alloc_page+0x50/0x60 [ 2481.758541][ T4456] __alloc_pages_nodemask+0x1a1/0x910 [ 2481.763953][ T4456] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2481.769707][ T4456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2481.775973][ T4456] ? find_next_bit+0x107/0x130 [ 2481.780786][ T4456] pcpu_populate_chunk+0xf8/0x940 [ 2481.785838][ T4456] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2481.791580][ T4456] ? find_next_bit+0xc7/0x130 [ 2481.796407][ T4456] pcpu_alloc+0xd5b/0x1380 [ 2481.800861][ T4456] ? pcpu_alloc_area+0x820/0x820 [ 2481.805816][ T4456] ? bpf_map_area_alloc+0x20/0x30 [ 2481.810879][ T4456] __alloc_percpu_gfp+0x28/0x30 [ 2481.815751][ T4456] htab_map_alloc+0xdb9/0x11c0 [ 2481.820565][ T4456] ? htab_map_update_elem+0xca0/0xca0 [ 2481.825964][ T4456] __do_sys_bpf+0x478/0x3610 [ 2481.830587][ T4456] ? bpf_prog_load+0x1960/0x1960 [ 2481.835540][ T4456] ? __kasan_check_write+0x14/0x20 [ 2481.840686][ T4456] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2481.840703][ T4456] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2481.840719][ T4456] ? wait_for_completion+0x440/0x440 [ 2481.840742][ T4456] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2481.840777][ T4456] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2481.869405][ T4456] ? do_syscall_64+0x26/0x790 [ 2481.874197][ T4456] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2481.880498][ T4456] ? do_syscall_64+0x26/0x790 [ 2481.885488][ T4456] __x64_sys_bpf+0x73/0xb0 [ 2481.889945][ T4456] do_syscall_64+0xfa/0x790 [ 2481.894482][ T4456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2481.900403][ T4456] RIP: 0033:0x45a919 [ 2481.904317][ T4456] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2481.924017][ T4456] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2481.932420][ T4456] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2481.940379][ T4456] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2481.948354][ T4456] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:05:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002021, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:08 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000)="56a768e96f72c5e18d9a796f1b160299f1ffc23ad998e01807f33cf6e1826debb3c237b64b0c1bc81b5f70ff5df014c3ec81bc93899f801c865044b4e3e107430fdf79b7de68bfe7541ffee4ab572a50299dfae92a77df37eb1cca768cb02dc86e381712ef955a4654a1017742a28a7a1e867b73020f883b32700a6ce30d76", &(0x7f0000000300)=""/130, 0x4}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r1, 0x28, &(0x7f0000000200)}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000d000)={&(0x7f000000c9c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000ce80)=[{&(0x7f000000ca40)=""/195, 0xc3}, {&(0x7f000000cb40)=""/225, 0xe1}, {&(0x7f000000cc40)=""/146, 0x92}, {&(0x7f000000cd00)=""/166, 0xa6}, {&(0x7f000000cdc0)=""/52, 0x34}, {&(0x7f000000ce00)=""/102, 0x66}], 0x6, &(0x7f000000cf00)=""/237, 0xed}, 0x2081) bpf$MAP_CREATE(0x0, &(0x7f000000d040)={0x6, 0x8, 0x1, 0x5, 0x103, r3, 0x6, [], r5, r1, 0x4}, 0x3c) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000001c0)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[], 0x0) [ 2481.956333][ T4456] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2481.964295][ T4456] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:08 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3004, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002022, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:08 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3804, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:08 executing program 3 (fault-call:1 fault-nth:49): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002040, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xe000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:09 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3f00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:09 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2482.392896][ T4505] FAULT_INJECTION: forcing a failure. [ 2482.392896][ T4505] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2482.468346][ T4505] CPU: 0 PID: 4505 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2482.477005][ T4505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2482.487150][ T4505] Call Trace: [ 2482.487180][ T4505] dump_stack+0x197/0x210 [ 2482.487202][ T4505] should_fail.cold+0xa/0x15 [ 2482.487220][ T4505] ? fault_create_debugfs_attr+0x180/0x180 [ 2482.487236][ T4505] ? ___might_sleep+0x163/0x2c0 [ 2482.487259][ T4505] should_fail_alloc_page+0x50/0x60 [ 2482.487279][ T4505] __alloc_pages_nodemask+0x1a1/0x910 [ 2482.520631][ T4505] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2482.526197][ T4505] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2482.531965][ T4505] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2482.538229][ T4505] alloc_pages_current+0x107/0x210 [ 2482.543357][ T4505] ? ___might_sleep+0x163/0x2c0 [ 2482.548314][ T4505] __vmalloc_node_range+0x4f8/0x810 [ 2482.553527][ T4505] __vmalloc+0x44/0x50 [ 2482.553545][ T4505] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2482.553560][ T4505] pcpu_mem_zalloc+0x8a/0xf0 [ 2482.553576][ T4505] pcpu_create_chunk+0xe0/0x7f0 [ 2482.553594][ T4505] pcpu_alloc+0x10f3/0x1380 [ 2482.553625][ T4505] ? pcpu_alloc_area+0x820/0x820 [ 2482.581277][ T4505] ? bpf_map_area_alloc+0x20/0x30 [ 2482.586744][ T4505] __alloc_percpu_gfp+0x28/0x30 [ 2482.591629][ T4505] htab_map_alloc+0xdb9/0x11c0 [ 2482.591657][ T4505] ? htab_map_update_elem+0xca0/0xca0 [ 2482.591675][ T4505] __do_sys_bpf+0x478/0x3610 [ 2482.591694][ T4505] ? bpf_prog_load+0x1960/0x1960 [ 2482.591709][ T4505] ? __kasan_check_write+0x14/0x20 [ 2482.591725][ T4505] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2482.591741][ T4505] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2482.591762][ T4505] ? wait_for_completion+0x440/0x440 [ 2482.633295][ T4505] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2482.639572][ T4505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2482.645053][ T4505] ? do_syscall_64+0x26/0x790 [ 2482.649752][ T4505] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2482.655840][ T4505] ? do_syscall_64+0x26/0x790 [ 2482.660539][ T4505] __x64_sys_bpf+0x73/0xb0 [ 2482.664983][ T4505] do_syscall_64+0xfa/0x790 [ 2482.669523][ T4505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2482.675418][ T4505] RIP: 0033:0x45a919 [ 2482.679435][ T4505] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2482.699056][ T4505] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2482.708531][ T4505] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 18:05:09 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2f, 0x8001, 0x6, 0x7, 0x380, 0xffffffffffffffff, 0x9, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0xc4, 0xc15a, 0x20, 0x480, r2, 0x200, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x9, [@enum={0xb, 0x5, 0x0, 0x6, 0x4, [{0xd, 0x40}, {0xd, 0x9c1}, {0x0, 0x5}, {0x6, 0xff}, {0x9, 0xb182}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x8f9}}, @fwd={0x5}]}, {0x0, [0x5f, 0x5f, 0x2e, 0x0, 0x30, 0x0, 0x13]}}, &(0x7f00000004c0)=""/87, 0x79, 0x57, 0x1}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r5, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0xfffffffffffffffa, 0x0, 0x0, 0x0, &(0x7f00000005c0)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000600)={0x5, 0x5, 0x0, 0xfffffbff}, &(0x7f0000000640)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=0x5}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r10, &(0x7f000000aa80)={&(0x7f0000008600)=@hci={0x1f, 0x0}, 0x80, 0x0}, 0x10000) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) r13 = socket$kcm(0x2, 0x1, 0x84) close(r13) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r14, 0xb) setsockopt$sock_attach_bpf(r13, 0x10d, 0xb, &(0x7f0000000000)=r14, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ad80)={r14, 0xc0, &(0x7f000000acc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ab80)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac00)={0x5, 0x4, 0xa0}, &(0x7f000000ac40)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f000000ac80)=0x5}}, 0x10) r16 = socket$kcm(0x2, 0x1, 0x84) close(r16) r17 = socket$kcm(0xa, 0x6, 0x0) r18 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r17, 0x10d, 0xb, &(0x7f0000000000)=r18, 0xb) setsockopt$sock_attach_bpf(r16, 0x10d, 0xb, &(0x7f0000000000)=r18, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa45}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, @generic={0x3, 0x1, 0x2, 0x3, 0x7fffffff}, @alu={0x0, 0x1, 0x0, 0x3, 0x6, 0x50, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0xffff, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], r11, 0x19, r12, 0x8, &(0x7f000000ab00)={0xa, 0x3}, 0x8, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, r15, r18}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f5067d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54e36633e27c279341bf489903cfdb4c05e96e3046f04e77969be06340ee6af0d49910d063518598e7e290b39f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e6bdc4dc1af6d3c6958da4bddac602e0048bec11e874602f060000002af21b7552f0a0cc85ae281993bfa2139a3bb755c1f1abd1964007000000e27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ef84c2be021a6c9daf3f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714090d43fe66bbf4f4ffe410bd701d035f867de2a20695033d91ee238c824e0b7a0aeffb9843947c3bc96e1f95c245168d2aeed2e00463d9cfdd58709e898c7ebad73fc48673c75c8b50db852621ad19c854622f7c7d79ec3ab4494353b458c718021f701442bbc6456bf0c9f6b822211eb1aa488fcaebb109382c7ab6db9b36ef24e466494e7b8549cc139a74b5aaaf265f35e8347eaabe01afe21d7b7a958e9cd04b5bfa5cf78dd2fa958dbb605cd1a99613369185b2bcfe0bf0e31c83fdcb254da7cd3958983d0798b455c8c5a5a8565d83d28437895929fa0896cf45eda77c4feae29d96568c487a74dd4f9e8465f09818c12dfc93fdb09a1d04a087d3bf219efab764d3cd676f101d3b6c9177c57340b245f15af472f1b837081969db2d58ceab0b432005a86e6c450ae4241c08a6469ac65af64737af961cc90132cd2ccb6d7adf63846af1554cfcaa4eb357142a5b525a18d9d88d42520c0903bc444dc0eec4d26e586eff7c432cd12be4c796f9ebe4481f971c52a8cc7b0edab7ae872c4832b61a54963185bb7cd1fb78ff9e194e17c65acd8d015443a21815bf56f08f1d2293c4c3e8899a972056380b4f332d39737b149e16bb098c0ef5d362cde82509ead8932869d3d9b527c9e53c5c41f4d711d8b68a0a16c018ce2a24832d78f886d1ebf7300384b13efefa03ad55fbaefc026eaa571d5deb4495ebd6fc7d457af008e74855562bbb4f255c5a6819ad2b607dad73277ce2756e0ccfdd7403d13938b4bae98b98b621c309b18df38a1cd779bf479096c09851c1f2e1765212094ffb97ebf972e48871f76b5e0cdfda81df28e5f721f8a63c0fbd8ac992d7535452f7af68f5ae22020afd0a6036d51cda98fef44b69139315832d49fef81198f15ebe3a7548ba46451d93da03b99becd85851e7157d7e23b28060fc4fa989796900a9d76008d537275a8fb1d419408248ddc98113e884991726bf05401000000a5e0f6bc373e438df8508198cb61a4640684d02f9f97cedee66f2098eaa9ee8dedc0003731c511efcfa620075518635230b3467b92bf76b271bdab823dc284323acc4fc92e8fe452351272730702208f58ebf791adae9111d09727ed1d6fa159ee87aed74e5bfc1c93da96da4f3d0d8c03273b474bd194d2579541016370d3f5258941be928d191261a6139090e32cd51089d136548ccdabfe1d2cc8e151cc6ecc1b91551eabca418e41289498d659f2ab89bbe5d40ed966b5ff74b12db521c36ce6c1daaafd9dca802bac19ed4e70a64d2a99092098493764662cc153f57deaff4f68ae76f3451daf9b27a11744b9b69f6ce477d6ee279bba72df0f04e22eb2650df6cde761917dea7c34e113ec765bb5fa0c71b8c2e25f001118fbc496a153a0d6e08a8f9117165e01044cb9fb0bb4026372effb9490290541a3930b38705e05758b90f8cf42b4886d417da85e8ab3c9efb8ad688491ba005eb7a798e935f7308ddbd001e478ccb308bc6596cc0000000000002871fc836b684bc31d2b978cfbe8fa01d1484504e794f9c8edcca1a761693a163b2ded571598e9f2993f178c50e371b137717ddd8e77eb52218ce865f24e82a6242b2d5abdecd7b68a15bbb8ef2e112a3899158d35ba89a98852e0facd7c941a6fb35b338bd815e280d36f1cd538f6df56492718af380dffaa15bec46eadccc4570a88bd994807994030df8ca3b98a06582d07d48004c579cf2a9c33f09d4b203c5bca934d64e3e488d8b8610e6ac0374d26bb8a12074f8962ede175e68c4849331f95815c96e2c5dbcb6116aa290038cef08dd5736537599c6a8e7498075f3bb2f899d4a572385605a76bee3b89890995c64aa502e34da202a4d8daa58db71ffd3df18ce522590acc9d6246eb288d3b68a2b8d36f40c228"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10, r15}, 0x78) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xffff58e4}, [@generic={0x81, 0xe, 0xe, 0x40, 0x2}, @generic={0xe1, 0x9, 0xd, 0x3, 0x4}]}, &(0x7f0000000800)='GPL\x00', 0x100, 0xb, &(0x7f0000000840)=""/11, 0x41100, 0xe, [], 0x0, 0x3, r8, 0x8, &(0x7f0000000880)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x2, 0x9, 0x48b7, 0x101}, 0x10, r15}, 0x78) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r21 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r21, 0x1, 0x3e, &(0x7f00000002c0)=r20, 0x161) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r23 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r23, 0x1, 0x3e, &(0x7f00000002c0)=r22, 0x161) r24 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)={0x18, 0x1, 0x4, 0x3, 0x10, r20, 0x5c, [], 0x0, r22, 0x5, 0x4}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x2, 0x8, &(0x7f00000001c0)=@raw=[@generic={0x1, 0xa, 0xb, 0x6, 0x86a}, @jmp={0x5, 0x0, 0x7, 0x7f30c14a829d1b8, 0x9, 0x0, 0xfffffffffffffffd}, @map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x4e}, @map_val={0x18, 0x0, 0x2, 0x0, r24, 0x0, 0x0, 0x0, 0xffff}], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xd1, &(0x7f00000002c0)=""/209, 0x41000, 0x4, [], 0x0, 0xc, r4, 0x8, &(0x7f00000003c0)={0xb39, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0xf, 0x599}, 0x10, r7, r19}, 0x78) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:05:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000204e, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2482.716513][ T4505] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2482.716522][ T4505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2482.716530][ T4505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2482.716538][ T4505] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:09 executing program 3 (fault-call:1 fault-nth:50): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002060, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x10000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:09 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:09 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2483.158477][ T4540] FAULT_INJECTION: forcing a failure. [ 2483.158477][ T4540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2483.227805][ T4540] CPU: 0 PID: 4540 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2483.236442][ T4540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2483.246596][ T4540] Call Trace: [ 2483.249908][ T4540] dump_stack+0x197/0x210 [ 2483.254255][ T4540] should_fail.cold+0xa/0x15 [ 2483.258850][ T4540] ? fault_create_debugfs_attr+0x180/0x180 [ 2483.264649][ T4540] ? ___might_sleep+0x163/0x2c0 [ 2483.269519][ T4540] should_fail_alloc_page+0x50/0x60 [ 2483.274719][ T4540] __alloc_pages_nodemask+0x1a1/0x910 [ 2483.280077][ T4540] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2483.285609][ T4540] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2483.291335][ T4540] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2483.297574][ T4540] alloc_pages_current+0x107/0x210 [ 2483.302672][ T4540] ? ___might_sleep+0x163/0x2c0 [ 2483.307518][ T4540] __vmalloc_node_range+0x4f8/0x810 [ 2483.312725][ T4540] __vmalloc+0x44/0x50 [ 2483.316891][ T4540] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2483.321642][ T4540] pcpu_mem_zalloc+0x8a/0xf0 [ 2483.326227][ T4540] pcpu_create_chunk+0x12d/0x7f0 [ 2483.331161][ T4540] pcpu_alloc+0x10f3/0x1380 [ 2483.335658][ T4540] ? pcpu_alloc_area+0x820/0x820 [ 2483.340598][ T4540] __alloc_percpu_gfp+0x28/0x30 [ 2483.345437][ T4540] htab_map_alloc+0xdb9/0x11c0 [ 2483.350212][ T4540] ? htab_map_update_elem+0xca0/0xca0 [ 2483.355572][ T4540] __do_sys_bpf+0x478/0x3610 [ 2483.360151][ T4540] ? bpf_prog_load+0x1960/0x1960 [ 2483.365075][ T4540] ? __kasan_check_write+0x14/0x20 [ 2483.370175][ T4540] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2483.375705][ T4540] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2483.380978][ T4540] ? wait_for_completion+0x440/0x440 [ 2483.386259][ T4540] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2483.392495][ T4540] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2483.397969][ T4540] ? do_syscall_64+0x26/0x790 [ 2483.402632][ T4540] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2483.408686][ T4540] ? do_syscall_64+0x26/0x790 [ 2483.413528][ T4540] __x64_sys_bpf+0x73/0xb0 [ 2483.417944][ T4540] do_syscall_64+0xfa/0x790 [ 2483.422442][ T4540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2483.428329][ T4540] RIP: 0033:0x45a919 [ 2483.432218][ T4540] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2483.451816][ T4540] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2483.460309][ T4540] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2483.468275][ T4540] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 18:05:10 executing program 3 (fault-call:1 fault-nth:51): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2483.476852][ T4540] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2483.484993][ T4540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2483.493648][ T4540] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002080, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x11000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:10 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:10 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x7000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:10 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000486dd0702f8f514a81d533618ecd88cac1a425cfbf4074ddf1d77fe3c5bdf4b3efae274ca001c83e40690d6594d934bccb53c2ce986a587e60529a909e0dd0532d3cc9e559d2fc211f30820fc8b667dfc733d70cb61ee4c2dfcc7149d2cf10b7b2840e76f7cfb7e6cd01b6035220ffed39f97ba9975dfb55f85e71a10a7ed525b6f69b708b8080da6a54bdfdf5abf5a1cfce561e3878da6829b19b5a15968c64f0e7490a63dee8f4224a45ba0a675d073c8520361e609cae3e69a5b43e6779461a475fcdece189ef9a6b04b0bafee05145938db9eb955f2380a98ac7615b0"], 0x90ad) 18:05:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000020a0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x30040000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2483.814280][ T4568] FAULT_INJECTION: forcing a failure. [ 2483.814280][ T4568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:05:10 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6004, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2483.898566][ T4568] CPU: 1 PID: 4568 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2483.907204][ T4568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2483.917272][ T4568] Call Trace: [ 2483.920590][ T4568] dump_stack+0x197/0x210 [ 2483.925054][ T4568] should_fail.cold+0xa/0x15 [ 2483.929664][ T4568] ? fault_create_debugfs_attr+0x180/0x180 [ 2483.935519][ T4568] ? ___might_sleep+0x163/0x2c0 [ 2483.940435][ T4568] should_fail_alloc_page+0x50/0x60 [ 2483.945658][ T4568] __alloc_pages_nodemask+0x1a1/0x910 [ 2483.951057][ T4568] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2483.956633][ T4568] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2483.962503][ T4568] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2483.968768][ T4568] alloc_pages_current+0x107/0x210 [ 2483.973903][ T4568] ? ___might_sleep+0x163/0x2c0 [ 2483.978775][ T4568] __vmalloc_node_range+0x4f8/0x810 [ 2483.983983][ T4568] __vmalloc+0x44/0x50 [ 2483.983999][ T4568] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2483.984014][ T4568] pcpu_mem_zalloc+0x8a/0xf0 18:05:10 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x8000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2483.984029][ T4568] pcpu_create_chunk+0x12d/0x7f0 [ 2483.984053][ T4568] pcpu_alloc+0x10f3/0x1380 [ 2484.006948][ T4568] ? pcpu_alloc_area+0x820/0x820 [ 2484.011908][ T4568] ? bpf_map_area_alloc+0x20/0x30 [ 2484.016975][ T4568] __alloc_percpu_gfp+0x28/0x30 [ 2484.021848][ T4568] htab_map_alloc+0xdb9/0x11c0 [ 2484.026938][ T4568] ? htab_map_update_elem+0xca0/0xca0 [ 2484.032346][ T4568] __do_sys_bpf+0x478/0x3610 [ 2484.036962][ T4568] ? bpf_prog_load+0x1960/0x1960 [ 2484.041925][ T4568] ? __kasan_check_write+0x14/0x20 [ 2484.047049][ T4568] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2484.052592][ T4568] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2484.052608][ T4568] ? wait_for_completion+0x440/0x440 [ 2484.052630][ T4568] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2484.052657][ T4568] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2484.052677][ T4568] ? do_syscall_64+0x26/0x790 [ 2484.079575][ T4568] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2484.085667][ T4568] ? do_syscall_64+0x26/0x790 [ 2484.090385][ T4568] __x64_sys_bpf+0x73/0xb0 [ 2484.094824][ T4568] do_syscall_64+0xfa/0x790 [ 2484.099523][ T4568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2484.105399][ T4568] RIP: 0033:0x45a919 [ 2484.109284][ T4568] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2484.129004][ T4568] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2484.138823][ T4568] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2484.146797][ T4568] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2484.154816][ T4568] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2484.162782][ T4568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2484.170746][ T4568] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000020c0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:10 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x9000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:10 executing program 3 (fault-call:1 fault-nth:52): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x38040000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:10 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x80fe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:11 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000020e0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2484.520987][ T4609] FAULT_INJECTION: forcing a failure. [ 2484.520987][ T4609] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2484.564522][ T4609] CPU: 1 PID: 4609 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2484.573167][ T4609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2484.583245][ T4609] Call Trace: [ 2484.583272][ T4609] dump_stack+0x197/0x210 [ 2484.583294][ T4609] should_fail.cold+0xa/0x15 [ 2484.583315][ T4609] ? fault_create_debugfs_attr+0x180/0x180 [ 2484.601304][ T4609] ? ___might_sleep+0x163/0x2c0 [ 2484.601333][ T4609] should_fail_alloc_page+0x50/0x60 [ 2484.601348][ T4609] __alloc_pages_nodemask+0x1a1/0x910 [ 2484.601363][ T4609] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2484.601383][ T4609] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2484.628607][ T4609] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2484.634893][ T4609] alloc_pages_current+0x107/0x210 [ 2484.640030][ T4609] ? ___might_sleep+0x163/0x2c0 [ 2484.644916][ T4609] __vmalloc_node_range+0x4f8/0x810 [ 2484.650147][ T4609] __vmalloc+0x44/0x50 [ 2484.654228][ T4609] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2484.659077][ T4609] pcpu_mem_zalloc+0x8a/0xf0 [ 2484.663864][ T4609] pcpu_create_chunk+0x12d/0x7f0 [ 2484.668827][ T4609] pcpu_alloc+0x10f3/0x1380 [ 2484.673365][ T4609] ? pcpu_alloc_area+0x820/0x820 [ 2484.678330][ T4609] ? bpf_map_area_alloc+0x20/0x30 [ 2484.683396][ T4609] __alloc_percpu_gfp+0x28/0x30 [ 2484.688271][ T4609] htab_map_alloc+0xdb9/0x11c0 [ 2484.693089][ T4609] ? htab_map_update_elem+0xca0/0xca0 [ 2484.698499][ T4609] __do_sys_bpf+0x478/0x3610 [ 2484.703126][ T4609] ? bpf_prog_load+0x1960/0x1960 [ 2484.708221][ T4609] ? __kasan_check_write+0x14/0x20 [ 2484.713355][ T4609] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2484.718937][ T4609] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2484.724253][ T4609] ? wait_for_completion+0x440/0x440 [ 2484.729567][ T4609] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2484.735839][ T4609] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2484.741413][ T4609] ? do_syscall_64+0x26/0x790 [ 2484.741431][ T4609] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2484.741451][ T4609] ? do_syscall_64+0x26/0x790 [ 2484.741473][ T4609] __x64_sys_bpf+0x73/0xb0 [ 2484.752215][ T4609] do_syscall_64+0xfa/0x790 [ 2484.752236][ T4609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2484.752247][ T4609] RIP: 0033:0x45a919 [ 2484.752265][ T4609] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2484.752273][ T4609] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2484.752286][ T4609] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2484.752294][ T4609] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2484.752301][ T4609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2484.752316][ T4609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2484.803863][ T4609] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:11 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb._bytes\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) 18:05:11 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xac05, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002100, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3f000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:11 executing program 3 (fault-call:1 fault-nth:53): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:11 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xe000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:11 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xc0fe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002120, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2485.098473][ T4640] FAULT_INJECTION: forcing a failure. [ 2485.098473][ T4640] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2485.220291][ T4640] CPU: 1 PID: 4640 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2485.228910][ T4640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2485.239003][ T4640] Call Trace: [ 2485.242329][ T4640] dump_stack+0x197/0x210 [ 2485.246687][ T4640] should_fail.cold+0xa/0x15 [ 2485.251341][ T4640] ? fault_create_debugfs_attr+0x180/0x180 [ 2485.258570][ T4640] ? ___might_sleep+0x163/0x2c0 [ 2485.263467][ T4640] should_fail_alloc_page+0x50/0x60 [ 2485.268682][ T4640] __alloc_pages_nodemask+0x1a1/0x910 [ 2485.274084][ T4640] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2485.279830][ T4640] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2485.285425][ T4640] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2485.291413][ T4640] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2485.291436][ T4640] alloc_pages_current+0x107/0x210 [ 2485.291461][ T4640] __get_free_pages+0xc/0x40 [ 2485.302809][ T4640] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2485.302834][ T4640] apply_to_page_range+0x445/0x700 18:05:11 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x10000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:11 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfc00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2485.302853][ T4640] ? memset+0x40/0x40 [ 2485.302875][ T4640] kasan_populate_vmalloc+0x68/0x90 [ 2485.327387][ T4640] __vmalloc_node_range+0x47e/0x810 [ 2485.332626][ T4640] __vmalloc+0x44/0x50 [ 2485.336717][ T4640] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2485.341515][ T4640] pcpu_mem_zalloc+0x8a/0xf0 [ 2485.347398][ T4640] pcpu_create_chunk+0x12d/0x7f0 [ 2485.352465][ T4640] pcpu_alloc+0x10f3/0x1380 [ 2485.357016][ T4640] ? pcpu_alloc_area+0x820/0x820 [ 2485.362075][ T4640] ? bpf_map_area_alloc+0x20/0x30 [ 2485.367127][ T4640] __alloc_percpu_gfp+0x28/0x30 [ 2485.372022][ T4640] htab_map_alloc+0xdb9/0x11c0 [ 2485.372051][ T4640] ? htab_map_update_elem+0xca0/0xca0 [ 2485.372069][ T4640] __do_sys_bpf+0x478/0x3610 [ 2485.372089][ T4640] ? bpf_prog_load+0x1960/0x1960 [ 2485.372110][ T4640] ? __kasan_check_write+0x14/0x20 [ 2485.396865][ T4640] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2485.402457][ T4640] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2485.407767][ T4640] ? wait_for_completion+0x440/0x440 [ 2485.413088][ T4640] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 18:05:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002140, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2485.419356][ T4640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2485.424832][ T4640] ? do_syscall_64+0x26/0x790 [ 2485.429562][ T4640] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2485.435647][ T4640] ? do_syscall_64+0x26/0x790 [ 2485.440390][ T4640] __x64_sys_bpf+0x73/0xb0 [ 2485.444960][ T4640] do_syscall_64+0xfa/0x790 [ 2485.449500][ T4640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2485.455526][ T4640] RIP: 0033:0x45a919 [ 2485.459693][ T4640] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2485.479306][ T4640] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2485.487736][ T4640] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2485.495722][ T4640] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2485.503708][ T4640] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2485.511720][ T4640] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 18:05:12 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0xfffffffffffffdd0, 0xff, 0x11, 0x40, 0x81, 0x0, 0x7ff, 0x2344, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x38, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x80, 0xfae, 0xfffffffa, 0x4, 0x8, 0x1, 0x800}, r1, 0x10, r1, 0x3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:05:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002160, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2485.519716][ T4640] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x60000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:12 executing program 3 (fault-call:1 fault-nth:54): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfe80, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:12 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x11000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002180, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2485.944002][ T4689] FAULT_INJECTION: forcing a failure. [ 2485.944002][ T4689] name failslab, interval 1, probability 0, space 0, times 0 [ 2485.986646][ T4689] CPU: 1 PID: 4689 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2485.995288][ T4689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2486.005357][ T4689] Call Trace: [ 2486.008676][ T4689] dump_stack+0x197/0x210 [ 2486.013024][ T4689] should_fail.cold+0xa/0x15 [ 2486.017632][ T4689] ? fault_create_debugfs_attr+0x180/0x180 [ 2486.023458][ T4689] ? ___might_sleep+0x163/0x2c0 [ 2486.028333][ T4689] __should_failslab+0x121/0x190 18:05:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x60040000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfec0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:12 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x12000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2486.033303][ T4689] should_failslab+0x9/0x14 [ 2486.037815][ T4689] kmem_cache_alloc_node_trace+0x274/0x750 [ 2486.043635][ T4689] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2486.049347][ T4689] ? apply_to_page_range+0x562/0x700 [ 2486.054652][ T4689] __get_vm_area_node+0x12b/0x4f0 [ 2486.059711][ T4689] __vmalloc_node_range+0xd4/0x810 [ 2486.064830][ T4689] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2486.069600][ T4689] __vmalloc+0x44/0x50 [ 2486.073680][ T4689] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2486.073698][ T4689] pcpu_mem_zalloc+0x8a/0xf0 [ 2486.073718][ T4689] pcpu_create_chunk+0x196/0x7f0 [ 2486.083047][ T4689] pcpu_alloc+0x10f3/0x1380 [ 2486.083073][ T4689] ? pcpu_alloc_area+0x820/0x820 [ 2486.083088][ T4689] ? bpf_map_area_alloc+0x20/0x30 [ 2486.083114][ T4689] __alloc_percpu_gfp+0x28/0x30 [ 2486.092555][ T4689] htab_map_alloc+0xdb9/0x11c0 [ 2486.092590][ T4689] ? htab_map_update_elem+0xca0/0xca0 [ 2486.102541][ T4689] __do_sys_bpf+0x478/0x3610 [ 2486.102565][ T4689] ? bpf_prog_load+0x1960/0x1960 [ 2486.102581][ T4689] ? __kasan_check_write+0x14/0x20 [ 2486.102596][ T4689] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2486.102615][ T4689] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2486.143085][ T4689] ? wait_for_completion+0x440/0x440 [ 2486.148406][ T4689] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2486.154708][ T4689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2486.160192][ T4689] ? do_syscall_64+0x26/0x790 [ 2486.164892][ T4689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2486.170978][ T4689] ? do_syscall_64+0x26/0x790 [ 2486.175677][ T4689] __x64_sys_bpf+0x73/0xb0 [ 2486.180117][ T4689] do_syscall_64+0xfa/0x790 [ 2486.184646][ T4689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2486.190557][ T4689] RIP: 0033:0x45a919 [ 2486.194473][ T4689] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2486.214086][ T4689] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2486.222510][ T4689] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2486.230580][ T4689] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2486.238548][ T4689] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2486.246525][ T4689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2486.254497][ T4689] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:12 executing program 3 (fault-call:1 fault-nth:55): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:12 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:13 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r2, &(0x7f00000001c0)="c7fc84e05127cc75d89f254f71911431db1ed273822ca7c89d5c04f1c9b965e135dd4f1d35144a71b04212b9f3230bdecb873ec2c1ba614c1b70ee77646c7807c08f30a0130092b5aef7c164ecd303596f4a66c5f0f40f750fcc88e8898860a3214fc32af47865df0bc46b3fd3b3cefba16f00ecc728a7d5fc379a7b66b57b0e48343983f47ef3ad999949e6deabed874586f3c9c9eafe30884610e5aee34a72ec63a37d929ef5873a2afde16ece964da869033e1e6be2d5d951c370708f89adcb4f4fdadd2bfee51d", &(0x7f00000002c0)=""/118, 0x4}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0xd460}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000091fc50ba4147e23a6ba505e1e00110bd0274a376176ce4a54952e6a4e81a9ad44afdf3b1890f1b57c1baf4ab519b48b58b7df6c383fbfaf00060000000000000000001c9d73c2d7e5ae1cd4eb51dc3d8c1600"/109], 0x90ad) 18:05:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000021a0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x80040200, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:13 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x20480, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:13 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x30040000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2486.532981][ T4719] FAULT_INJECTION: forcing a failure. [ 2486.532981][ T4719] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.610697][ T4719] CPU: 0 PID: 4719 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2486.619343][ T4719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2486.629428][ T4719] Call Trace: [ 2486.632765][ T4719] dump_stack+0x197/0x210 [ 2486.637736][ T4719] should_fail.cold+0xa/0x15 [ 2486.642352][ T4719] ? fault_create_debugfs_attr+0x180/0x180 [ 2486.648175][ T4719] ? ___might_sleep+0x163/0x2c0 [ 2486.653047][ T4719] __should_failslab+0x121/0x190 18:05:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x8dffffff, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000021c0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2486.658010][ T4719] should_failslab+0x9/0x14 [ 2486.662530][ T4719] kmem_cache_alloc_node_trace+0x274/0x750 [ 2486.668372][ T4719] ? do_raw_spin_unlock+0x178/0x270 [ 2486.673596][ T4719] __kmalloc_node+0x3d/0x70 [ 2486.678246][ T4719] __vmalloc_node_range+0x1db/0x810 [ 2486.683476][ T4719] __vmalloc+0x44/0x50 [ 2486.687563][ T4719] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2486.692347][ T4719] pcpu_mem_zalloc+0x8a/0xf0 [ 2486.696962][ T4719] pcpu_create_chunk+0x196/0x7f0 [ 2486.701922][ T4719] pcpu_alloc+0x10f3/0x1380 [ 2486.706454][ T4719] ? pcpu_alloc_area+0x820/0x820 [ 2486.711399][ T4719] ? bpf_map_area_alloc+0x20/0x30 [ 2486.716442][ T4719] __alloc_percpu_gfp+0x28/0x30 [ 2486.721300][ T4719] htab_map_alloc+0xdb9/0x11c0 [ 2486.726077][ T4719] ? htab_map_update_elem+0xca0/0xca0 [ 2486.731456][ T4719] __do_sys_bpf+0x478/0x3610 [ 2486.736067][ T4719] ? bpf_prog_load+0x1960/0x1960 [ 2486.741084][ T4719] ? __kasan_check_write+0x14/0x20 [ 2486.746185][ T4719] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2486.751718][ T4719] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2486.757039][ T4719] ? wait_for_completion+0x440/0x440 [ 2486.762330][ T4719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2486.768580][ T4719] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2486.774026][ T4719] ? do_syscall_64+0x26/0x790 [ 2486.778695][ T4719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2486.784748][ T4719] ? do_syscall_64+0x26/0x790 [ 2486.789423][ T4719] __x64_sys_bpf+0x73/0xb0 [ 2486.793847][ T4719] do_syscall_64+0xfa/0x790 [ 2486.798344][ T4719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2486.804228][ T4719] RIP: 0033:0x45a919 [ 2486.808108][ T4719] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2486.827706][ T4719] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2486.836198][ T4719] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2486.844157][ T4719] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2486.852127][ T4719] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:05:13 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x420100, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00\x00\xfb\xff\xff\xff\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x20, 0x8}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f00000001c0)="83c284881a63ee9eb7d0669dbb27a179d275e8a3a38dde50fa4c8d26c3644d316584034d5658bb53c60f840c01767c8ff0c7da193f830cb837397d423246b2778a113354"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r1, &(0x7f0000000240)}, 0x20) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="000000bd9559cc6cfcd1fc237b165d6ccd0e8f014b13770000"], 0x90ad) [ 2486.860083][ T4719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2486.868040][ T4719] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:13 executing program 3 (fault-call:1 fault-nth:56): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a0200000021e0, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:13 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x34000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:13 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x280c2, 0x0) getpid() ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="06000000e3"], 0x90ad) 18:05:13 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x38040000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa000a000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2487.219388][ T4757] FAULT_INJECTION: forcing a failure. [ 2487.219388][ T4757] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:05:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002200, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2487.286436][ T4757] CPU: 0 PID: 4757 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2487.295085][ T4757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2487.305156][ T4757] Call Trace: [ 2487.308482][ T4757] dump_stack+0x197/0x210 [ 2487.312844][ T4757] should_fail.cold+0xa/0x15 [ 2487.317469][ T4757] ? fault_create_debugfs_attr+0x180/0x180 [ 2487.323397][ T4757] ? ___might_sleep+0x163/0x2c0 [ 2487.329440][ T4757] should_fail_alloc_page+0x50/0x60 18:05:13 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0xc, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"/278], 0x90ad) [ 2487.334668][ T4757] __alloc_pages_nodemask+0x1a1/0x910 [ 2487.340063][ T4757] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2487.345979][ T4757] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2487.352250][ T4757] ? kasan_unpoison_shadow+0x35/0x50 [ 2487.358519][ T4757] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2487.364873][ T4757] alloc_pages_current+0x107/0x210 [ 2487.370017][ T4757] __vmalloc_node_range+0x4f8/0x810 [ 2487.375259][ T4757] __vmalloc+0x44/0x50 [ 2487.379355][ T4757] ? pcpu_mem_zalloc+0x8a/0xf0 18:05:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000002220, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2487.384140][ T4757] pcpu_mem_zalloc+0x8a/0xf0 [ 2487.388762][ T4757] pcpu_create_chunk+0x196/0x7f0 [ 2487.393736][ T4757] pcpu_alloc+0x10f3/0x1380 [ 2487.398281][ T4757] ? pcpu_alloc_area+0x820/0x820 [ 2487.403257][ T4757] ? bpf_map_area_alloc+0x20/0x30 [ 2487.408309][ T4757] __alloc_percpu_gfp+0x28/0x30 [ 2487.413196][ T4757] htab_map_alloc+0xdb9/0x11c0 [ 2487.417993][ T4757] ? htab_map_update_elem+0xca0/0xca0 [ 2487.423394][ T4757] __do_sys_bpf+0x478/0x3610 [ 2487.428011][ T4757] ? bpf_prog_load+0x1960/0x1960 18:05:14 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3f000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2487.433398][ T4757] ? __kasan_check_write+0x14/0x20 [ 2487.438529][ T4757] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2487.444098][ T4757] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2487.449400][ T4757] ? wait_for_completion+0x440/0x440 [ 2487.454735][ T4757] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2487.461013][ T4757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2487.466488][ T4757] ? do_syscall_64+0x26/0x790 [ 2487.466509][ T4757] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2487.466523][ T4757] ? do_syscall_64+0x26/0x790 [ 2487.466545][ T4757] __x64_sys_bpf+0x73/0xb0 [ 2487.477296][ T4757] do_syscall_64+0xfa/0x790 [ 2487.477321][ T4757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2487.477333][ T4757] RIP: 0033:0x45a919 [ 2487.477352][ T4757] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2487.486424][ T4757] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2487.486440][ T4757] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2487.486450][ T4757] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2487.486460][ T4757] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2487.486469][ T4757] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2487.486476][ T4757] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000003000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:14 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x40000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:14 executing program 3 (fault-call:1 fault-nth:57): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x40000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xac050000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2487.885439][ T4801] FAULT_INJECTION: forcing a failure. [ 2487.885439][ T4801] name fail_page_alloc, interval 1, probability 0, space 0, times 0 18:05:14 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x60000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:14 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x100000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2487.940992][ T4801] CPU: 0 PID: 4801 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2487.949636][ T4801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2487.959732][ T4801] Call Trace: [ 2487.963045][ T4801] dump_stack+0x197/0x210 [ 2487.967398][ T4801] should_fail.cold+0xa/0x15 [ 2487.972010][ T4801] ? fault_create_debugfs_attr+0x180/0x180 [ 2487.977839][ T4801] ? ___might_sleep+0x163/0x2c0 [ 2487.982739][ T4801] should_fail_alloc_page+0x50/0x60 18:05:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xf5ffffff, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2487.987948][ T4801] __alloc_pages_nodemask+0x1a1/0x910 [ 2487.993334][ T4801] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2487.998896][ T4801] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2488.004616][ T4801] ? kasan_unpoison_shadow+0x35/0x50 [ 2488.004634][ T4801] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2488.004651][ T4801] alloc_pages_current+0x107/0x210 [ 2488.004672][ T4801] __vmalloc_node_range+0x4f8/0x810 [ 2488.004697][ T4801] __vmalloc+0x44/0x50 [ 2488.004712][ T4801] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2488.004729][ T4801] pcpu_mem_zalloc+0x8a/0xf0 [ 2488.004746][ T4801] pcpu_create_chunk+0x196/0x7f0 [ 2488.004767][ T4801] pcpu_alloc+0x10f3/0x1380 [ 2488.049710][ T4801] ? pcpu_alloc_area+0x820/0x820 [ 2488.054647][ T4801] ? bpf_map_area_alloc+0x20/0x30 [ 2488.059706][ T4801] __alloc_percpu_gfp+0x28/0x30 [ 2488.065465][ T4801] htab_map_alloc+0xdb9/0x11c0 [ 2488.070253][ T4801] ? htab_map_update_elem+0xca0/0xca0 [ 2488.070271][ T4801] __do_sys_bpf+0x478/0x3610 [ 2488.070296][ T4801] ? bpf_prog_load+0x1960/0x1960 [ 2488.070311][ T4801] ? __kasan_check_write+0x14/0x20 [ 2488.070328][ T4801] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2488.070345][ T4801] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2488.070363][ T4801] ? wait_for_completion+0x440/0x440 [ 2488.070387][ T4801] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2488.070422][ T4801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2488.118335][ T4801] ? do_syscall_64+0x26/0x790 [ 2488.123032][ T4801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2488.129119][ T4801] ? do_syscall_64+0x26/0x790 [ 2488.134774][ T4801] __x64_sys_bpf+0x73/0xb0 [ 2488.139236][ T4801] do_syscall_64+0xfa/0x790 [ 2488.143756][ T4801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2488.149634][ T4801] RIP: 0033:0x45a919 [ 2488.153610][ T4801] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2488.173228][ T4801] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2488.181704][ T4801] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 18:05:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000003c40, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2488.189662][ T4801] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2488.198140][ T4801] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2488.206142][ T4801] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2488.214108][ T4801] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:15 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffa, 0x10}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x11, 0x7f, 0x8, 0x1, 0x10, r1, 0x6, [], 0x0, r2, 0x1, 0x1}, 0x3c) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000240)=0xe935) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:05:15 executing program 3 (fault-call:1 fault-nth:58): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000004000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfc000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:15 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x60040000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:15 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x400300, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000004001, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2488.595500][ T4838] FAULT_INJECTION: forcing a failure. [ 2488.595500][ T4838] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2488.654983][ T4838] CPU: 1 PID: 4838 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2488.663625][ T4838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2488.675346][ T4838] Call Trace: [ 2488.678651][ T4838] dump_stack+0x197/0x210 [ 2488.683012][ T4838] should_fail.cold+0xa/0x15 [ 2488.687619][ T4838] ? fault_create_debugfs_attr+0x180/0x180 [ 2488.693432][ T4838] ? ___might_sleep+0x163/0x2c0 [ 2488.698296][ T4838] should_fail_alloc_page+0x50/0x60 [ 2488.703613][ T4838] __alloc_pages_nodemask+0x1a1/0x910 [ 2488.709119][ T4838] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2488.714699][ T4838] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2488.720454][ T4838] ? kasan_unpoison_shadow+0x35/0x50 [ 2488.725798][ T4838] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2488.732071][ T4838] alloc_pages_current+0x107/0x210 [ 2488.737224][ T4838] __vmalloc_node_range+0x4f8/0x810 [ 2488.743008][ T4838] __vmalloc+0x44/0x50 [ 2488.747114][ T4838] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2488.751911][ T4838] pcpu_mem_zalloc+0x8a/0xf0 [ 2488.756524][ T4838] pcpu_create_chunk+0x196/0x7f0 [ 2488.761462][ T4838] pcpu_alloc+0x10f3/0x1380 [ 2488.761486][ T4838] ? pcpu_alloc_area+0x820/0x820 [ 2488.761501][ T4838] ? bpf_map_area_alloc+0x20/0x30 [ 2488.761525][ T4838] __alloc_percpu_gfp+0x28/0x30 [ 2488.761544][ T4838] htab_map_alloc+0xdb9/0x11c0 [ 2488.770985][ T4838] ? htab_map_update_elem+0xca0/0xca0 [ 2488.771004][ T4838] __do_sys_bpf+0x478/0x3610 [ 2488.771028][ T4838] ? bpf_prog_load+0x1960/0x1960 [ 2488.780875][ T4838] ? __kasan_check_write+0x14/0x20 [ 2488.780892][ T4838] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2488.780908][ T4838] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2488.780925][ T4838] ? wait_for_completion+0x440/0x440 [ 2488.780952][ T4838] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2488.791876][ T4838] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2488.791892][ T4838] ? do_syscall_64+0x26/0x790 [ 2488.791911][ T4838] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2488.791931][ T4838] ? do_syscall_64+0x26/0x790 [ 2488.801611][ T4838] __x64_sys_bpf+0x73/0xb0 18:05:15 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa000a0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfe800000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:15 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x80040200, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2488.801631][ T4838] do_syscall_64+0xfa/0x790 [ 2488.801653][ T4838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2488.801664][ T4838] RIP: 0033:0x45a919 [ 2488.801683][ T4838] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2488.889785][ T4838] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2488.898222][ T4838] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2488.906229][ T4838] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2488.914211][ T4838] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2488.922183][ T4838] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2488.930161][ T4838] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000004002, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:15 executing program 3 (fault-call:1 fault-nth:59): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2489.225869][ T4871] FAULT_INJECTION: forcing a failure. [ 2489.225869][ T4871] name failslab, interval 1, probability 0, space 0, times 0 [ 2489.245901][ T4871] CPU: 1 PID: 4871 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2489.254528][ T4871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2489.265199][ T4871] Call Trace: [ 2489.265229][ T4871] dump_stack+0x197/0x210 [ 2489.265249][ T4871] should_fail.cold+0xa/0x15 [ 2489.265272][ T4871] ? fault_create_debugfs_attr+0x180/0x180 [ 2489.283304][ T4871] ? ___might_sleep+0x163/0x2c0 [ 2489.283327][ T4871] __should_failslab+0x121/0x190 [ 2489.293195][ T4871] should_failslab+0x9/0x14 [ 2489.297731][ T4871] __kmalloc+0x2e0/0x770 [ 2489.302006][ T4871] ? memset+0x40/0x40 [ 2489.306007][ T4871] ? pcpu_get_vm_areas+0x3d5/0x3ee0 [ 2489.311326][ T4871] pcpu_get_vm_areas+0x3d5/0x3ee0 [ 2489.316372][ T4871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2489.322623][ T4871] ? __vmalloc_node_range+0x4d7/0x810 [ 2489.328096][ T4871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2489.334337][ T4871] pcpu_create_chunk+0x24e/0x7f0 [ 2489.339270][ T4871] pcpu_alloc+0x10f3/0x1380 [ 2489.343780][ T4871] ? pcpu_alloc_area+0x820/0x820 [ 2489.348712][ T4871] ? bpf_map_area_alloc+0x20/0x30 [ 2489.353738][ T4871] __alloc_percpu_gfp+0x28/0x30 [ 2489.358575][ T4871] htab_map_alloc+0xdb9/0x11c0 [ 2489.363339][ T4871] ? htab_map_update_elem+0xca0/0xca0 [ 2489.368697][ T4871] __do_sys_bpf+0x478/0x3610 [ 2489.373276][ T4871] ? bpf_prog_load+0x1960/0x1960 [ 2489.378634][ T4871] ? __kasan_check_write+0x14/0x20 [ 2489.383820][ T4871] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2489.389350][ T4871] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2489.394626][ T4871] ? wait_for_completion+0x440/0x440 [ 2489.399904][ T4871] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2489.406141][ T4871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2489.411583][ T4871] ? do_syscall_64+0x26/0x790 [ 2489.416245][ T4871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2489.422297][ T4871] ? do_syscall_64+0x26/0x790 [ 2489.426961][ T4871] __x64_sys_bpf+0x73/0xb0 [ 2489.431365][ T4871] do_syscall_64+0xfa/0x790 [ 2489.435866][ T4871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2489.441762][ T4871] RIP: 0033:0x45a919 [ 2489.445658][ T4871] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2489.465258][ T4871] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2489.473660][ T4871] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2489.481633][ T4871] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2489.489586][ T4871] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2489.499017][ T4871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2489.506974][ T4871] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:16 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f00000002c0)="ab2f872fced9d0d2638b4ae11ffa28d7cbf0d5e5d2f16a18efd85ee7e4d5c3001eea7c7abfe3279f6ca6f088cfffd48fd8f23938c18c46ccb966da46342f517d664cf18a0c9fd59a4959a8d28b837f85fad37cbcfbb053d9a9973c432296606523ad6e12abc8365a071d1cec347ee86faa3c155d25bc3ac866595817d739ff2097295e8f1ae5566121d83b25296dcbbed3eef8af5d17fe0c416e45ab97860dbf34650228f804c27c6b64c50f0b725ac1503fd695041951e3ebdaf348cdcd8cdf528fe7c6"}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000486dd07"], 0x90ad) 18:05:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x8dffffff, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfec00000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x1000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000004003, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:16 executing program 3 (fault-call:1 fault-nth:60): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2489.765978][ T4884] FAULT_INJECTION: forcing a failure. [ 2489.765978][ T4884] name failslab, interval 1, probability 0, space 0, times 0 [ 2489.813893][ T4884] CPU: 0 PID: 4884 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2489.822530][ T4884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2489.832599][ T4884] Call Trace: [ 2489.835910][ T4884] dump_stack+0x197/0x210 [ 2489.840266][ T4884] should_fail.cold+0xa/0x15 [ 2489.844868][ T4884] ? fault_create_debugfs_attr+0x180/0x180 [ 2489.850698][ T4884] ? ___might_sleep+0x163/0x2c0 [ 2489.855570][ T4884] __should_failslab+0x121/0x190 [ 2489.860545][ T4884] should_failslab+0x9/0x14 [ 2489.865059][ T4884] __kmalloc+0x2e0/0x770 [ 2489.869318][ T4884] ? memset+0x40/0x40 [ 2489.873324][ T4884] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 2489.878554][ T4884] pcpu_get_vm_areas+0x3ec/0x3ee0 [ 2489.883597][ T4884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2489.889859][ T4884] ? __vmalloc_node_range+0x4d7/0x810 [ 2489.895278][ T4884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2489.901543][ T4884] pcpu_create_chunk+0x24e/0x7f0 [ 2489.906502][ T4884] pcpu_alloc+0x10f3/0x1380 18:05:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000401e, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa000a000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x2000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfeffffff, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2489.911036][ T4884] ? pcpu_alloc_area+0x820/0x820 [ 2489.916000][ T4884] ? bpf_map_area_alloc+0x20/0x30 [ 2489.921069][ T4884] __alloc_percpu_gfp+0x28/0x30 [ 2489.926036][ T4884] htab_map_alloc+0xdb9/0x11c0 [ 2489.930847][ T4884] ? htab_map_update_elem+0xca0/0xca0 [ 2489.936321][ T4884] __do_sys_bpf+0x478/0x3610 [ 2489.940922][ T4884] ? bpf_prog_load+0x1960/0x1960 [ 2489.945908][ T4884] ? __kasan_check_write+0x14/0x20 [ 2489.951046][ T4884] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2489.956618][ T4884] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2489.961925][ T4884] ? wait_for_completion+0x440/0x440 [ 2489.967230][ T4884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2489.973497][ T4884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2489.973513][ T4884] ? do_syscall_64+0x26/0x790 [ 2489.973529][ T4884] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2489.973544][ T4884] ? do_syscall_64+0x26/0x790 [ 2489.973565][ T4884] __x64_sys_bpf+0x73/0xb0 [ 2489.973584][ T4884] do_syscall_64+0xfa/0x790 [ 2489.973604][ T4884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2489.973615][ T4884] RIP: 0033:0x45a919 [ 2489.973629][ T4884] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2489.973643][ T4884] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2489.989828][ T4884] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2489.989838][ T4884] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2489.989847][ T4884] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2489.989856][ T4884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2489.989866][ T4884] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:16 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x3000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:16 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xac050000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x60040000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 3 (fault-call:1 fault-nth:61): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000401f, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:17 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xf5ffffff, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x4000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x5000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2490.817468][ T4933] FAULT_INJECTION: forcing a failure. [ 2490.817468][ T4933] name failslab, interval 1, probability 0, space 0, times 0 [ 2490.861690][ T4933] CPU: 1 PID: 4933 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2490.870326][ T4933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2490.880399][ T4933] Call Trace: [ 2490.883718][ T4933] dump_stack+0x197/0x210 [ 2490.888074][ T4933] should_fail.cold+0xa/0x15 [ 2490.892663][ T4933] ? fault_create_debugfs_attr+0x180/0x180 [ 2490.892682][ T4933] ? ___might_sleep+0x163/0x2c0 [ 2490.892701][ T4933] __should_failslab+0x121/0x190 [ 2490.892718][ T4933] should_failslab+0x9/0x14 [ 2490.892730][ T4933] kmem_cache_alloc+0x2aa/0x710 [ 2490.892747][ T4933] ? memset+0x40/0x40 [ 2490.921711][ T4933] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 2490.926958][ T4933] pcpu_get_vm_areas+0x49e/0x3ee0 [ 2490.931999][ T4933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2490.938282][ T4933] ? __vmalloc_node_range+0x4d7/0x810 [ 2490.943682][ T4933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2490.943701][ T4933] pcpu_create_chunk+0x24e/0x7f0 [ 2490.943721][ T4933] pcpu_alloc+0x10f3/0x1380 [ 2490.959395][ T4933] ? pcpu_alloc_area+0x820/0x820 [ 2490.984833][ T4933] ? bpf_map_area_alloc+0x20/0x30 [ 2490.984860][ T4933] __alloc_percpu_gfp+0x28/0x30 [ 2490.984877][ T4933] htab_map_alloc+0xdb9/0x11c0 [ 2490.984905][ T4933] ? htab_map_update_elem+0xca0/0xca0 [ 2491.004900][ T4933] __do_sys_bpf+0x478/0x3610 18:05:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="f801000000000000000001000000000089c4e265a5a1e47e655dd06f446cfcd5be08d1db9f2e0dc781b4fa269e206cf73a7a7f069dcf367deb7646b034a7f1e1948de3190271a4825db9f6111f305a40b3a6c6dbb520cf73487c60837ad68361a43d68ecf40f887f2371809c7f105ba9d551cd551303f275f5d593b2c429c1bb06e711ad61eccbec73862824848fc3bde833dbddc8da1dd7b03f60d44e383cc8bd864d1f26878ca83f698b52bff30432413be652a794c84dcff543d065c2d722a4f18d6b36b2d6ddb86b661bc5c1bd8ed3b8c01cab84bee9b4e6408cc0eff2f56a5ba0bf1a01d1bb1ec6480b27d60fa8bedeebb0b394a8afd149570b5ab454c3a7267c3422ccea2425d4d64fa9fb4370414ab0ff86497c2c9cc98de7c7d4843ce799d37286d2383d2752ff3f5ad3fa11de36ad863980f37fe4f649d4ca26f13f9a2f1758fa96047120c7850fe61a4814bedd8675ccab263024bddd81555e868d5ba98c4c020cde38a35b915c5885301409088ee3474fed22ccea1563fdd7578ace056a964ef26ac9c19c9b8dc69a60e21b701e52ffd61fb6105dd3b357c84f9da13d967f325e0aba51fc254c977783d85aaafc67bf36590039a9f21c36748ecf23725518de0713cce311738eab7754f96733fe19f1f976f2b223668cc072e5bb7f50affc08c20514bc7dd08315ef31242c"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xffffff7f, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000004020, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2491.009518][ T4933] ? bpf_prog_load+0x1960/0x1960 [ 2491.014478][ T4933] ? __kasan_check_write+0x14/0x20 [ 2491.019616][ T4933] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2491.025182][ T4933] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2491.030489][ T4933] ? wait_for_completion+0x440/0x440 [ 2491.035805][ T4933] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2491.042073][ T4933] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2491.042089][ T4933] ? do_syscall_64+0x26/0x790 [ 2491.042105][ T4933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2491.042125][ T4933] ? do_syscall_64+0x26/0x790 [ 2491.058305][ T4933] __x64_sys_bpf+0x73/0xb0 [ 2491.058328][ T4933] do_syscall_64+0xfa/0x790 [ 2491.071904][ T4933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2491.077813][ T4933] RIP: 0033:0x45a919 [ 2491.081724][ T4933] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2491.101342][ T4933] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:05:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000004021, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:17 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfc000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xc0fe, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2491.109794][ T4933] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2491.117782][ T4933] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2491.125767][ T4933] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2491.133745][ T4933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2491.133754][ T4933] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 18:05:17 executing program 3 (fault-call:1 fault-nth:62): r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000403c, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:05:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xa000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfe800000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x6000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xffffff8d, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a02000000406c, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2491.537377][ T4970] FAULT_INJECTION: forcing a failure. [ 2491.537377][ T4970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2491.611248][ T4970] CPU: 0 PID: 4970 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2491.619898][ T4970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2491.629958][ T4970] Call Trace: [ 2491.629984][ T4970] dump_stack+0x197/0x210 [ 2491.630005][ T4970] should_fail.cold+0xa/0x15 [ 2491.630021][ T4970] ? fault_create_debugfs_attr+0x180/0x180 [ 2491.630036][ T4970] ? ___might_sleep+0x163/0x2c0 [ 2491.630065][ T4970] should_fail_alloc_page+0x50/0x60 [ 2491.658150][ T4970] __alloc_pages_nodemask+0x1a1/0x910 [ 2491.663525][ T4970] ? __kasan_check_read+0x11/0x20 [ 2491.668677][ T4970] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2491.674424][ T4970] ? __kasan_check_read+0x11/0x20 [ 2491.682259][ T4970] ? __lock_acquire+0x16f2/0x4a00 [ 2491.687334][ T4970] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2491.693949][ T4970] alloc_pages_current+0x107/0x210 [ 2491.699092][ T4970] __get_free_pages+0xc/0x40 [ 2491.703710][ T4970] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2491.709382][ T4970] apply_to_page_range+0x445/0x700 [ 2491.714606][ T4970] ? memset+0x40/0x40 [ 2491.718626][ T4970] kasan_populate_vmalloc+0x68/0x90 [ 2491.724062][ T4970] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 2491.729196][ T4970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2491.735482][ T4970] pcpu_create_chunk+0x24e/0x7f0 [ 2491.740453][ T4970] pcpu_alloc+0x10f3/0x1380 [ 2491.744995][ T4970] ? pcpu_alloc_area+0x820/0x820 [ 2491.749963][ T4970] ? bpf_map_area_alloc+0x20/0x30 [ 2491.755023][ T4970] __alloc_percpu_gfp+0x28/0x30 [ 2491.759895][ T4970] htab_map_alloc+0xdb9/0x11c0 [ 2491.764698][ T4970] ? htab_map_update_elem+0xca0/0xca0 [ 2491.770184][ T4970] __do_sys_bpf+0x478/0x3610 [ 2491.774808][ T4970] ? bpf_prog_load+0x1960/0x1960 [ 2491.780373][ T4970] ? __kasan_check_write+0x14/0x20 [ 2491.785484][ T4970] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2491.791049][ T4970] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2491.791066][ T4970] ? wait_for_completion+0x440/0x440 [ 2491.791089][ T4970] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2491.791117][ T4970] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2491.791133][ T4970] ? do_syscall_64+0x26/0x790 [ 2491.791154][ T4970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2491.824120][ T4970] ? do_syscall_64+0x26/0x790 [ 2491.828841][ T4970] __x64_sys_bpf+0x73/0xb0 [ 2491.833263][ T4970] do_syscall_64+0xfa/0x790 [ 2491.833285][ T4970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2491.833296][ T4970] RIP: 0033:0x45a919 18:05:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:18 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfec00000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x405a020000004e20, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2491.833312][ T4970] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2491.833320][ T4970] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2491.833333][ T4970] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2491.833341][ T4970] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2491.833350][ T4970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2491.833358][ T4970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 18:05:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x7000000, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) 18:05:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1f1}, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xfffffff5, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3325fe8000000000000005baa68754ba00e8c1344f3e62d76c27e8000041020000000180", 0x430}], 0x1}, 0x0) [ 2491.833372][ T4970] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 2491.955028][ T4970] BUG: unable to handle page fault for address: fffff91ffff00000 [ 2491.962804][ T4970] #PF: supervisor read access in kernel mode [ 2491.968790][ T4970] #PF: error_code(0x0000) - not-present page [ 2491.975294][ T4970] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 2491.982802][ T4970] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2491.986956][ T4086] kobject: 'loop2' (00000000af12a4ae): kobject_uevent_env [ 2491.988037][ T4970] CPU: 0 PID: 4970 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2492.003712][ T4970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2492.013969][ T4970] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 2492.019785][ T4970] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 2492.036166][ T4086] kobject: 'loop2' (00000000af12a4ae): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2492.039393][ T4970] RSP: 0018:ffffc90002a17a80 EFLAGS: 00010206 [ 2492.055668][ T4970] RAX: fffff91ffff00000 RBX: fffff91ffff00f10 RCX: ffffffff819e5ed9 [ 2492.063654][ T4970] RDX: 0000000000000001 RSI: 0000000000007880 RDI: ffffe8ffff800000 [ 2492.071642][ T4970] RBP: ffffc90002a17a98 R08: fffff91ffff00f10 R09: 0000000000000f10 [ 2492.079725][ T4970] R10: fffff91ffff00f0f R11: ffffe8ffff80787f R12: fffff91ffff00000 [ 2492.087739][ T4970] R13: 0000000000007880 R14: 0000000000000000 R15: ffff88821fffd100 [ 2492.095722][ T4970] FS: 00007fc091f0b700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2492.104663][ T4970] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2492.111261][ T4970] CR2: fffff91ffff00000 CR3: 0000000066d4b000 CR4: 00000000001406f0 [ 2492.116069][ T4086] kobject: 'loop1' (00000000bd631c3c): kobject_uevent_env [ 2492.119253][ T4970] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2492.134426][ T4970] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2492.136280][ T4086] kobject: 'loop1' (00000000bd631c3c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2492.142404][ T4970] Call Trace: [ 2492.142424][ T4970] memset+0x24/0x40 [ 2492.142438][ T4970] pcpu_alloc+0x589/0x1380 [ 2492.142455][ T4970] ? pcpu_alloc_area+0x820/0x820 [ 2492.142469][ T4970] ? bpf_map_area_alloc+0x20/0x30 [ 2492.142487][ T4970] __alloc_percpu_gfp+0x28/0x30 [ 2492.142500][ T4970] htab_map_alloc+0xdb9/0x11c0 [ 2492.142519][ T4970] ? htab_map_update_elem+0xca0/0xca0 [ 2492.142538][ T4970] __do_sys_bpf+0x478/0x3610 [ 2492.181070][ T4086] kobject: 'loop0' (00000000823eb5d3): kobject_uevent_env [ 2492.183721][ T4970] ? bpf_prog_load+0x1960/0x1960 [ 2492.189108][ T4086] kobject: 'loop0' (00000000823eb5d3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2492.193669][ T4970] ? __kasan_check_write+0x14/0x20 [ 2492.193683][ T4970] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2492.193695][ T4970] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2492.193709][ T4970] ? wait_for_completion+0x440/0x440 [ 2492.193726][ T4970] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2492.193749][ T4970] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2492.235305][ T4086] kobject: 'loop5' (0000000058835581): kobject_uevent_env [ 2492.237131][ T4970] ? do_syscall_64+0x26/0x790 [ 2492.243716][ T4086] kobject: 'loop5' (0000000058835581): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2492.248809][ T4970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2492.257511][ T4086] kobject: 'loop4' (00000000c12f5785): kobject_uevent_env [ 2492.260561][ T4970] ? do_syscall_64+0x26/0x790 [ 2492.260578][ T4970] __x64_sys_bpf+0x73/0xb0 [ 2492.260593][ T4970] do_syscall_64+0xfa/0x790 [ 2492.260611][ T4970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2492.260621][ T4970] RIP: 0033:0x45a919 [ 2492.260640][ T4970] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2492.272136][ T4086] kobject: 'loop4' (00000000c12f5785): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2492.280201][ T4970] RSP: 002b:00007fc091f0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2492.280214][ T4970] RAX: ffffffffffffffda RBX: 00007fc091f0ac90 RCX: 000000000045a919 [ 2492.280221][ T4970] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2492.280228][ T4970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2492.280235][ T4970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc091f0b6d4 [ 2492.280242][ T4970] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 2492.280259][ T4970] Modules linked in: [ 2492.393632][ T4970] CR2: fffff91ffff00000 [ 2492.397767][ T4970] ---[ end trace 421c6c1f5a7de810 ]--- [ 2492.403209][ T4970] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 2492.408999][ T4970] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 2492.428760][ T4970] RSP: 0018:ffffc90002a17a80 EFLAGS: 00010206 [ 2492.434817][ T4970] RAX: fffff91ffff00000 RBX: fffff91ffff00f10 RCX: ffffffff819e5ed9 [ 2492.442768][ T4970] RDX: 0000000000000001 RSI: 0000000000007880 RDI: ffffe8ffff800000 [ 2492.450718][ T4970] RBP: ffffc90002a17a98 R08: fffff91ffff00f10 R09: 0000000000000f10 [ 2492.458703][ T4970] R10: fffff91ffff00f0f R11: ffffe8ffff80787f R12: fffff91ffff00000 [ 2492.466781][ T4970] R13: 0000000000007880 R14: 0000000000000000 R15: ffff88821fffd100 [ 2492.474747][ T4970] FS: 00007fc091f0b700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2492.483667][ T4970] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2492.490250][ T4970] CR2: fffff91ffff00000 CR3: 0000000066d4b000 CR4: 00000000001406f0 [ 2492.498317][ T4970] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2492.506275][ T4970] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2492.514234][ T4970] Kernel panic - not syncing: Fatal exception [ 2492.521871][ T4970] Kernel Offset: disabled [ 2492.526219][ T4970] Rebooting in 86400 seconds..