2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000340)=r0, 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:33 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:33 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x800, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:21:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000340)=r0, 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0x2b, 0x5d7b5690a01369, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000003500)={&(0x7f0000003240)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000033c0)=[{&(0x7f00000032c0)}, {&(0x7f0000003300)=""/47, 0x2f}, {&(0x7f0000003340)=""/39, 0x27}, {&(0x7f0000003380)}], 0x4, &(0x7f0000003400)=""/216, 0xd8}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003a40)={&(0x7f0000003540)=@can={0x1d, r2}, 0x80, &(0x7f00000039c0)=[{&(0x7f00000035c0)="a565a1c07b76d1212927f033287a932f9dc10f6a465ce955632145093712dd1d764153f8f452bb9c058fdc6f48da8cc8de08cf0304d00380f4c3315d9f1900f26ba93612fcf081fcaee164253d27f381a5ae6e6b14981c9ca63bd92429c90f59c0e710f14a8eafdedbaedf43a5a19a1fc20607f31c2eafe0fc6e506769cb118f5d2011acc20b74540fb0850808d744ffcdbd29e1bb6d529573fe0dc3f6e1b9527cc9657dfca88dd5607a1baa1f15819d766eaf921004ad543e1681fa15dbdd02f1e01ea9ca3caf4783442f93dbe3e371828d574fd97818581f3ccdc433ca", 0xde}, {&(0x7f00000036c0)="36f5f286ebfb3acefef8edd0babe3e8bb9e520ae424acda5c1f0039b5f14e223b192745a9118c28696ba6e13bab583c7518c6dbb35bf1dbbf6d393ba0a3f013d7c3d44e36b8d50e2f5a734a7d79f571afbe3f25f5520f9e3368bd69ae892bb3b9430da7baad9f44c7d8afde5e6ceabaa7c3ac9a1904a23a5866bedb9ee7db177acc9745c74c98ab4046cc6aa803d3c586dd70f5e17776cae8e11e3a8205f78efb7e2b9250de296e55a99afd51bf761e7d394833650b6d025236f0fc65176f5c409097660061fe0613a02e5fa128cedf26994632b56551405201b04670a0e2940242d54b18216fea748ec8a28c063f944a914df2c623f53d5cc", 0xf9}, {&(0x7f00000037c0)="9f4932dabd619055ec17da8a60bcd39bf4359fddce20b1b64b710e20bdfc", 0x1e}, {&(0x7f0000003800)="59679d2411b3d425a0db629fabdfb504d78af9417bd1cfc317164869b76d834def6708d5a9fae496c52537bf71a39511666d976a07d2c8e27c811be9f297f7b6470ea174b3f4cff2336f7d12c2e309e7a09d80dee30912d9566e1475fca37cfec573104c3db54073b1734b96ba94684d1e1a73861710d145c92cacfa0ea3d9879db37eab65cc6119b37cfc8bfd5abe35e93e81bfbae78a298dd75a17b838c9d50d620b1de69173b74d64b18948ac37bad21ba433751e0f7da3c61c3b5f2baf0a6c4dd5025bdef1da3431c3e563c1a50129d12f471849826163126cf8b055563a4fc01a5656d6eba0b64f045ad42a72629e17ef039e1d", 0xf6}, {&(0x7f0000003900)="8bd99823b2b55447b169424c1c5a4321d2883c671b95c193d0d54db622b7827adff2e399c0bb9306c86b17ea450e7f0a9a5a78fd925066bf72f560258372fceee5610584a56dde9560a38d5d8ebdc31c4a7f14d6c252b6f4d2c7879562371abfd8306d165d431dcac44e12533d9a2a9bdc04cee4105d32818dc49db9f8ebff906d6a", 0x82}], 0x5}, 0x8004000) 06:21:42 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 3: ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:21:42 executing program 4: 06:21:42 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x3, 0x5, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000006fc0)={&(0x7f0000006d80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006f00)=[{&(0x7f0000006e00)=""/219, 0xdb}], 0x1, &(0x7f0000006f40)=""/83, 0x53}, 0x2) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r3, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x20, 0xff, 0xb4, 0x4, 0x0, 0x1, 0x200, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xf, 0x4, @perf_config_ext={0x1246136e, 0x5}, 0x20002, 0x401, 0x2e0f, 0x8, 0x100, 0x0, 0x8001}, r2, 0x7, r4, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) sendmsg$kcm(r0, &(0x7f0000008600)={&(0x7f0000007000)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f00000072c0)=[{&(0x7f0000007080)="719a0d9bc018d49f82ecdca05690b6fbf7f508bb47f19aa645f6e89533e8b76c72d43825d64608736266450ee1e3ea020355be6363f1f4235aa84592991d1549fb7fd8a9485889add40cb536c1b5fc05c24c35f2ba5d4d82c0efc93555ef67c7a8734f109a7a9d29a0b24a082f055b0ea5a23e33763c742e2b9714602961abb8d07a7bc2fa6d24d5c3764d5e96d5f250b39637423c8779a4b4c4fcdd66a462a9760277ab16b7d82a354f08ba948a25ded73f268b7364428819aee2e38ac2b866fc40f6ab696de00366816b7b8ac3bc9e48", 0xd1}, {&(0x7f0000007180)="5adc6ca2ee0ca394e12e4b7dbf1e1362a11a2b434c1e3e5c60b84a955ccf013a846fdfc21f9e434e5587ba6842b3f3bdb9ac893e9ae406c7b6b9ef9424884164db8a610a377517cf9e4f2dadd386febb5b6c649906c556fe93e598a222af0364d5c80693419542752f7f4311dcf891338cdf", 0x72}, {&(0x7f0000007200)="f535d61c18ee71b146d98ccde51294fbcb5d065ddd5113566711fa0a067ed1ba6b94a7fbeee7e77ca054b68c92e40ba29ebf0255a08cf273efde86f477f2c2a09239dd504089147541aad4498377ed9fc7a49d65fa1a9055af063363510c323d2add5d5d25788bb9b2ef9902a812d0b587869643f946a67c058b1c65ca6fbfd36693f00d50b4d2501574300e26ebb5a9ebe5925f67a812f8d339bd46dfeb4ece6ba90d007d26af0e", 0xa8}], 0x3, &(0x7f0000007300)=[{0x90, 0x11, 0x6, "9ad85a1cef45e8836527466c81f2f441ab8c337021d94cdc2c7018786e310a520bb2ffe3c308e3d50ca0a10fef451309c716c0f14683aedee3238a08d914970da9dae36e6e58b253f52b3b8d0674500baceb64355f8177dc73cf200336e70a0dea5f0cbfe299a5a1859581d86bb39613d849095f2358eca4adc3"}, {0x1010, 0x10c, 0x2, "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"}, {0xf0, 0x10b, 0x4c9, "f4ca3d91b6a3f526eaa4ac228c4dfe64be80880332a6b16a5f4ef713e2c3fd591280e03b382179b1afedf2bf20820f70d8b948bf43f69aa034f8cfcfedaafac4a40c8626f71680a33b651fd50fb931f6b03eba25726529f4dc9ba9103009551748b1162a84be3288a2ce3a17b5c46a01e0bd4d1bc80d826a5114c75448b1a5ae8411ecb29f8cb2ceba42df9c6dee4eb2149395f64fa2066f35825cb5678c61a0bbd1cba75898867f8fc27f8a709b138382290e0f8c40327adcc14b5f5114adeb91a02c0d794021ad831e119d8f4ddc08892044f99fbe4513428a1119e0"}, {0xc8, 0x109, 0x8, "913a6a50c6e491816a14224e7fdef66fc7ca202c149c90e27f5954f8c9019d68b355767d4edda91f99ca28c2bab8bd6f3935473c987de68f46087f8026b8524f6ad52efe155cc896664841f2efec4a5f50eb7ad268560563e5fd6d235786ab1b47c9a858344c5f3a55a3aa4783aae5f02b3613bd7d3bed6e17f8645e5b6b635c476a91e3ce724725104b5dd5ecf6dced3fd29fdaebb395fb18a9036b838097ab612706de8936c6fa72edd251de18d7ca3c7587e720cdab"}, {0x80, 0x107, 0x8, "fd674779c79a18c6ff5df00ff3e9624fb6691576668c0ac9f7ac990565ca63a763212d8a453e6f5d550917f57f66a18c723fdea501978d7600c5e8fe607cfb30975d2f865d0b2560ae7d1f8428087a398a639c2fa963ac91cbd6b4789fcb33188856ea4b1e0fd354912208ea0e"}], 0x12d8}, 0x4000) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$inet(r7, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000200)="e94f3c11d5d6de2ecedce65bf4dde99253a9a87a2bd580b134e775cf6d0ca7d79aba7a9811b9fed95311f0e229a65dafdfbef3c87f55bc7e9d55c455cd8347d224400287e7ae752f0654772c66969fb7bacfdd4eebb51548d9359113a05de82ebb2fafce4b9465b955ae16c8203adbd397e9bf4b5d86074c0657d1d28bb66e42e89644c156cd1f4f18c310214e38eacdbf2f6db416d588adf1e42ed3", 0x9c}, {&(0x7f00000002c0)="c8a83f27301f16055df78311450847ec1a8918de74b65c595605cbcbd822465b5ae011cc3ce38e01a1691927ab0ede9028feaa5a7e595f24db9e554ea0d6e72ee09a60378fd64cc43fbbe8120d288fb36cec6ee70992c5269a457caad4f3cfe3ea09641cf7c8351b440e02dde69b79e5cb0f07934a4dc8214744a6a019ecad83c57e120403", 0x85}, {&(0x7f0000000040)="55b946c44746f19852d919698ad3d681e05d40e4d451df4ac0115b968d0d11fe524c9d5e7b6f0140b3c816eb5b1109773eea614b099471bd6f15f20e1148748b1e2157dfe9df846ac13332fbcaaa14bf190b5fb1b5cafce12b2e66f8d255917d7badda73863d2a9563219e", 0x6b}], 0x3, &(0x7f0000000380)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x140}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x63}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x48}, 0x8000) 06:21:42 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 4: 06:21:42 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000340)=r0, 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:42 executing program 4: 06:21:42 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:21:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000001480)={&(0x7f0000000100)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="ac18f7514ef98c66224c0ac78a7075e1a2da965e3198aaca8f1bf5cf9a65c9cc17ec19fb434da329fcda54c9c1a6425f9a5ef7e9b9591f0256af4f7f52b04d44688e3cb1f33f4b58b9619b451ebd8c3bb148b3ce0f1b9737dfea11184e360969bc317c9ac5250942abc74533934f2347717b09658552cffbb65602f38ae23a6c8b6c9de95426ab0cd1ec6ca148af6ed3b0860892ca22d392412d8e06359a38afbab0a610719db0e784c7b805b6119d4dd70888f334ea3594f782b7251d2067be", 0xc0}, {&(0x7f00000013c0)="03fc563bf602db2a54161eb65bec50ab71d5c32689300b60e5edcb8c86f5797fcfcd209030a17a2b302189320ff3b8887147b36a7b5da079c790a4a3538edc42a3f6724c8575ae10b246174085", 0x4d}], 0x3}, 0x4000000) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x9, 0x4}]}, @typedef={0x3, 0x0, 0x0, 0x8, 0x3}, @union={0x6, 0x4, 0x0, 0x5, 0x1, 0x9, [{0xa, 0x5, 0x6}, {0x0, 0x3, 0xfffffff9}, {0xd, 0x3, 0x4}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x50, 0x0, 0x30, 0x0]}}, &(0x7f0000000200)=""/225, 0x7b, 0xe1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000001600)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000015c0)=ANY=[@ANYBLOB="2d1f386868202b6d656d6f727920006d656d6f7279202b63707520"], 0x1b) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000014c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001540)={&(0x7f0000001500)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001580)={r3, r4, 0x7, 0x1}, 0x10) 06:21:48 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000340)=r0, 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:48 executing program 4: 06:21:48 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:48 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:48 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:48 executing program 4: 06:21:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:21:48 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:48 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000340)=r0, 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0xf, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tuX\x00', 0x125080, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x0, 0x2, [@local, @broadcast]}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xffff) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@tipc=@name, 0x80, &(0x7f0000000500)=[{&(0x7f0000000280)=""/212, 0xd4}, {&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f0000000140)=""/8, 0x8}, {&(0x7f0000000480)=""/77, 0x4d}], 0x4}, 0x40008040) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000100)) 06:21:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg$kcm(r2, &(0x7f000000a700)={&(0x7f000000a380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a600)=[{&(0x7f000000a400)=""/145, 0x91}, {&(0x7f000000a4c0)=""/163, 0xa3}, {&(0x7f000000a580)=""/74, 0x4a}], 0x3, &(0x7f000000a640)=""/169, 0xa9}, 0xedd43cbc340319db) bpf$MAP_CREATE(0x0, &(0x7f000000a740)={0xb23225c62423ba03, 0xa6, 0xea71, 0xfff, 0x2, 0x1, 0x80000000, [], r3, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x5, 0x9, 0x8, 0x3, 0x0, 0x4, 0x14088, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xe35, 0x0, @perf_config_ext={0x7, 0x200000000000}, 0x1090c, 0x8, 0x6, 0x0, 0x7, 0x2, 0x1}, 0xffffffffffffffff, 0xf, r0, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:21:57 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340)=r0, 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:57 executing program 4: 06:21:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:57 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x6d, 0x3, 0xffffffe1, 0x0, 0x1, 0x2, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x1000000000000001, 0x4}, 0x20, 0x0, 0xfffffffc, 0xc}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r8 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) openat$cgroup_ro(r7, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r7, 0x400454c8, 0x1) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x1) 06:21:57 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x800, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:21:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:21:58 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:21:58 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000340)=r0, 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cends\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu2et.effective_mems\x00\xb3\x98\x9f\x84\x0eb]y\x953\x98\xa5*\xd9\xd4\xcbb-\xbd\x87o9\x01\xb83\x00\x00\x00\x00\x00\x00\x00\x00\xea\x13D\xe2\x9d\x7f\xb0\xd4\xd6\x9b\xb2\xf2\x8c\x87#1\xa8\xbe:\x8e\xa5S\xe7\x85\xd1\xf7\xa0{K\xd3B\xf7W\xeb\xb1J.\xcf?\x14\xf9\bl\xa1B\x01\xd7<\xcb\xd0\xca\xf70\x1b)\x96\xa8L\xbc\xbeV\x10a\xf8&\xff/\xcb\x8d\x14\xecy\xe9\xe2.\xcb\xe0\xd5E(\x8c\x00G\xbf\xe1\xfd\n\xc0\xcfT2sH(O\xb2\x05}\xf6\xbb\x88\x1d\xd1\x98\x0f\xf5EO6g\xf3\xb3\xfe\'\xce\x8cc\xc1r\xec\xd4b\x1f\xd0\xad8#\xa8\x8e\x92?\xab\xd6\ny\xb6\x8ck\xf7\xea\xd6a\xe4[\xd4t\xe7qo\xa7\x81o?\xc2a\xb5\xbd\xe3\x01<\xca\x02Sk\x87\xb6\xab\xe8\xc3a\xb5\xfc\xba\xa6)`9V\xed\x82\xdd\xb5\xc84\xc6%\xdc.\xd4\xcc\t\x14x:\xe9\xcd\xd3\x83\xca\x8e\xa6\xdey\x8f<\xc6w@r^\xee\xffk9\xceD1\x06\xd9\xe4\x80\xba\xb7\x05]p\xb24\xc6\xee\x8f\xae%\xe0p\xed(\xc9\xed\xd0\x9c\xdc9\xfbL\x99\xdb\x1e\x80\xce\xb4\xe4\xd8n6(9\x1ch\x83g4\x92\xd0\x00'/334, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:07 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x6, 0x1, 0x1, 0xf7, 0x0, 0x7fffffff, 0x2, 0xf450f865f2fc8755, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x1, 0x3}, 0x100, 0x4, 0x9, 0x5, 0x5, 0x40, 0x9}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)={r3}) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="8500000007000000c60000000000be00950000000000000057e0f076c05184463cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r8, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000200)=@nfc_llcp={0x27, 0x1, 0x1, 0x0, 0x6, 0x0, "49c53802b7e52c2f4a9812348cb1dff8d399c1729e655935b3365cfb06f73a147b50d501c53a5a195627c762a34a8ff9a34c1b329c10e0f9ff369989bbab2f", 0x38}, 0x80, &(0x7f0000001540)=[{0x0}, {&(0x7f0000000300)="590878dd14040ddd146df7db8ff0d84f8ccff2ef7d09fc446a8a1c0e00ab7c0ced24e4a6cdf636ae1e0f19a1204449fa0d8c3d387a88bfd490d45aae7456a9bcb4486675edf6aca5dcc190f06a999e8eacceb1b076f005f54f5e6c127e9e83f2a0791ad713321bae3232aa71ab6fbcba677bf316b5b4acd4da0ca4a57743af69f653ad29335236e0113557d4b55c2c9ed9ad532c641be2421fef6bd1c792c68268aebd2c71b35cfb88587b842b666384d69ead1fdc8c5e77d395f9ca40", 0xbd}, {&(0x7f0000000400)="fe155ceb10dc041c93b9f56d6ac77c1ce1ce4f8534e91d654d9701ef8dbe205eb0668803817ce0e0057aa3293706d1aa7d79f93d364fa4b75d1135876ab1248b72997b8bd834df17cb577bcf46ae95531b4b5a3024adb320bf55866120450a2a643ed28431742c94277eb225870b0f1080392f5d1969ef502317b2a46656423fb920", 0x82}, {0x0}], 0x4}, 0x80) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r9 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) close(r9) perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x70, 0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xe9, 0x0, @perf_bp={&(0x7f0000000140), 0x3}, 0x249, 0x35e38f81, 0x7, 0x3, 0x1, 0x5, 0xc434}, r6, 0x3, r1, 0x5) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x1, 0x1, 0x6, 0x7, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000440), 0x4}, 0x14400, 0x5, 0x8, 0x1, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x9, 0x1, 0x7f, 0x0, 0x100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000380), 0x8}, 0x4000, 0x4, 0x10001, 0x7, 0x2, 0x77000000, 0xd0a9}, 0x0, 0x0, r10, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000100)='^vboxnet1:md5sumtrustedmime_typekeyring*\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) socket$kcm(0x29, 0x4, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:07 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r4, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r5 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x4c, 0x9b, 0x88, 0x20, 0x0, 0x100000001, 0x800, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xb7, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x3, 0x4, 0x4, 0x6, 0x88b7, 0x8}, r3, 0x1, r0, 0x8) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x1, 0x5, 0x4, 0x0, 0x3, 0x40000, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x400, 0x6, 0xfffffff9, 0x6, 0x3a, 0x3ff, 0x7}, r1, 0xf, r5, 0x1) 06:22:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x20, 0x1f, 0x20, 0x20, 0x0, 0x679d4ff2, 0xa2851, 0xa, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xc1ba, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0x208, 0x400, 0x6, 0xb, 0xfff, 0x0, 0x4}, r0, 0xe, r2, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x9, 0xbb, 0x80, 0x0, 0x10000, 0xa8000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x100, 0x3, @perf_config_ext={0x2, 0x3}, 0x40a, 0x6, 0x1000, 0x0, 0x4, 0x800, 0x1}, r0, 0x8, 0xffffffffffffffff, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'ip_vti0\x00', @broadcast}) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x1, 0x8, 0x40, 0xff, 0x0, 0x4ece, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff000000, 0x0, @perf_config_ext={0xfff}, 0x14840, 0x4, 0x7, 0x1, 0x0, 0x1, 0x2}, 0x0, 0xc, r4, 0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:07 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r2, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x81, 0x6, 0x80, 0x1, 0x0, 0x1, 0x412, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x7ff, 0x7fff}, 0xa000, 0x8f, 0x8, 0x8, 0x38, 0x8, 0x1}, r3, 0x4, r0, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x1, 0x81, 0x3f, 0x0, 0x4, 0x18488, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x5, @perf_config_ext={0x400, 0x2}, 0x22000, 0x40, 0x0, 0x16, 0x7, 0x9}, r1, 0x0, r4, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000080)=0x8) 06:22:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x6, 0x1, 0x9, 0x0, 0x200, 0x5000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff9, 0x0, @perf_config_ext={0x2, 0x19af000000000000}, 0x2482, 0x7ff, 0x0, 0x0, 0xffffffff, 0x6, 0x7}, r0, 0x4, 0xffffffffffffffff, 0x8) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:07 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup(r0, &(0x7f0000001480)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000001300)='cpu.weight\x00', 0x2, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x81, 0x3, 0x4, 0x20, 0x0, 0xb22, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffff7f, 0x2, @perf_bp, 0x8050, 0x4, 0x7, 0x9, 0x81, 0x6, 0x7fff}, r0, 0xb, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000001340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f00000014c0)=0x1, 0x12) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$kcm(r7, &(0x7f0000001440)={&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="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", 0x1000}], 0x1, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"/413], 0x130}, 0x10810) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x26e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20042}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={&(0x7f0000000000), 0x27ce6da9eededced}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f00000005c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/31, 0x1f}, {&(0x7f0000000740)=""/18, 0x12}], 0x3, &(0x7f00000007c0)=""/4096, 0x1000}, 0x10000) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000001800)=r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r8 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) openat$cgroup_ro(r7, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7f, 0x81, 0x0, 0x7, 0x0, 0x75750243, 0x40, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x5, @perf_bp={&(0x7f0000000040), 0x4}, 0x4000, 0xffffffff00000001, 0x40, 0x6, 0x6, 0x8, 0x8}, r0, 0x9, r7, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:16 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r2, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r3 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x5, 0x62, 0x80, 0x6, 0x0, 0xff, 0x200, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3800000, 0x2, @perf_config_ext={0x81, 0xe396}, 0x8000, 0x5, 0x6, 0x7, 0xa5f6, 0x4, 0x7}, r1, 0x9, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x1, 0x5, 0x3, 0x0, 0x0, 0x9ef, 0x22b38, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x4000, 0x9, 0x50, 0x8, 0xe5e4, 0x9}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x4, 0x70, 0x1, 0x6, 0x7, 0x5, 0x0, 0xacd7, 0x20, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7d5, 0x3f}, 0x2a4836c3eb22a07b, 0x0, 0x6, 0x0, 0x8, 0x122e, 0x7}) 06:22:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 06:22:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x4, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth1_to_bridge\x00', @random="f37de4ac9fea"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = openat$cgroup_type(r1, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r3, &(0x7f00000000c0)='threaded\x00', 0x9) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:16 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x80, 0x9, 0x81, 0x7, 0x0, 0xfffffffffffffff7, 0x8100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0xb, @perf_config_ext={0xcae1, 0x100}, 0x40, 0x800, 0x0, 0x8, 0x400, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x1, 0x3f, 0x5, 0x2, 0x0, 0xf4, 0x2, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x7, @perf_bp={&(0x7f0000000080)}, 0xb71c195a376385a3, 0x5, 0x4, 0x6, 0x0, 0x5, 0x7}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x19, 0x5, 0x1, &(0x7f0000001300)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="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", &(0x7f0000001200)=""/231, 0xb76869dc10582b8e}, 0x20) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) 06:22:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r0, r2}) r4 = gettid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r5, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) openat$cgroup_ro(r6, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x9, 0x2, 0x1d, 0xf8, 0x0, 0x23f8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0xa, @perf_config_ext={0x322891af, 0x3}, 0x200, 0x80000000, 0x7, 0x9, 0xfffffffffffffffd, 0xfffffffd, 0x3ff}, r4, 0x0, r6, 0x14) 06:22:23 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r2, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r3 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x5, 0x62, 0x80, 0x6, 0x0, 0xff, 0x200, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3800000, 0x2, @perf_config_ext={0x81, 0xe396}, 0x8000, 0x5, 0x6, 0x7, 0xa5f6, 0x4, 0x7}, r1, 0x9, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x1, 0x5, 0x3, 0x0, 0x0, 0x9ef, 0x22b38, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x4000, 0x9, 0x50, 0x8, 0xe5e4, 0x9}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x4, 0x70, 0x1, 0x6, 0x7, 0x5, 0x0, 0xacd7, 0x20, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7d5, 0x3f}, 0x2a4836c3eb22a07b, 0x0, 0x6, 0x0, 0x8, 0x122e, 0x7}) 06:22:23 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:23 executing program 4: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:23 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair(0x9, 0x75172482b436faa2, 0x81, &(0x7f0000000000)) 06:22:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup(r0, &(0x7f0000001480)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000001300)='cpu.weight\x00', 0x2, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x81, 0x3, 0x4, 0x20, 0x0, 0xb22, 0x1000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffff7f, 0x2, @perf_bp, 0x8050, 0x4, 0x7, 0x9, 0x81, 0x6, 0x7fff}, r0, 0xb, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000001340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_int(r5, &(0x7f00000014c0)=0x1, 0x12) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$kcm(r7, &(0x7f0000001440)={&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000300)="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", 0x1000}], 0x1, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"/413], 0x130}, 0x10810) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:23 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000340)=r3, 0xffffffffffffff82) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="e5a1b504f4486db113f1", 0xa}, {&(0x7f0000000040)="1bc8db5ef8048f7d2b8f3aecbfd0f8830dda984e59601e0cfc00768ad6ff89d60113684dad43e0f1f00b07a1a12e33f759e40c5206a96bb6c3d8814668a5453ef6edbdce6cdbc2ea47700b3774101200d5e7a5814a9a4d96", 0x58}], 0x2}, 0x40800) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:23 executing program 4: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:31 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:31 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='mime_type*#cgroup\x00') r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'veth0_to_hsr\x00', 0x10}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:31 executing program 0: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000340)=r2, 0xffffffffffffff82) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:31 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0xd, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x9, 0x3, 0xdb, 0x0, 0x6a, 0x40, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000000), 0x13}, 0x204, 0x3, 0x8, 0x127cfc9357d46d20, 0x204000000000, 0x1b2}, r0, 0x7, r1, 0xa) 06:22:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)=@x25={0x9, @remote={[], 0x3}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000540)="2a3889b171b3ac29a12c6c1aa4a800c58850ad9ed1be2019a7f38e651afcfcdee15b8b1b4720a71177ff3383d1fe15121fb1e4479224a6fafb8e948356a98fe9ab66ae9550f2110f0406cec97fe04f56ce8cc61abe12e44bf9b7a5302923a26a39df8d81c467115ce92d685265903dc3835c3052c7cbb5be4f895ce952ac30e8b073ca203004f6b68502e21ffaa5ca048e4e2e366986591a206dfbebaff6380956fa87d19be1ad2ba7de8d6df7272078f4312c365f11584ec054de54acfbec8fa6c1f02f62d77b3e32e5bc077956e206ec703dcf705995f8bf7bcd4fdf54f66064b865334ed07db57c5989ca731542fd6ee9469d5541", 0xf6}], 0x1, &(0x7f0000000640)=[{0x10, 0x0, 0x1}, {0x18, 0x31c, 0x796d, "06e9c65fd51e"}], 0x28}, 0x2004000) r3 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0xb, 0x20004, 0x5}, &(0x7f0000000380)=0x100000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r3, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r1, 0x0, 0x11, &(0x7f0000000140)='proc!^em0vmnet1@\x00', r4}, 0x30) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x5, 0xa2, 0x3, 0x81, 0x0, 0x3fe1, 0x400, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2445362b, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x40, 0x8, 0xffffffff, 0x2, 0x8, 0x7}, r5, 0x7, 0xffffffffffffffff, 0x2) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r6, 0x4) 06:22:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)=@x25={0x9, @remote={[], 0x3}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000540)="2a3889b171b3ac29a12c6c1aa4a800c58850ad9ed1be2019a7f38e651afcfcdee15b8b1b4720a71177ff3383d1fe15121fb1e4479224a6fafb8e948356a98fe9ab66ae9550f2110f0406cec97fe04f56ce8cc61abe12e44bf9b7a5302923a26a39df8d81c467115ce92d685265903dc3835c3052c7cbb5be4f895ce952ac30e8b073ca203004f6b68502e21ffaa5ca048e4e2e366986591a206dfbebaff6380956fa87d19be1ad2ba7de8d6df7272078f4312c365f11584ec054de54acfbec8fa6c1f02f62d77b3e32e5bc077956e206ec703dcf705995f8bf7bcd4fdf54f66064b865334ed07db57c5989ca731542fd6ee9469d5541", 0xf6}], 0x1, &(0x7f0000000640)=[{0x10, 0x0, 0x1}, {0x18, 0x31c, 0x796d, "06e9c65fd51e"}], 0x28}, 0x2004000) r3 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0xb, 0x20004, 0x5}, &(0x7f0000000380)=0x100000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r3, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r1, 0x0, 0x11, &(0x7f0000000140)='proc!^em0vmnet1@\x00', r4}, 0x30) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x5, 0xa2, 0x3, 0x81, 0x0, 0x3fe1, 0x400, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2445362b, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x40, 0x8, 0xffffffff, 0x2, 0x8, 0x7}, r5, 0x7, 0xffffffffffffffff, 0x2) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r6, 0x4) 06:22:31 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x20000}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="6ce7885b2f3ab7a1a0de67fd69ee9e1cb103334bda9297a5f3ff064630ea64d11a487fd50883aa0c0a32b2e766509966adb81f057ed456a18e85373e288b37a5ba4318b64ba5ce773722cabdc2580aa8ad90c13aafcb2b02ec03d7b056c7e53212f4aead19875153f40a6174a0a8e54a2ca98e0c5935cd96650bcf7cd3b21ab9df7f39a48b12fdbd5aa70a208d3c", 0x8e}, {&(0x7f00000012c0)="3ad945b74ab03f3d536db84791fdfe76b1149d04f5b2c9ce8e8df4177f8310855f44c1c076bb030afb4d87fea9559c5767d192c440ad9d1ef29e068311f3dbd30eed75f0c5e7302eb8fd4608bb43e2828adde7b10bec861f3c06070c43e859e97bd4b04c27b4a67fb4dab1715eb8910b9458999d338dd22569d42721907bedf2b6679a32579de273f31584d68830589e440478", 0x93}, {&(0x7f0000000080)}], 0x4, &(0x7f0000001380)=[{0x108, 0x22b, 0x3, "7a5756c764a9a0714e03422014a43bf21ba5646e54bd440422ee8e3428865d5a5e54ace10139e407847b0a1c882ce60aac238b542eaf915bab5924cc14f3114bf112ab3dc3576045213ddb5845c13fb1c0427fe10d9727ddb97c54ad4d2ed37af5218f0dc5a77d40c3a1e4c6f1ae4d48af3c23bfc8d1f7a55b766170f7da8038254c77899755db89a8781cf18a23efcf2b19351a123a0701abe3ab823e53b60bac38bebf67223aa48c4200e61f3b24422d89088e234509a9c7f84e48730dd65a5df00429b9d6a29b3502a89c70a5c6e3089b4b6deb5b0aed9fc2b76e4796c6c31cd2985ec01ceb24188d40f30c64e6f3645bd413d7694f52"}, {0x58, 0x112, 0xfffffff8, "1d46f1298b2b2eaf2f6afcb62a630b48fbb683689a06c7bca4645f3b8d441a34d056dc18743fda902f139084c649fd715ee43585bf9a1b21fe1b8f7317f511f5a69cae84"}, {0x1010, 0x118, 0x2, "8b7959f5e25cdf1978de6add7c00683df7e73a24264e728288f48cd017ec96d300c93c9d86e12d0ceea3d0cac85ea40f956f35b4777e102cacc9557a584f20e10a96a332256134bf750f81fc59a0c38145d3149a4cdf9313a9a0062948734347259151fa4168f2ef3c823e3a8df36cd32b877e4037e30e9e7ac21cd60102eedae1018989fd976211f106b397be2cc58c5d37a2d5bcedcf2d4c60d661e69d4ad50fad6c6dae91dce900bd6fac09abeeaea83d569eb450015d1245407b496b8160b2052d981ba276b3dfd42ee345ad28891b9c54900e1d06cd949ae20e38865d1ebf082686bd774bcbdcbc032229155b4f79560fa2e8ad95caabbbda3a6116491981749f58e3b34f41bb9fc36bd8bf55cff253dd029554aae35c98f30e196f1b0da1663cf7692b706011bd1c122e724aeb80e1cb75828e65a8160b2cfcb0d30bc89be99de445d22a6a5079de498ca441338c475afb936b82719acd55423c0b60050027e1acc129980f6857ed35fdc36965d73356f978812b94d30273ec87d5a2a9f7ea504f37dd3e8400eab9f6563a273b526a98de64873fda2de290d7878d58dfc2784adcdcbe99b2d9cf9e2918f1498293cf158ea8521e1feae7ddaad14cd878b737619ca75e18faac5bb94e52a4c87264dcbe043ab6d7795c7b45d4a928b5c3d48888af9bfbbcc88503e179d4fca32fb61ec84372e28fd80ccfc967091c79b6238c2d78f23bd353eaebfd3db07ee0f45e9ebb91826fde7ef1ea0abf2203226017ee09616b305a729f01fd524aa7b4364171bd1910de6a4af140d0ac96f4bb485cdec600fa412981ca1426bb70c7c91cbd41864b69deb27fd07f78a524043fccace53d3d577284fb5005abd243a44858ed3a4c07fa34ac2103f42805219496692f13d1dddaa58e1a37a4cd3c4b2ce537182c9ec7ce480aea4e55651246771b32d2f69cbe409946b5eaafdfea774a0e9eb2d61296bc6fd14253dff9e69d5c396f14e5ca56f69b415ba129216a9d3d2004003577987fb6fd92bcc832ba50417ea973ed65bc9b9dc7c97f0f1303016eb513fb765e459d6a2909285b64c8161ed1b2dc228b77d54fcc90967b7cd313f8cb21f3792be2c9f499e6992b6747a832de92fa8c37d633f923be5220ce4f6d4b8d3dfd6c7e177e71fdee0c820f36d9a7c5733e68f87a905baa4607f463f9c1f143349e6c81afae900bd53ca44f88d2b9e14a905c9a6affb9206d1f93ea516479d3321f8ae8d3910155e1944313c4415eb2e9bf2931b6336a95bdde200656776c7f174afb89536c3f4ea42564a17d1056f48121b611e49af9b25a632c9ff1b687aaa87a2cf12f29c30be1833ff21bf5d8500fc59383d4bf557f399a4114f7aa06c111a26bde42d8222f155e1516a94040e617ee5085ae75be3bfd7d76bf89f5787cd0140cccca43db78f5ab10e69a90594d778b46533a03361d03d9c6857cb960a16581f1b134c9f36eb67773264d1fec7083585416d241e2ee45425279b9eb70a4426fb890728c0b727f3a97f47778220f61c6851b1a133b3a83f1eefbe3337cd67b9107ab6b5c2034b616d05c6d163ba767c1cce573eb81e3f6c03ae10007b3ae3fe94ced1dd9dd37115829530c5587daeb2029eb5303ec74f5e291965e6bf695f45b7c4241949db486feaecc9c4b32b4dbf511fb849495c018b94c201145d973b2c2a7017bc24c7882dadcd2c3f5f654568eb76948a2aebe5be62e1135bf3d303d4a119b7d096b76822dc246368b416ff1247348b8e8663c67b92b5161d52678fe448d1754f67fa88953e289050011ab4ec6b1cb0c638a9162a48afa5de49ff7004e9edc10aad47970e2d2ad22d8f3cfb54a4b48a7cf0b4f0fe099dec38a40f070b9d0ed95893e74ab0e740dcafb691a1830d4742c0f54d4f28e4d9af5e62d360ad824cbb9853d4462df56b61202042fb39d1d7e80ba28b0ca3292a46f65e25d9be1ecafae6884687d2127828a33e546a8cc21222116fc9c89312679c057e2c5d7579f4169c501da8077f1c86f053069d45c54f6d39d3ee4bc7b62a88e8e8e67524777c1a914a06afdbd09d5f2ca2624040f5d110134e2ba9816c42d363cc82874e0778afb4af790529efaf353947227ef677bc7cee89e2954a23419bda20a58baecadc7b5f8360a62cb5aa861b8caa799b55571b24da9da0cb6f2d3408daab9257ab8e1f5cf6e6c14a297a6f03535aebd93d1739b65290d13b1f7c958299a047220298e20c9fe20ad25f6421e047157dfc13f7e6354c43bf121cdfd0343773a2e24fd9eb8078749800274e72b4f34a5c2502c5fceefa2401d2964d37072a36ab1a54e51487428df273e58e0c45cd666b6f0f7bff09156caaacf9be16dfad827b5605d94af2c897cd621269ef2e366448b5d73b954a5ff84cc6f73d5fbecdcacfbdb08bf53f3d1f4fb8dd7cfbfc936f6281f2debac2bf8962b389f0adca678660e50fd7aebde6cf412c16ad182bd17b4499dccca8ee7beec72e434585f492966826caabd5b6b9d2527036fd164f056e54ecbe8325b4bb94fc4aeeb6bed3b2b7d6a41b7d034fec62bb4e888b5c936e20048dde40083a48eca5343b3cc662d6672f8cf2f4f7c07dcab3bd6f82e5599988c29e669e176860665d9d9775718447c709b6cd99375e3fd4e8ed4abd3fe14efc601e0f009024399eaee0afdd2ccca4734f3602d3c09a3691322f0d787ac644259b5fdedf62054c438bfc11c1c6a044d461f86de8d482e0501d81fdd66dcd715f05889d589a403007c0a23bb1c851f1a711db0292c3e91e96263232585d7001b904a195a897a7ca39c278e314734a227d1d714cedc53319475b852ba293dc1ec203230731e91e87bf626393b2a296582ef0be8de36908fc23f6463ada45e8fb3fdc2d6637d5b9a5059a089acfe5ff357a92dc58c9246fbb5b70cce84de3514602f8cc753b80516b85e427916bff2925f56e1bf67df4a7a34e1694d360760d85456da7496fd371b31314e6ff0b6d05ff15378d7ad1fdaad9168303382d810e3ec1625f1de8be11ebe090581a7eb60a8ce1441b9c1e5d971afad8c85b0ee08027904c8c4d3c9a232b17dc41aba2fb04768b57ade8b0ec01f74725db6033a20db5b2c085e0441e10c6af723a61de0a95411441555288d912c4d807f7f0be76cb9c4dcc24910f81ce1d1078cc8f796f87b6bcd36996aa2fda35ccbda7f6ef5a40a08ddc2ced3be6da9fb3f455433282415e9a18190c4224b1b6451174cd72d0e90a90e4d7ea233db90138faed739a9903b3caed9ca96b6702c8f4be678586cc895e97fc95bb039bd3e92e1efacd86084ae7a6e808a413e97710bcb20ac4b997d0946a8f4ae8af5c70967a6c59ea695518a3ed7c28432f269d4415834be4054a62745401f6009096a93fc55171c9f70143b605658dcc21289a84973f28d37702143a916f125ba4489673c02f04052161b6f7472d3f81350d07edeec54bd480fc949d3929be4c00294c6844e4bd40e1c7f9d4cf799e1f27a25de5bf9cbce791bf4981a1224055f2bd02a163c8b7d52d8b1b3eeb83cf086199b85f4f4f86450a3fa3bd520ca248f8bf6c2db1c8cf69bd9faf1512864a05c1ced72abd45e22ba10ff3906422a561969264b976e75d3695c4d2802c6bf76aae1c4c5f377b2d45d11a9accc86c83353103314c9b6da17bf8d0eef67c1949737036a52b34a33aad5162270cfad9ef3a9d327126831045cd774fefff85191d3e41b858948cb0a73420525048800ae25018e8db92de1e2e1bca048fed17305abf34f05204a09249bfbd484746bed1dab94c72942068bec094d290380998bd6590505bfbd49a5502748b2ef70c54fe76af54b6c02af2d5c4473196fbb9c4b6949039aaf252eb582cdad1eff6bb471e8776cd398e3e8607a73b9dac4c2ad5bcce6ea389c80d8a3c13c6b5ada2bb8b77c10b9284c4c03b90fb29300ea63f050fe56324faa6b3439d29031bcb5561d598668e23d29576ace7b7c026464107e1b9753e4ab9574cc17ee81bad5161204c510cf6ec7c396cc7f3fa96a558c1479021f32d651b38fe0a335480d649817cd29906855a4ad6691f99e67d3f92b0c11503d6316f4ee8b637f7edc89e505a70e46d03407c0ab9818f7a2431cd34061b361cb44dc72ba1c05135a3b4e8435317d9aceb6e5b08e97013ab5fcfc8083fee3ec785eea2b39340d273838a2ca3349298e39604fcc0e26630f43f6bc993d2d4888d31a5d5f1fad5ae4eb9c991940b4fbbbac72526e2eac7b46d2213dc25a60c10c4daa8af67be256daeeb1e4db1d6dd99f80862a74a0d982c9e4145387ca4f9e8caf90618aa72a39577657c25c4abef58c34bf58c7162fba7f0ee0acb05a014db63b78e2071b8451369df497f7fd7e23a321f77eb5d6acb0589440596c8905ca41b596e90a4cb78bc5e38f4d649062344427aebecd148fab6d9ad1210755ea3f31c9ec844317583bef1b5977d233324e3ca757cc3d4086fad953e739d60e076ecdbc7b16cb859e10cbccff54c6800de77b951f55108784d2df2b1ac95d739df3123105ba4f0242e134e58b131ef152ac81df2131123da16612830faca0ca2c9bba621e7bd45557f16d8286fce29ec52ef6add5a8ea194d8e3dc6a73ce117122701679fc2578f79b59fe1cdf6c136c54ddeb8e272b438826e43e33bdbe75cb7f9aff9868be931e97ed2f02cc742f88f9f85f7a5dccd8c5758959ce9713117e6095ed6385908ec45e43d4dbcfeac1c0e72362ea74c7bea04e4cca957cf5cbaabdaf0890c301b35ae507294ff9b349841bc47526ebf355650709a77779038c881b2339a59fe683948c97efdcb8ed65d7244c699ac29ad9b8127b66b1ebddbe3b24de68f8c0261b10d9de85a0ebd50e913cc7e9d2b42d962521e50753655e1dbfa0f07ae6b71099f67270728387e617440c6837a87aa67b6943b809bb8853e2b03a3e9e5f615209da121e4ef0df5b248d8726bef69de276d6e4f93b19e5a3c435227f93b8a4763071e61e978142c721395acf6b74c5051ef90b46b9cdd4e7ac019b1c53da30eabe945a9a67b85050e308546321048529a0f95f9c2c9adc6046f401872a05404fb7ae73b43323503b2e613a2b6d128a788b4688bb75f8a7e580cdd1bc0e1b99ec85d41dfd27d8e32edc9944a5b76b480d1f4b8773486e886658436ce6cd7b3f8666090a7e7f23ad4dbf6bd0de7f2f3211597f4c8d75eaa7ce8d8ab297f3f7cb34532ecb8c5ab0316bb5a07566fde0e42d80e61653129b47a4655b355821586358f90ed1702dfc39be6430f3e37b66c3885984bd4c1d94940d34bb471906fffcac1c0f18356da138bb9707a3f4a41b13456a6977a74cc28e404b9b6a62fe6053564c67d3a1b930565da492bcdbc19909acee7d9fe8c0341719f0f06a7defc729c5393d0c599f6affc3fcc6d9b91e76fb54c4d4f582db52826cf3acc40a8508c1da8f101037b48c58f64ca9e36c547483f1d49092401ea6f161bc40e140a56938036016a076d84564cb51e5abcd3a2536dd64bcb84c30d59758ea5c24444e1029db2bb728b68614d2a7ef523bbc512b48185bdb82643d0636becc2001ce31f4cfc0d5a7c3115945d5699f64ae158278cf89d4a16b8611c7a5fd06635f7df7b0e2978875ed3fa30c5e9138812faa7f0d4bc8cdf01878f7970fb6367f543d990b5d472cd61cad18d67209e468f7a0b3c99ac6643e8a7ef7597ef6f6cbe61cfd74313e5634380d5838a78cd178635435a29de97b6e4cdb052e8e640d459327c288a993a360fe126c481a3e5e0d6892266"}, {0x90, 0x190, 0x3, "88fc8f52ed6e34473aaada6ea8ad3730112fb38b174094b41aa202d3b6f19771508fac463caaf29d1616e22ab07104cc57a7e470c6b5d5a44bd3d00dcfd020fa76b0ff561cf57100481368a614ecf5548c349cad47b435541528519abe0d965b1a17affb6cf9fc5878d41551ff64b7ed0cc6d5b075e633909f12b66377120bc2"}, {0x60, 0x88, 0x0, "682965b1906e93fcdf1e30ff925ae2b62b6e49577ed25be93b1d1c87e879c94e4cf22175dc36cdb1ca6c669539297c0a4ff9496f0fb988efdede52fbad52f28b534976c22e3fdd191c2147c875a989"}], 0x1260}, 0x2000a004) 06:22:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x4, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) 06:22:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:40 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000340)=r3, 0xffffffffffffff82) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffff7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:40 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xfffffffffffffcb8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x20004, 0x5}, &(0x7f0000000380)=0x100000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r0, 0x0, 0x8, &(0x7f0000000000)='wlan1!^\x00', r3}, 0x30) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000080)=0x80000001) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:40 executing program 4 (fault-call:9 fault-nth:0): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:40 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) 06:22:40 executing program 2 (fault-call:8 fault-nth:0): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:40 executing program 0 (fault-call:9 fault-nth:0): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 705.559420][T12501] FAULT_INJECTION: forcing a failure. [ 705.559420][T12501] name failslab, interval 1, probability 0, space 0, times 0 06:22:41 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r2, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x2c, 0x36, 0x0, 0x6, 0x0, 0x11, 0x10, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x7f, 0x5}, 0x1000, 0xffffffffffffff00, 0x1, 0x7, 0x1, 0x40, 0x8}, r1, 0x8, r0, 0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x33d) [ 705.613792][T12501] CPU: 1 PID: 12501 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 705.622169][T12501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.632226][T12501] Call Trace: [ 705.635536][T12501] dump_stack+0x197/0x210 [ 705.639897][T12501] should_fail.cold+0xa/0x15 [ 705.644520][T12501] ? fault_create_debugfs_attr+0x180/0x180 [ 705.650350][T12501] ? ___might_sleep+0x163/0x2c0 [ 705.655217][T12501] __should_failslab+0x121/0x190 [ 705.660165][T12501] should_failslab+0x9/0x14 [ 705.664689][T12501] kmem_cache_alloc_trace+0x2d3/0x790 [ 705.670165][T12501] htab_map_alloc+0xe3/0x11c0 [ 705.674903][T12501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.681160][T12501] ? htab_map_update_elem+0xca0/0xca0 [ 705.686594][T12501] __do_sys_bpf+0x478/0x37b0 [ 705.691206][T12501] ? bpf_prog_load+0x18a0/0x18a0 [ 705.696159][T12501] ? __kasan_check_write+0x14/0x20 [ 705.701292][T12501] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 705.706853][T12501] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 705.712153][T12501] ? wait_for_completion+0x440/0x440 [ 705.717465][T12501] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 705.723780][T12501] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 705.729345][T12501] ? do_syscall_64+0x26/0x790 [ 705.734062][T12501] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.740146][T12501] ? do_syscall_64+0x26/0x790 [ 705.744848][T12501] __x64_sys_bpf+0x73/0xb0 [ 705.749282][T12501] do_syscall_64+0xfa/0x790 [ 705.753805][T12501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.759717][T12501] RIP: 0033:0x45a679 06:22:41 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) [ 705.761298][T12510] FAULT_INJECTION: forcing a failure. [ 705.761298][T12510] name failslab, interval 1, probability 0, space 0, times 0 [ 705.763618][T12501] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 705.763626][T12501] RSP: 002b:00007ff7cce8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 705.763645][T12501] RAX: ffffffffffffffda RBX: 00007ff7cce8ec90 RCX: 000000000045a679 [ 705.779159][T12509] FAULT_INJECTION: forcing a failure. [ 705.779159][T12509] name failslab, interval 1, probability 0, space 0, times 0 [ 705.795898][T12501] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 705.795907][T12501] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 705.795914][T12501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff7cce8f6d4 [ 705.795920][T12501] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000005 [ 705.808615][T12509] CPU: 0 PID: 12509 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 705.865250][T12509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.875400][T12509] Call Trace: [ 705.878704][T12509] dump_stack+0x197/0x210 [ 705.883101][T12509] should_fail.cold+0xa/0x15 [ 705.887724][T12509] ? fault_create_debugfs_attr+0x180/0x180 [ 705.893548][T12509] ? ___might_sleep+0x163/0x2c0 [ 705.898411][T12509] __should_failslab+0x121/0x190 [ 705.903361][T12509] should_failslab+0x9/0x14 [ 705.907877][T12509] kmem_cache_alloc_trace+0x2d3/0x790 [ 705.913268][T12509] htab_map_alloc+0xe3/0x11c0 [ 705.917974][T12509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.924232][T12509] ? htab_map_update_elem+0xca0/0xca0 [ 705.929620][T12509] __do_sys_bpf+0x478/0x37b0 [ 705.934222][T12509] ? bpf_prog_load+0x18a0/0x18a0 [ 705.939151][T12509] ? __kasan_check_write+0x14/0x20 [ 705.939167][T12509] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 705.939181][T12509] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 705.939196][T12509] ? wait_for_completion+0x440/0x440 [ 705.939218][T12509] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 705.939242][T12509] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 705.939261][T12509] ? do_syscall_64+0x26/0x790 [ 705.976793][T12509] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.982894][T12509] ? do_syscall_64+0x26/0x790 [ 705.987577][T12509] __x64_sys_bpf+0x73/0xb0 [ 705.992011][T12509] do_syscall_64+0xfa/0x790 [ 705.996529][T12509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.996541][T12509] RIP: 0033:0x45a679 [ 705.996559][T12509] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.025912][T12509] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 706.034336][T12509] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 706.042319][T12509] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 706.050312][T12509] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 06:22:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000580)=ANY=[@ANYRESDEC=r6, @ANYRESOCT=0x0, @ANYRESDEC, @ANYBLOB="484ca07a00a3e2c31b0a6a08ccc24455df11a5de12367ff1bf938c6d140ae000bd412ac690aff9773b2746c2d5fe8afeae0e6d872e49dc04b55f2fc0244bff02c65f3dc00cdf5cfdcc4cc7658993718f7dccbfc95fff839d71944f4986f61e84bae11a58561a8d48311cd9f8c4c5f88697945fcb71797dd72ff29c346518f16e8d79810a7f5f2a13b58e40423abdc1a90382545cfedd27ca0e01ed13e74da41be1bed84257e1c1e94df0f44ca317a2e0d802e1cc05690dd61cce888482e89c877ba26e66d1bd0132ffd24ae253fb70ed28534d1cb33f1f51a3e1c90ea2dc4486e2e92149f3e380e7ba", @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYPTR64, @ANYRES64=0x0], 0x162) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r8 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x5, 0x4}, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc, 0x81, 0x9}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xffffffff00000001}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r6, 0x10, &(0x7f0000000480)={&(0x7f0000000180)=""/12, 0xc, r9}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r9, 0x4) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r11, &(0x7f0000000580)=ANY=[@ANYRESDEC=r12, @ANYRESOCT=0x0, @ANYRESDEC, @ANYBLOB="484ca07a00a3e2c31b0a6a08ccc24455df11a5de12367ff1bf938c6d140ae000bd412ac690aff9773b2746c2d5fe8afeae0e6d872e49dc04b55f2fc0244bff02c65f3dc00cdf5cfdcc4cc7658993718f7dccbfc95fff839d71944f4986f61e84bae11a58561a8d48311cd9f8c4c5f88697945fcb71797dd72ff29c346518f16e8d79810a7f5f2a13b58e40423abdc1a90382545cfedd27ca0e01ed13e74da41be1bed84257e1c1e94df0f44ca317a2e0d802e1cc05690dd61cce888482e89c877ba26e66d1bd0132ffd24ae253fb70ed28534d1cb33f1f51a3e1c90ea2dc4486e2e92149f3e380e7ba7406b2", @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYPTR64, @ANYRES64=0x0], 0x165) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r14 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x3e, &(0x7f00000002c0)=r13, 0x161) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r13, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x5, 0x4}, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc, 0x81, 0x9}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xffffffff00000001}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r12, 0x10, &(0x7f0000000480)={&(0x7f0000000180)=""/12, 0xc, r15}}, 0x10) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x2}, @map={0x18, 0x6, 0x1, 0x0, r4}], &(0x7f0000000340)='syzkaller\x00', 0x1400, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x15, r10, 0x8, &(0x7f00000003c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x0, 0x9, 0x1}, 0x10, r15, r16}, 0x78) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r18 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r18, 0x1, 0x3e, &(0x7f00000002c0)=r17, 0x161) openat$cgroup_ro(r17, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffff8000}, [@generic={0x1f, 0x7, 0xd, 0x6, 0x7}, @map={0x18, 0x3, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x53}, @call={0x85, 0x0, 0x0, 0x65}]}, &(0x7f0000000080)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x0, 0xa, [], 0x0, 0xd, r2, 0x8, &(0x7f0000000100)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x7, 0x2, 0x7ff}, 0x10, r15, r17}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r19, 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:41 executing program 4 (fault-call:9 fault-nth:1): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 706.058296][T12509] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 706.066274][T12509] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 706.084649][T12510] CPU: 0 PID: 12510 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 706.093024][T12510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.103206][T12510] Call Trace: [ 706.106512][T12510] dump_stack+0x197/0x210 [ 706.110867][T12510] should_fail.cold+0xa/0x15 [ 706.115478][T12510] ? fault_create_debugfs_attr+0x180/0x180 [ 706.121298][T12510] ? ___might_sleep+0x163/0x2c0 [ 706.126178][T12510] __should_failslab+0x121/0x190 [ 706.131133][T12510] should_failslab+0x9/0x14 [ 706.135675][T12510] kmem_cache_alloc_trace+0x2d3/0x790 [ 706.141077][T12510] htab_map_alloc+0xe3/0x11c0 [ 706.145783][T12510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.152029][T12510] ? htab_map_update_elem+0xca0/0xca0 [ 706.152045][T12510] __do_sys_bpf+0x478/0x37b0 [ 706.152062][T12510] ? bpf_prog_load+0x18a0/0x18a0 [ 706.152076][T12510] ? __kasan_check_write+0x14/0x20 [ 706.152090][T12510] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 706.152104][T12510] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 706.152119][T12510] ? wait_for_completion+0x440/0x440 [ 706.152140][T12510] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 706.188202][T12510] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 706.188222][T12510] ? do_syscall_64+0x26/0x790 [ 706.204594][T12510] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.206584][T12527] FAULT_INJECTION: forcing a failure. [ 706.206584][T12527] name failslab, interval 1, probability 0, space 0, times 0 [ 706.210688][T12510] ? do_syscall_64+0x26/0x790 [ 706.210708][T12510] __x64_sys_bpf+0x73/0xb0 [ 706.210723][T12510] do_syscall_64+0xfa/0x790 [ 706.210743][T12510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.210754][T12510] RIP: 0033:0x45a679 [ 706.210773][T12510] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.266248][T12510] RSP: 002b:00007f7f4bad8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 706.266261][T12510] RAX: ffffffffffffffda RBX: 00007f7f4bad8c90 RCX: 000000000045a679 [ 706.266268][T12510] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 706.266276][T12510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 706.266283][T12510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4bad96d4 [ 706.266289][T12510] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 706.323591][T12527] CPU: 1 PID: 12527 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 706.331988][T12527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.342056][T12527] Call Trace: [ 706.345363][T12527] dump_stack+0x197/0x210 [ 706.349744][T12527] should_fail.cold+0xa/0x15 [ 706.354361][T12527] ? fault_create_debugfs_attr+0x180/0x180 [ 706.360192][T12527] ? ___might_sleep+0x163/0x2c0 [ 706.365062][T12527] __should_failslab+0x121/0x190 [ 706.370017][T12527] should_failslab+0x9/0x14 [ 706.374534][T12527] kmem_cache_alloc_node_trace+0x274/0x750 [ 706.380355][T12527] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 706.385922][T12527] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 706.391920][T12527] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 706.397737][T12527] __kmalloc_node+0x3d/0x70 [ 706.402229][T12527] __bpf_map_area_alloc+0xbd/0xf0 [ 706.407238][T12527] bpf_map_area_alloc+0x20/0x30 [ 706.412073][T12527] htab_map_alloc+0x589/0x11c0 [ 706.416824][T12527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.423046][T12527] ? htab_map_update_elem+0xca0/0xca0 [ 706.428406][T12527] __do_sys_bpf+0x478/0x37b0 [ 706.433004][T12527] ? bpf_prog_load+0x18a0/0x18a0 [ 706.437945][T12527] ? __kasan_check_write+0x14/0x20 [ 706.443184][T12527] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 706.448719][T12527] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 706.454013][T12527] ? wait_for_completion+0x440/0x440 [ 706.459301][T12527] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 706.459327][T12527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 706.459341][T12527] ? do_syscall_64+0x26/0x790 [ 706.459355][T12527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.459372][T12527] ? do_syscall_64+0x26/0x790 [ 706.475709][T12527] __x64_sys_bpf+0x73/0xb0 [ 706.490852][T12527] do_syscall_64+0xfa/0x790 [ 706.495366][T12527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.495381][T12527] RIP: 0033:0x45a679 [ 706.505154][T12527] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.524767][T12527] RSP: 002b:00007ff7cce6dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 706.533192][T12527] RAX: ffffffffffffffda RBX: 00007ff7cce6dc90 RCX: 000000000045a679 [ 706.541179][T12527] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 706.549167][T12527] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 706.557157][T12527] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff7cce6e6d4 [ 706.565141][T12527] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000005 06:22:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000440)='cgroup.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000480)={0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000009c0)={&(0x7f00000004c0)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @multicast1}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000540)="99ab", 0x2}, {&(0x7f0000000580)="aada15c839d2125c8d452d54ce1ba78df884f47bdc4563ce4f003925853ed3dc5743b09db4a62e89b60fc92fb29768eef22cc52cc2622d30bbc048bd939e42a3ce1b0cc03bc663f81bd42db41f69ccc51d887de5adc6f40a5d4c202025a652375706b64fccb3cc54e3cc3ade178cd6f76d589a8ba1eb8add5664d757f6c39403d04d7b7cec2f149a2efec6746c349d5a9e4c036d884fb45c51d28a021c47a2a57434f77b30e5c5", 0xa7}, {&(0x7f0000000640)="a977ebd24d4bd8c237cceb7d1cd16f3d6f3983fc0b4c09410cad2cdded737600e2675fadbdf5", 0x26}, {&(0x7f0000000680)="2ca50a69c4c8c85a51e3275ce61410ce628ae669f0fc61b1992ac5d5d6e843a02a83a8cac199e80c4119ccf343457c65c4c8f8965e1181fa5613327ef1582289257e4dd4bc592b147cff544c13f1924ebeec", 0x52}, {&(0x7f0000000700)="4856dd11ce63511db031491068c891fb34152d9ae84cee27c569cabc4479b60de80c702f4724ddc4d624c418291099298233330284d2a4cada3d1eaa", 0x3c}, {&(0x7f0000000740)="080350d7af94d9361ec6823b9dc7efc3e905477685ba0259d1d41972f12a99b785a2044b18195ce90cc6b943cf7c22d18c995c440aaa26a1e8e952902fecb3855193825b015809372d3fb897cf0a8caf49b381f699301e445390343cc49b8c0a19f9711e42e396f9b362bd9deab0733aa6fb537d5d66d3453f19aa3436b0cccba2de967dc1d133d7b3c443ec12fb19c001d89c2dd06755f00c67b6f803558936a96a66de8912f751564d5aadb8dd2d7d79dcc1ebe2aee726ac54f08af035dc70", 0xc0}, {&(0x7f0000000800)="2b8eacf64bec17742aeecf95fbe37412c459d14550cff095ce48ffce7072ff1b66fc9be6125b4cd5171fbf0f736205eaa51c9f2dcb879febecfdeb3c6d266faf88011d2b609d4eceb8fbf0b69e0f093d765dee67b58d627720f044f57979f8cf77281d22f14cfe9945345458ca7346ebc1deb65cffb827d37a7e95df1bec60c710647477ecbf7067373ef5e1bee29eb3a380a8aa408e33f5086483d7e19216ed600e260616b1ac2abfddaf266a617dd1c914067899ca01dd398a19c50d68a5c2c7ea92032de38b1d18bd8565281c7468", 0xd0}], 0x7, &(0x7f0000000980)=ANY=[@ANYBLOB="38000000000000001601000000000001821418a2b4a0c8ce9e83e380b24d077a00294a8f6bdd2d00"], 0x38}, 0x40000000) recvmsg(r4, &(0x7f00000003c0)={&(0x7f0000000040)=@pppol2tp, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/61, 0x3d}, {&(0x7f0000000300)=""/158, 0x9e}], 0x2, &(0x7f0000000280)=""/53, 0x35}, 0x8020) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1f) 06:22:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0x4, [@volatile={0x7, 0x0, 0x0, 0x9, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0xf7}}, @struct={0x1, 0x8, 0x0, 0x4, 0x1, 0xffffff7f, [{0x9, 0x2, 0x8001}, {0xb, 0x3, 0xbf1d}, {0x10, 0x5, 0x4}, {0x4, 0x2, 0x78}, {0x10, 0x4, 0x35}, {0x9, 0x4, 0x10000}, {0x1, 0x3, 0x401}, {0x3, 0x1, 0x10001}]}, @union={0x7, 0x2, 0x0, 0x5, 0x0, 0x40, [{0x6, 0x4, 0x9}, {0xa, 0x3, 0x5}]}, @volatile={0xb, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/255, 0xdc, 0xff, 0x1}, 0x20) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x8, 0xfc, 0x2, 0x64, 0x0, 0x0, 0x9875248b5d8ed7cf, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x4, 0x300000000000000}, 0x2a0, 0x9, 0x0, 0x3, 0x4, 0x2}, r1, 0xb, r0, 0x0) getpid() socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:48 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, 0x0, 0x0) 06:22:48 executing program 2 (fault-call:8 fault-nth:1): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:48 executing program 4 (fault-call:9 fault-nth:2): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:48 executing program 0 (fault-call:9 fault-nth:1): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:48 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 712.763268][T12551] FAULT_INJECTION: forcing a failure. [ 712.763268][T12551] name failslab, interval 1, probability 0, space 0, times 0 [ 712.780971][T12545] FAULT_INJECTION: forcing a failure. [ 712.780971][T12545] name failslab, interval 1, probability 0, space 0, times 0 [ 712.804520][T12545] CPU: 1 PID: 12545 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 06:22:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 712.812894][T12545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.822967][T12545] Call Trace: [ 712.826286][T12545] dump_stack+0x197/0x210 [ 712.830647][T12545] should_fail.cold+0xa/0x15 [ 712.835258][T12545] ? fault_create_debugfs_attr+0x180/0x180 [ 712.841090][T12545] ? ___might_sleep+0x163/0x2c0 [ 712.845965][T12545] __should_failslab+0x121/0x190 [ 712.850934][T12545] should_failslab+0x9/0x14 [ 712.855460][T12545] kmem_cache_alloc_node_trace+0x274/0x750 [ 712.861303][T12545] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 712.866869][T12545] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 712.872861][T12545] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 712.878693][T12545] __kmalloc_node+0x3d/0x70 [ 712.883219][T12545] __bpf_map_area_alloc+0xbd/0xf0 [ 712.888269][T12545] bpf_map_area_alloc+0x20/0x30 [ 712.893139][T12545] htab_map_alloc+0x589/0x11c0 [ 712.897942][T12545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.904222][T12545] ? htab_map_update_elem+0xca0/0xca0 [ 712.909612][T12545] __do_sys_bpf+0x478/0x37b0 06:22:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8}, 0x10, 0x0, 0x33, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x1, 0x70, 0xab, 0x0, 0x40, 0x2, 0x0, 0x0, 0x40000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0xc, @perf_bp={&(0x7f0000000000), 0x2}, 0x14190, 0x6, 0x1, 0x0, 0x9, 0x8001, 0x8}) [ 712.914211][T12545] ? bpf_prog_load+0x18a0/0x18a0 [ 712.919176][T12545] ? __kasan_check_write+0x14/0x20 [ 712.924303][T12545] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 712.929867][T12545] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 712.935175][T12545] ? wait_for_completion+0x440/0x440 [ 712.940611][T12545] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 712.940637][T12545] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 712.940651][T12545] ? do_syscall_64+0x26/0x790 [ 712.940666][T12545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.940678][T12545] ? do_syscall_64+0x26/0x790 [ 712.940695][T12545] __x64_sys_bpf+0x73/0xb0 [ 712.940710][T12545] do_syscall_64+0xfa/0x790 [ 712.940730][T12545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.957074][T12545] RIP: 0033:0x45a679 [ 712.986471][T12545] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 713.006084][T12545] RSP: 002b:00007f7f4bad8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 713.014506][T12545] RAX: ffffffffffffffda RBX: 00007f7f4bad8c90 RCX: 000000000045a679 [ 713.014516][T12545] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 713.014525][T12545] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 713.014534][T12545] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4bad96d4 [ 713.014542][T12545] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 713.057777][T12551] CPU: 0 PID: 12551 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 713.066139][T12551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.076202][T12551] Call Trace: [ 713.079507][T12551] dump_stack+0x197/0x210 [ 713.083860][T12551] should_fail.cold+0xa/0x15 [ 713.088463][T12551] ? fault_create_debugfs_attr+0x180/0x180 [ 713.094280][T12551] ? ___might_sleep+0x163/0x2c0 [ 713.099143][T12551] __should_failslab+0x121/0x190 [ 713.104094][T12551] should_failslab+0x9/0x14 [ 713.108605][T12551] kmem_cache_alloc_node_trace+0x274/0x750 06:22:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r8 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) openat$cgroup_ro(r7, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r7, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000100)=0x7, 0x12) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0), 0xfffffffffffffd58) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r10 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r10, 0x1, 0x3e, &(0x7f00000002c0)=r9, 0x161) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r12 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f00000002c0)=r11, 0x161) openat$cgroup_ro(r11, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r13 = openat$cgroup_ro(r11, &(0x7f0000000440)='9\x92Q\xc9&E\xea\x1b\x00E\xce\x94\xe5\xfc\xee\xc4-\xd3\\\xa6.L\x9e\xe5\x00N\x9b\xdc\x8fA\xda\xca\x049\xd6\xc2\xc18S\xaa\xd0wGH\x9b\xa6f\xf5b\x14\xe6\x04\t\xbd\xda9\x05~\a\xef){\xd6\xab\xf8^\x9d\xa8\x92%!\xb7s\x11\xc8\xb0\xedcI\xde\xad\xa4\xc3\xc3\xa0%\xe3x\x10\xa4\xfc~\x98\xef\xdbY\xb6\xfb\b\xca^\xc1\x94\xbcDI\x80j#=S\x15\xf6\xa6\x95St\xcd\x04\x96\xa0\x94#\a\x18\x85\x80\xfc\xd1:\xd4p:s\xb6\xc1\xe5\x90 \xecU\x1dc3o4}\xfe\"\b\nM\xec6O6\xd3\xc3*f\xff\xaf\\\xc3\xda\xaa\v\xd4\xbd,\xd1\xb1\x93\xe8\x95M\x83u\x1d\xa8\x8d\x99\x9c\xfdrv\xcf\xcd\\H\xebmI\xcds\xf5%C\xfe\xc2{\xef\x95\x86%BJ', 0x26e1, 0x0) r14 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x3e, &(0x7f00000002c0)=r13, 0x161) openat$cgroup_ro(r13, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=""/191, 0x26, 0xbf, 0x8}, 0x20) openat$cgroup_ro(r13, &(0x7f0000000340)='cpuset.%ffedtive_mems\x00', 0x0, 0x0) openat$cgroup_ro(r9, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r16 = openat$cgroup_ro(r15, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r15, &(0x7f0000000080)='cpuses\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r17 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', 0x0, 0x30}, 0x10) setsockopt$sock_attach_bpf(r16, 0x1, 0x3e, &(0x7f00000002c0)=r17, 0xfffffdf9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) [ 713.114415][T12551] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 713.119971][T12551] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 713.125964][T12551] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 713.131784][T12551] __kmalloc_node+0x3d/0x70 [ 713.136314][T12551] __bpf_map_area_alloc+0xbd/0xf0 [ 713.137537][T12571] BPF:btf_header not found [ 713.141345][T12551] bpf_map_area_alloc+0x20/0x30 [ 713.141362][T12551] htab_map_alloc+0x589/0x11c0 [ 713.141385][T12551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 06:22:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 713.141405][T12551] ? htab_map_update_elem+0xca0/0xca0 [ 713.153318][T12571] BPF:btf_header not found [ 713.155403][T12551] __do_sys_bpf+0x478/0x37b0 [ 713.155425][T12551] ? bpf_prog_load+0x18a0/0x18a0 [ 713.181063][T12551] ? __kasan_check_write+0x14/0x20 [ 713.186184][T12551] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 713.191775][T12551] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 713.197081][T12551] ? wait_for_completion+0x440/0x440 [ 713.202391][T12551] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 713.208661][T12551] ? trace_hardirqs_on_thunk+0x1a/0x1c 06:22:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x54c40b47}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 713.214139][T12551] ? do_syscall_64+0x26/0x790 [ 713.218824][T12551] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.224899][T12551] ? do_syscall_64+0x26/0x790 [ 713.229599][T12551] __x64_sys_bpf+0x73/0xb0 [ 713.234031][T12551] do_syscall_64+0xfa/0x790 [ 713.238551][T12551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.244448][T12551] RIP: 0033:0x45a679 [ 713.248353][T12551] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 713.267966][T12551] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 713.276399][T12551] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 713.276409][T12551] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 713.276417][T12551] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 713.276425][T12551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 713.276434][T12551] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:22:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x70, 0x2, 0x3, 0xc8, 0x9, 0x0, 0x1, 0x40, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x5, @perf_config_ext={0x2, 0xc46}, 0x8000, 0x1000, 0x4, 0x2, 0x7, 0x3, 0xfff}, r0, 0x3, r2, 0x8) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$kcm(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)="d71babccc289d6aa7f7237afcfeb04ca9d098b5b68c49ae98b84848d", 0x1c}, {&(0x7f0000000200)="3208622deddb6f09f5ec016dd1abfcd52a7edad476984ded181515f08ffc3941248dec067e27514b1f7314fd65bddb09e01afddedf199cf735d490e43fc32e758b32ee04188a80c2205a091bf75b65e484e88d5ede604a977086919a64fe9d7cb8d33cc86501614090590d0050009b4a27fc5175332464d057f6afbcf8dc1325a2dac8cfdf327d9678b85bf44762faba8b1d5ea6db802e2ed99d674fd859dadcb92a321081fba7ea793f374bf0", 0xad}, {&(0x7f0000000040)="0bdb642d4abd8c7c2637e0823280239cda6021ab6fecfa900afcc05e7dab01f990d07c64c6b5cc49b1e98d8f3dc65141f029918036960b5081fa41d1df6cb7d464c187de5028124537cd2d9dc9b8baa31e4ae75d04abd1cf2a6ea4e3c94daa22df29e2", 0x63}, {&(0x7f0000000100)="e21f879d6878f20add1b405b936eb49de4cedbaa67d79bb52ccff49e3ec449d98cbfabb3673fbd90766d3055bdd18bce96acc4ec20ae6f4f9e0385c8e5ee631454d1322be62b9529889f1472", 0x4c}, {&(0x7f00000002c0)="74d3ff3d6fd931192cf7a02e5e2d2038cc470def2f76238225fa118a0527e36e22d8538757556b8ff7c22c50ee840fae41336f73d907d8431ebb68a32dd3eb5e9abd9cc2369776cd47f48d6d2d239b9ba50523a43ee11cd962e4883fe9e33f443cdc881bfe93e0d0a36f063b236408f6054c1475bc6e696a8beb51449e1839582c2191ac13192097", 0x88}, {&(0x7f0000000380)="83a8e5ae15cfd353fdf6c806a95c88c9ccbd0f8e588d087b2fcb656e9b466d00450b5d897d701115ce15e1ae9b58e34bc2df8a2c1340ac374f9ab13ffbad880c722214a205c5bb5769e053d0d9535f49a7104a0b86d3b0373f1dea160fa995400b3ae1193a4f6980374970ae7b9bfdd10be7f6d3cad21e49be3398b7d691ffb21eee476c19d661ec15535f692d536d1b2e1b64ab", 0x94}, {&(0x7f0000000440)="6681042ddce05e2edb2c87e406fd0a1a0d28183c952ebd6d", 0x18}, {&(0x7f0000000480)="f29c992f0454c97df5fe34a8023f50318bb24ca9322d2253d0fb756ac4ad61aaf6889dfde5967cb23f321c75ac0b84905e1763a80c337fcaba8cbce3c912e0", 0x3f}, {&(0x7f00000004c0)="3b749bc4cdd1b1b6cc6446766ea244f4ba865bfb2e1363f179726871bfb5b967a9bdb94d933441b9a652bf94a531ea5a4ce4092fb30f4d97eebfe2486167b6cc7678001b", 0x44}], 0x9, &(0x7f0000000600)=[{0xf8, 0x0, 0x2, "df895e20dd2aef054dee783604a24b3810163d52abb2323d9128c40b2eef9b339918e8046cbbb4ceca4cb38af298e6c40b1e93eedc2c39fb26bddcfaeee9e21fadf2a5e726ac8bc2b3ad3f0eb15cfb09fda43c967c2afb1e5a2262b96ddfad85d449c419e844ea6d56cb5f31ea596fd593b6def948c7abe4ccc0f216442e56b1ee00367fb0a88b27bc4816b146b1142620a9709dfc84ea286c0bf30b8ecb2e55e40ad5c5f3d5c25717873710ab74cc3a3bfb948bd43649847f101a006412a1856fe30f9dd4a9f4d487cceaa4428ea38e78221d31c68930396effd69fe251540cafe0"}, {0x90, 0x105, 0x8, "89712e96286d242d46ef1e3b5ec51e6bc670add1c28c76d880f7deea45ef961334799b7d047135723afdc17bbde172211bb2b81a0b6413331bb25b8ec65af5811abc47283c1447b36ada57fb3ccb92bfe87c1657d621eca9d08bc892df7280bb851bfd22cce441409965a8384ac02062235362c1c5550e1dea4d044f7da4"}], 0x188}, 0x80) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:22:57 executing program 2 (fault-call:8 fault-nth:2): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:57 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:57 executing program 0 (fault-call:9 fault-nth:2): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:57 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:22:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000300)="bb12197db47cfbf69482977f8d9491e7bfbcf814af27d0d986ad565c8aa3a7972026f1083790a3a4ae06807f29f12bad59a9df84a62f7a09c85f46dfcc4445fc548e5dfe553fffdc689c133633a19b5f1a928e1091ab780c290871c1d536a37d1cb21e592f74c7476c500928255f4bd5cff7665446a80e82d1be77d03f9c04a67d", 0x81}, {&(0x7f00000003c0)="72aa900f8a4aa39e0519dce974dd32aa113cebc7a4407b3b2e19b05079ba4664e0da41eecc4e4e06f269d800b77428bc3cf84c3ad45e6f7bd569be517e72cf083397816e0bf98aadf0", 0x49}, {&(0x7f0000000440)="3063dbb320c8f8e2b540e1ceec5dcb9f2e6dfb4a5c9706dec2b70f6c86ce222f6236daf88f33876e0d200a8e1efda80de3f46a25c0acaa527ff0ee9e33e7fd9ecad227e11289e5de2551f46d99bebc1e485db91cdcb1903f2b87382ed2175f6b6a1be8afe18d42dd6ecfc760", 0x6c}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000280)="049159c8673601a3c23b8d73d20b9570b4", 0x11}, {&(0x7f00000014c0)="5332f1", 0x3}, {&(0x7f0000001500)="7974c68008d7ff80f30b4139773531d505ab8e728d2572f034cfec409eda65719abfedfd686a3a4113693379c78eda00bc7980fb552f2ebce2179a7376d86ff98e997fca6db6367c921c0fdeeb80f4625a8137a8c73f613eb9dd9b984bf0387a753995129fb0cf22e5116242fe7e93a2966c4f48dbdb1340955f66c404c7f23166e7e09cadd5e1dbea9dea", 0x8b}, {&(0x7f00000015c0)="4848e6c620c1056d09717f96693056905777eb", 0x13}], 0x8, &(0x7f0000001680)=[{0x48, 0xe5e4027ed27d0bed, 0x5, "98b9b0ca6fa75e32623c3d3aa2df65bbb4d6e0f47c8306257d29a4c2bf1199de7575347f0428158aaf26521e93aa60c0d3"}, {0x40, 0xff, 0x9, "3192ae7e60201a38d6082aa484ccd331df315168666181d5bb282b57d4c02fd43dbc3d7a37114cbf6eb7"}, {0x80, 0xd8c03c988baaffa0, 0x5, "77267868da371c01d22010adf9f307066c16d4c6b899757ba57afcee076aab3fdcd41d7fcf56fbc64cb02eb1865d91b149a872e812484fd5507e27280d3aab407513758cfb15cd5841b5d1b8cb001c7b199e7ae6a3d7a04beb22b444f041bb72f72c437173cf1ca975e7"}, {0x10, 0x10f, 0x10001}, {0x1010, 0xe8b05951c1e5712c, 0x9, "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"}, {0x38, 0x116, 0xff, "44fe7b96c52b336433132d874ba811963a07cc4cb1165cd050331d1ea84396d63dd2fa016c81"}], 0x1160}, 0x2000080) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x70, 0xfe, 0xf7, 0x7, 0xfc, 0x0, 0x1, 0x80800, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x8, @perf_config_ext={0x1, 0x1}, 0x1214c, 0x74e, 0x4, 0x2, 0xce, 0x0, 0x6}, r1, 0xa, r2, 0xc) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) mkdirat$cgroup(r4, &(0x7f0000000100)='syz1\x00', 0x1ff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000002840)='cpuset.effective_cpus\x00', 0x0, 0x0) [ 722.030411][T12601] FAULT_INJECTION: forcing a failure. [ 722.030411][T12601] name failslab, interval 1, probability 0, space 0, times 0 [ 722.047910][T12602] FAULT_INJECTION: forcing a failure. [ 722.047910][T12602] name failslab, interval 1, probability 0, space 0, times 0 [ 722.076941][T12601] CPU: 1 PID: 12601 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 722.085321][T12601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.095418][T12601] Call Trace: [ 722.098729][T12601] dump_stack+0x197/0x210 [ 722.103073][T12601] should_fail.cold+0xa/0x15 [ 722.107687][T12601] ? fault_create_debugfs_attr+0x180/0x180 [ 722.113539][T12601] ? ___might_sleep+0x163/0x2c0 [ 722.118445][T12601] __should_failslab+0x121/0x190 [ 722.123391][T12601] should_failslab+0x9/0x14 [ 722.127902][T12601] kmem_cache_alloc_node_trace+0x274/0x750 [ 722.133701][T12601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.139935][T12601] ? debug_smp_processor_id+0x33/0x18a [ 722.145418][T12601] __get_vm_area_node+0x12b/0x4f0 [ 722.150526][T12601] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 722.156065][T12601] __vmalloc_node_range+0xd4/0x810 [ 722.161250][T12601] ? bpf_map_area_alloc+0x20/0x30 [ 722.166263][T12601] ? kasan_unpoison_shadow+0x35/0x50 [ 722.171541][T12601] ? bpf_map_area_alloc+0x20/0x30 [ 722.176918][T12601] __vmalloc_node_flags_caller+0x71/0x90 [ 722.182549][T12601] ? bpf_map_area_alloc+0x20/0x30 [ 722.187570][T12601] __bpf_map_area_alloc+0xde/0xf0 [ 722.192578][T12601] bpf_map_area_alloc+0x20/0x30 [ 722.197412][T12601] htab_map_alloc+0x8d3/0x11c0 [ 722.202180][T12601] ? htab_map_update_elem+0xca0/0xca0 [ 722.207558][T12601] __do_sys_bpf+0x478/0x37b0 [ 722.212160][T12601] ? bpf_prog_load+0x18a0/0x18a0 [ 722.217082][T12601] ? __kasan_check_write+0x14/0x20 [ 722.222178][T12601] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 722.227711][T12601] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 722.232981][T12601] ? wait_for_completion+0x440/0x440 [ 722.238258][T12601] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.244496][T12601] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 722.249941][T12601] ? do_syscall_64+0x26/0x790 [ 722.254604][T12601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.260656][T12601] ? do_syscall_64+0x26/0x790 [ 722.265352][T12601] __x64_sys_bpf+0x73/0xb0 [ 722.270650][T12601] do_syscall_64+0xfa/0x790 [ 722.275159][T12601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.281051][T12601] RIP: 0033:0x45a679 [ 722.284941][T12601] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 722.304558][T12601] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 722.312984][T12601] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 722.320940][T12601] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 722.328984][T12601] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 722.336970][T12601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 722.344930][T12601] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 722.352907][T12602] CPU: 0 PID: 12602 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 722.361234][T12602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.371279][T12602] Call Trace: [ 722.371300][T12602] dump_stack+0x197/0x210 [ 722.371322][T12602] should_fail.cold+0xa/0x15 [ 722.371344][T12602] ? fault_create_debugfs_attr+0x180/0x180 [ 722.371365][T12602] ? ___might_sleep+0x163/0x2c0 [ 722.394182][T12602] __should_failslab+0x121/0x190 [ 722.399137][T12602] should_failslab+0x9/0x14 [ 722.403657][T12602] kmem_cache_alloc_node_trace+0x274/0x750 [ 722.409476][T12602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.415732][T12602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.426055][T12602] ? debug_smp_processor_id+0x33/0x18a 06:22:57 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x96743aa8fe55e517}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r5}) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x9, 0x70, 0xe1, 0x9, 0x1, 0x4, 0x0, 0x800, 0x2, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x6, @perf_bp={&(0x7f0000000000), 0x8}, 0x20, 0xffffffffae039795, 0x1000000, 0x4, 0x5, 0x200, 0xff}, 0x0, 0xf, r1, 0x2) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000180)) 06:22:57 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x0, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 722.431532][T12602] __get_vm_area_node+0x12b/0x4f0 [ 722.436569][T12602] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 722.442131][T12602] __vmalloc_node_range+0xd4/0x810 [ 722.447254][T12602] ? bpf_map_area_alloc+0x20/0x30 [ 722.452468][T12602] ? kasan_unpoison_shadow+0x35/0x50 [ 722.457766][T12602] ? bpf_map_area_alloc+0x20/0x30 [ 722.462805][T12602] __vmalloc_node_flags_caller+0x71/0x90 [ 722.468567][T12602] ? bpf_map_area_alloc+0x20/0x30 [ 722.473598][T12602] __bpf_map_area_alloc+0xde/0xf0 [ 722.478614][T12602] bpf_map_area_alloc+0x20/0x30 [ 722.478627][T12602] htab_map_alloc+0x8d3/0x11c0 [ 722.478650][T12602] ? htab_map_update_elem+0xca0/0xca0 [ 722.478664][T12602] __do_sys_bpf+0x478/0x37b0 [ 722.478680][T12602] ? bpf_prog_load+0x18a0/0x18a0 [ 722.478695][T12602] ? __kasan_check_write+0x14/0x20 [ 722.478711][T12602] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 722.478724][T12602] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 722.478741][T12602] ? wait_for_completion+0x440/0x440 [ 722.524402][T12602] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 06:22:57 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 722.530671][T12602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 722.536148][T12602] ? do_syscall_64+0x26/0x790 [ 722.540884][T12602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.546969][T12602] ? do_syscall_64+0x26/0x790 [ 722.551663][T12602] __x64_sys_bpf+0x73/0xb0 [ 722.556107][T12602] do_syscall_64+0xfa/0x790 [ 722.560638][T12602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.566547][T12602] RIP: 0033:0x45a679 06:22:58 executing program 2 (fault-call:8 fault-nth:3): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 722.570449][T12602] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 722.590048][T12602] RSP: 002b:00007f7f4bad8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 722.590062][T12602] RAX: ffffffffffffffda RBX: 00007f7f4bad8c90 RCX: 000000000045a679 [ 722.590069][T12602] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 722.590076][T12602] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 722.590083][T12602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4bad96d4 06:22:58 executing program 0 (fault-call:9 fault-nth:3): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 722.590090][T12602] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:22:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) [ 722.697362][T12626] FAULT_INJECTION: forcing a failure. [ 722.697362][T12626] name failslab, interval 1, probability 0, space 0, times 0 [ 722.762522][T12626] CPU: 1 PID: 12626 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 722.770899][T12626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.780971][T12626] Call Trace: [ 722.784302][T12626] dump_stack+0x197/0x210 [ 722.788657][T12626] should_fail.cold+0xa/0x15 [ 722.793272][T12626] ? fault_create_debugfs_attr+0x180/0x180 [ 722.799125][T12626] ? ___might_sleep+0x163/0x2c0 [ 722.804002][T12626] __should_failslab+0x121/0x190 [ 722.808958][T12626] should_failslab+0x9/0x14 [ 722.813485][T12626] kmem_cache_alloc_node_trace+0x274/0x750 [ 722.819308][T12626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.825562][T12626] ? debug_smp_processor_id+0x33/0x18a [ 722.831044][T12626] __get_vm_area_node+0x12b/0x4f0 [ 722.836077][T12626] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 722.841645][T12626] __vmalloc_node_range+0xd4/0x810 [ 722.846772][T12626] ? bpf_map_area_alloc+0x20/0x30 [ 722.851823][T12626] ? kasan_unpoison_shadow+0x35/0x50 [ 722.857126][T12626] ? bpf_map_area_alloc+0x20/0x30 [ 722.862163][T12626] __vmalloc_node_flags_caller+0x71/0x90 [ 722.867840][T12626] ? bpf_map_area_alloc+0x20/0x30 [ 722.872884][T12626] __bpf_map_area_alloc+0xde/0xf0 [ 722.877936][T12626] bpf_map_area_alloc+0x20/0x30 [ 722.882810][T12626] htab_map_alloc+0x8d3/0x11c0 [ 722.887601][T12626] ? htab_map_update_elem+0xca0/0xca0 [ 722.892992][T12626] __do_sys_bpf+0x478/0x37b0 [ 722.897609][T12626] ? bpf_prog_load+0x18a0/0x18a0 [ 722.902561][T12626] ? __kasan_check_write+0x14/0x20 [ 722.907805][T12626] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 722.913366][T12626] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 722.918670][T12626] ? wait_for_completion+0x440/0x440 [ 722.924016][T12626] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.930283][T12626] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 722.935739][T12626] ? do_syscall_64+0x26/0x790 [ 722.940408][T12626] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.946457][T12626] ? do_syscall_64+0x26/0x790 [ 722.951139][T12626] __x64_sys_bpf+0x73/0xb0 [ 722.955560][T12626] do_syscall_64+0xfa/0x790 [ 722.959095][T12639] FAULT_INJECTION: forcing a failure. [ 722.959095][T12639] name failslab, interval 1, probability 0, space 0, times 0 [ 722.960077][T12626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.978522][T12626] RIP: 0033:0x45a679 [ 722.982407][T12626] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 723.002111][T12626] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 723.010512][T12626] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 723.018484][T12626] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 723.026452][T12626] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 723.034509][T12626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 723.042475][T12626] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 723.050457][T12639] CPU: 0 PID: 12639 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 723.058790][T12639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.068854][T12639] Call Trace: [ 723.072161][T12639] dump_stack+0x197/0x210 [ 723.076532][T12639] should_fail.cold+0xa/0x15 [ 723.081142][T12639] ? fault_create_debugfs_attr+0x180/0x180 [ 723.086967][T12639] ? ___might_sleep+0x163/0x2c0 [ 723.091964][T12639] __should_failslab+0x121/0x190 [ 723.096923][T12639] should_failslab+0x9/0x14 [ 723.101429][T12639] kmem_cache_alloc_node_trace+0x274/0x750 [ 723.101449][T12639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.101463][T12639] ? debug_smp_processor_id+0x33/0x18a [ 723.101482][T12639] __get_vm_area_node+0x12b/0x4f0 [ 723.101494][T12639] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 723.101510][T12639] __vmalloc_node_range+0xd4/0x810 [ 723.101523][T12639] ? bpf_map_area_alloc+0x20/0x30 [ 723.101540][T12639] ? kasan_unpoison_shadow+0x35/0x50 [ 723.101557][T12639] ? bpf_map_area_alloc+0x20/0x30 [ 723.101570][T12639] __vmalloc_node_flags_caller+0x71/0x90 [ 723.101588][T12639] ? bpf_map_area_alloc+0x20/0x30 [ 723.113668][T12639] __bpf_map_area_alloc+0xde/0xf0 [ 723.129736][T12639] bpf_map_area_alloc+0x20/0x30 [ 723.129752][T12639] htab_map_alloc+0x8d3/0x11c0 [ 723.129774][T12639] ? htab_map_update_elem+0xca0/0xca0 [ 723.129788][T12639] __do_sys_bpf+0x478/0x37b0 [ 723.129804][T12639] ? bpf_prog_load+0x18a0/0x18a0 [ 723.129817][T12639] ? __kasan_check_write+0x14/0x20 [ 723.129832][T12639] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 723.129847][T12639] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 723.129863][T12639] ? wait_for_completion+0x440/0x440 [ 723.129884][T12639] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.140010][T12639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 723.140025][T12639] ? do_syscall_64+0x26/0x790 [ 723.140042][T12639] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.140053][T12639] ? do_syscall_64+0x26/0x790 [ 723.140071][T12639] __x64_sys_bpf+0x73/0xb0 [ 723.140086][T12639] do_syscall_64+0xfa/0x790 [ 723.140105][T12639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.140115][T12639] RIP: 0033:0x45a679 [ 723.140131][T12639] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 723.140137][T12639] RSP: 002b:00007f7f4bad8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 723.140154][T12639] RAX: ffffffffffffffda RBX: 00007f7f4bad8c90 RCX: 000000000045a679 [ 723.294481][T12639] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 723.302443][T12639] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 723.310393][T12639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4bad96d4 [ 723.318396][T12639] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x2, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) socket$kcm(0x29, 0x6, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:23:05 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:05 executing program 3: 06:23:05 executing program 2 (fault-call:8 fault-nth:4): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:05 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000002, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:05 executing program 0 (fault-call:9 fault-nth:4): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:05 executing program 3: [ 730.449382][T12652] FAULT_INJECTION: forcing a failure. [ 730.449382][T12652] name failslab, interval 1, probability 0, space 0, times 0 [ 730.469368][T12655] FAULT_INJECTION: forcing a failure. [ 730.469368][T12655] name failslab, interval 1, probability 0, space 0, times 0 [ 730.499278][T12655] CPU: 1 PID: 12655 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 730.507655][T12655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.517718][T12655] Call Trace: [ 730.521024][T12655] dump_stack+0x197/0x210 [ 730.525375][T12655] should_fail.cold+0xa/0x15 [ 730.529980][T12655] ? htab_map_alloc+0x8d3/0x11c0 [ 730.534940][T12655] ? fault_create_debugfs_attr+0x180/0x180 [ 730.540765][T12655] ? ___might_sleep+0x163/0x2c0 [ 730.545670][T12655] __should_failslab+0x121/0x190 [ 730.550630][T12655] should_failslab+0x9/0x14 [ 730.555154][T12655] kmem_cache_alloc_node+0x268/0x740 [ 730.560449][T12655] ? ___might_sleep+0x163/0x2c0 [ 730.565330][T12655] alloc_vmap_area+0x147/0x2030 [ 730.570196][T12655] ? __get_vm_area_node+0x12b/0x4f0 [ 730.575409][T12655] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 730.580978][T12655] ? purge_vmap_area_lazy+0x40/0x40 [ 730.586183][T12655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.592426][T12655] ? debug_smp_processor_id+0x33/0x18a [ 730.597887][T12655] __get_vm_area_node+0x179/0x4f0 [ 730.602925][T12655] __vmalloc_node_range+0xd4/0x810 [ 730.608045][T12655] ? bpf_map_area_alloc+0x20/0x30 [ 730.613068][T12655] ? kasan_unpoison_shadow+0x35/0x50 [ 730.618349][T12655] ? bpf_map_area_alloc+0x20/0x30 [ 730.623373][T12655] __vmalloc_node_flags_caller+0x71/0x90 [ 730.629079][T12655] ? bpf_map_area_alloc+0x20/0x30 [ 730.634087][T12655] __bpf_map_area_alloc+0xde/0xf0 [ 730.639097][T12655] bpf_map_area_alloc+0x20/0x30 [ 730.643931][T12655] htab_map_alloc+0x8d3/0x11c0 [ 730.648692][T12655] ? htab_map_update_elem+0xca0/0xca0 [ 730.654048][T12655] __do_sys_bpf+0x478/0x37b0 [ 730.658628][T12655] ? bpf_prog_load+0x18a0/0x18a0 [ 730.663550][T12655] ? __kasan_check_write+0x14/0x20 [ 730.668652][T12655] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 730.674182][T12655] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 730.679481][T12655] ? wait_for_completion+0x440/0x440 [ 730.684760][T12655] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 730.691190][T12655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 730.696645][T12655] ? do_syscall_64+0x26/0x790 [ 730.701313][T12655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.707362][T12655] ? do_syscall_64+0x26/0x790 [ 730.712031][T12655] __x64_sys_bpf+0x73/0xb0 [ 730.716454][T12655] do_syscall_64+0xfa/0x790 [ 730.720954][T12655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.726839][T12655] RIP: 0033:0x45a679 [ 730.730739][T12655] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.750337][T12655] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 730.758739][T12655] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 730.766694][T12655] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 730.774665][T12655] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 730.782620][T12655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 730.790575][T12655] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 730.798595][T12652] CPU: 0 PID: 12652 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 730.806925][T12652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.816972][T12652] Call Trace: [ 730.816991][T12652] dump_stack+0x197/0x210 [ 730.817010][T12652] should_fail.cold+0xa/0x15 [ 730.817022][T12652] ? htab_map_alloc+0x8d3/0x11c0 [ 730.817038][T12652] ? fault_create_debugfs_attr+0x180/0x180 [ 730.817057][T12652] ? ___might_sleep+0x163/0x2c0 [ 730.844809][T12652] __should_failslab+0x121/0x190 06:23:06 executing program 3: 06:23:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x0, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 730.844827][T12652] should_failslab+0x9/0x14 [ 730.844849][T12652] kmem_cache_alloc_node+0x268/0x740 [ 730.859556][T12652] ? ___might_sleep+0x163/0x2c0 [ 730.859579][T12652] alloc_vmap_area+0x147/0x2030 [ 730.859593][T12652] ? __get_vm_area_node+0x12b/0x4f0 [ 730.859607][T12652] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 730.859629][T12652] ? purge_vmap_area_lazy+0x40/0x40 [ 730.859644][T12652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.859661][T12652] ? debug_smp_processor_id+0x33/0x18a 06:23:06 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000003, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 730.896946][T12652] __get_vm_area_node+0x179/0x4f0 [ 730.902000][T12652] __vmalloc_node_range+0xd4/0x810 [ 730.907290][T12652] ? bpf_map_area_alloc+0x20/0x30 [ 730.912336][T12652] ? kasan_unpoison_shadow+0x35/0x50 [ 730.917644][T12652] ? bpf_map_area_alloc+0x20/0x30 [ 730.922691][T12652] __vmalloc_node_flags_caller+0x71/0x90 [ 730.928341][T12652] ? bpf_map_area_alloc+0x20/0x30 [ 730.933387][T12652] __bpf_map_area_alloc+0xde/0xf0 [ 730.938421][T12652] bpf_map_area_alloc+0x20/0x30 [ 730.938438][T12652] htab_map_alloc+0x8d3/0x11c0 06:23:06 executing program 2 (fault-call:8 fault-nth:5): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 730.938461][T12652] ? htab_map_update_elem+0xca0/0xca0 [ 730.938476][T12652] __do_sys_bpf+0x478/0x37b0 [ 730.938492][T12652] ? bpf_prog_load+0x18a0/0x18a0 [ 730.938504][T12652] ? __kasan_check_write+0x14/0x20 [ 730.938524][T12652] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 730.948107][T12652] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 730.978861][T12652] ? wait_for_completion+0x440/0x440 [ 730.984170][T12652] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 730.990436][T12652] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 730.995907][T12652] ? do_syscall_64+0x26/0x790 [ 731.000598][T12652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.006677][T12652] ? do_syscall_64+0x26/0x790 [ 731.011359][T12652] __x64_sys_bpf+0x73/0xb0 [ 731.011376][T12652] do_syscall_64+0xfa/0x790 [ 731.011398][T12652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.011409][T12652] RIP: 0033:0x45a679 [ 731.011423][T12652] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:23:06 executing program 3: [ 731.011430][T12652] RSP: 002b:00007f7f4bad8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 731.011441][T12652] RAX: ffffffffffffffda RBX: 00007f7f4bad8c90 RCX: 000000000045a679 [ 731.011454][T12652] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 731.049704][T12652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 731.049714][T12652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4bad96d4 [ 731.049722][T12652] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 731.123136][T12684] FAULT_INJECTION: forcing a failure. [ 731.123136][T12684] name failslab, interval 1, probability 0, space 0, times 0 [ 731.188243][T12684] CPU: 0 PID: 12684 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 731.196630][T12684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.206700][T12684] Call Trace: [ 731.210010][T12684] dump_stack+0x197/0x210 [ 731.214374][T12684] should_fail.cold+0xa/0x15 [ 731.218993][T12684] ? fault_create_debugfs_attr+0x180/0x180 [ 731.224830][T12684] ? ___might_sleep+0x163/0x2c0 [ 731.229708][T12684] __should_failslab+0x121/0x190 [ 731.234670][T12684] should_failslab+0x9/0x14 [ 731.239204][T12684] kmem_cache_alloc_node_trace+0x274/0x750 [ 731.245101][T12684] ? do_raw_spin_unlock+0x178/0x270 [ 731.250334][T12684] __kmalloc_node+0x3d/0x70 [ 731.254862][T12684] __vmalloc_node_range+0x1db/0x810 [ 731.260093][T12684] ? bpf_map_area_alloc+0x20/0x30 [ 731.265144][T12684] __vmalloc_node_flags_caller+0x71/0x90 [ 731.270803][T12684] ? bpf_map_area_alloc+0x20/0x30 [ 731.275845][T12684] __bpf_map_area_alloc+0xde/0xf0 [ 731.280892][T12684] bpf_map_area_alloc+0x20/0x30 [ 731.285759][T12684] htab_map_alloc+0x8d3/0x11c0 [ 731.290551][T12684] ? htab_map_update_elem+0xca0/0xca0 [ 731.295944][T12684] __do_sys_bpf+0x478/0x37b0 [ 731.300560][T12684] ? bpf_prog_load+0x18a0/0x18a0 [ 731.305517][T12684] ? __kasan_check_write+0x14/0x20 [ 731.310647][T12684] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 731.316203][T12684] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 731.316227][T12684] ? wait_for_completion+0x440/0x440 [ 731.326777][T12684] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 731.326805][T12684] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 731.338464][T12684] ? do_syscall_64+0x26/0x790 [ 731.343147][T12684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.343162][T12684] ? do_syscall_64+0x26/0x790 [ 731.343182][T12684] __x64_sys_bpf+0x73/0xb0 [ 731.358313][T12684] do_syscall_64+0xfa/0x790 [ 731.362844][T12684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.368748][T12684] RIP: 0033:0x45a679 [ 731.368765][T12684] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.368774][T12684] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 731.368787][T12684] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 731.368795][T12684] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 731.368801][T12684] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 731.368808][T12684] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 731.368815][T12684] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/137, 0x89, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x2, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x0, 0x1, 0xa, 0x6, 0x100, 0x8}, @ldst={0x0, 0x2, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x8}], &(0x7f0000000040)='GPL\x00', 0x9, 0x41, &(0x7f0000000100)=""/65, 0x41100, 0xdedc10a5cf3dfbff, [], 0x0, 0x4, r0, 0x8, &(0x7f0000000080)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0xb, 0x1000, 0x1}, 0x10, r2, r3}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001600)={r5, 0x0, 0x1000, 0xfb, &(0x7f0000000400)="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", &(0x7f0000001400)=""/251, 0x6, 0x0, 0x22, 0x82, &(0x7f0000001500)="ff42ecd3641b43eca85451002a7045e5af52d2c34a698283c03af1ac5fed72e5d0a9", &(0x7f0000001540)="c6ae8103e7608a1173fb1d1a0a9f836624cfeda79e2082feb837f4981cabfc953c92c2bf88c35aa727cdff6e50c0f00af558b46e8e487d6194d399990e2c2d708a74474f54ae5dc7f4ae88696425948fd84cc4c244adbf58d533b029fa5bcd0225ae556c41747ec8e5c6d44fd866735b2ef311d754d1f5c3999a5ba9868292f846c3"}, 0x40) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:23:13 executing program 3: 06:23:13 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000004, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:13 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:13 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:13 executing program 2 (fault-call:8 fault-nth:6): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 737.694748][T12712] FAULT_INJECTION: forcing a failure. [ 737.694748][T12712] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 737.709657][T12712] CPU: 0 PID: 12712 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 737.718017][T12712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.728083][T12712] Call Trace: [ 737.731403][T12712] dump_stack+0x197/0x210 [ 737.735766][T12712] should_fail.cold+0xa/0x15 06:23:13 executing program 3: [ 737.740391][T12712] ? fault_create_debugfs_attr+0x180/0x180 [ 737.746220][T12712] ? ___might_sleep+0x163/0x2c0 [ 737.751101][T12712] should_fail_alloc_page+0x50/0x60 [ 737.756321][T12712] __alloc_pages_nodemask+0x1a1/0x910 [ 737.761721][T12712] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 737.767285][T12712] ? __alloc_pages_slowpath+0x2920/0x2920 [ 737.773026][T12712] ? kasan_unpoison_shadow+0x35/0x50 [ 737.778340][T12712] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 737.784597][T12712] alloc_pages_current+0x107/0x210 [ 737.789729][T12712] __vmalloc_node_range+0x4f8/0x810 [ 737.794970][T12712] ? bpf_map_area_alloc+0x20/0x30 [ 737.800014][T12712] __vmalloc_node_flags_caller+0x71/0x90 [ 737.805663][T12712] ? bpf_map_area_alloc+0x20/0x30 [ 737.810715][T12712] __bpf_map_area_alloc+0xde/0xf0 [ 737.815774][T12712] bpf_map_area_alloc+0x20/0x30 [ 737.820646][T12712] htab_map_alloc+0x8d3/0x11c0 [ 737.825439][T12712] ? htab_map_update_elem+0xca0/0xca0 [ 737.830837][T12712] __do_sys_bpf+0x478/0x37b0 [ 737.835449][T12712] ? bpf_prog_load+0x18a0/0x18a0 [ 737.840399][T12712] ? __kasan_check_write+0x14/0x20 [ 737.845522][T12712] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 737.851079][T12712] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 737.856385][T12712] ? wait_for_completion+0x440/0x440 [ 737.861697][T12712] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 737.867972][T12712] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 737.873452][T12712] ? do_syscall_64+0x26/0x790 [ 737.878151][T12712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.884240][T12712] ? do_syscall_64+0x26/0x790 [ 737.888946][T12712] __x64_sys_bpf+0x73/0xb0 [ 737.893377][T12712] do_syscall_64+0xfa/0x790 [ 737.897892][T12712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.903907][T12712] RIP: 0033:0x45a679 [ 737.907814][T12712] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.927425][T12712] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 737.935854][T12712] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 06:23:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000300)="bb12197db47cfbf69482977f8d9491e7bfbcf814af27d0d986ad565c8aa3a7972026f1083790a3a4ae06807f29f12bad59a9df84a62f7a09c85f46dfcc4445fc548e5dfe553fffdc689c133633a19b5f1a928e1091ab780c290871c1d536a37d1cb21e592f74c7476c500928255f4bd5cff7665446a80e82d1be77d03f9c04a67d", 0x81}, {&(0x7f00000003c0)="72aa900f8a4aa39e0519dce974dd32aa113cebc7a4407b3b2e19b05079ba4664e0da41eecc4e4e06f269d800b77428bc3cf84c3ad45e6f7bd569be517e72cf083397816e0bf98aadf0", 0x49}, {&(0x7f0000000440)="3063dbb320c8f8e2b540e1ceec5dcb9f2e6dfb4a5c9706dec2b70f6c86ce222f6236daf88f33876e0d200a8e1efda80de3f46a25c0acaa527ff0ee9e33e7fd9ecad227e11289e5de2551f46d99bebc1e485db91cdcb1903f2b87382ed2175f6b6a1be8afe18d42dd6ecfc760", 0x6c}, {&(0x7f00000004c0)="11392f061480855f68d9919a15f3972b799a5664eb550e0a0374c36631e49ce66138464683c605f69a56ae6fe233913b5300cd4e9d483ce91c24f3a9bb883c473a11aac7fd8593bc1487e12265194aaf5f63b5465b1bad92388c8af7cbc72ae4285562c58be399d990e82a66ae879e5b6fc5b8011787aa94529e1d14585104aef4907d896d51f8f20e59f3f47f6465f19bf9336875644df47c412f619089754e9d37ce16a6b4adbee826dbcef45ec040a8432735834ad6450146f1b505e46a600ba108beac1e50f5f95321d8bbec850dc9c7e58acc977c49640ca21f443bacb82783f45f6f6415ea31454636a229841ea7b656e305ce56f6e8bd39e0b034c59e0826418678c2236f5cb9febb9f62c378d87f154c79350c6bfc3b5119f2161119e68bb3d3186851059f860c42f4c67683a61e305af6aa96df7c47ac0bfa86da295c7af2d5862dece09723a472d3acb3eaa1e4f12e6d2dff9c8573cdc0eeaa5f4703eec0b39c9b1a8afbd4a0c12a6d6289febbe47257365ba5029859eb3be52a1b7722e411318b4ff101a3a8463ab79dda7debf6d2cf16607bc3ccd1c4331b690b6fb54a7ddb20f55c7fc7e5ce66aa665fc37b6a7828e39f746328a216fc0d0e10b962898b165e8bc5124f94f8a76fbd6a1780cac4faa46a8bc957c29cae25aad78c3c96edbe6319eb545d96500fde4218e98a5ea77f385cf7a07227142200f4234d15b1a13f9cd535b99fcca5677f56f4013e013a15ab49927d7cc48cda9d0bd15cccea3b0c25e05feaec2af04cd914afe4b9b394e5a14d2f2af07a79dcb28394cc03d74d37a73bd60a0480dbdd11e545937762a1b71370ca4f67ea05a279aac423d0ea05aff38d6876160ee3b486d5d8e15952ab09aaa61efebf3bd2a5c654c4c1450167395c2df5fbb1073b1ecd217e1c4570815a6d746c15f44d63ce76ffd7eb28b3f45763d37402a4ee36dd7dcbc86e24fca69889b22de80abeb095918e8fb42540f65cc1bd2f5c8d8e519e9b697dd67164a113c0f2de633064ed49ac1db1fa95093816f39679e4bd4b4101131746d0c0a50b510b57952c84bf27d9852de050b7a1055b2df6441e7c401b72e3409c67744b34eb16e2d67baa54d28ad1df62960afdad5865a042e59e5580785faad4984157b6d2896e456b8d0b6e2cf8923b32d81823f8fa8c7f7570261da260d02b4a22e7dc1b8d9d239343e53110a2b0ed6bd5feda63db82cc834d238a6766f18244381d633bbb5e8aa4c82f01fac5a0bc64942d6a145baf46a40a022f981b4afae2f2a0f712d03ca93da7bc02c2f9f67df80e1bf6ae464e0c8fb96620108161a0bbdc57202257ff58e8d065dde03cc5ceb62ed89842b313ae0289cbe91df81a8d4a9898972cb866bfc7b679ca37c8b6e0a0ba83952d62b2f4820c769ea4e6869b9df167d94e766e5a45b6817f5d6a1f86fb1a3d802b4668d75d115225d140e4f05bba30c9e9fba1596dc1923d2980f4f9fef100619277dcf52610a2fc42473cf7e260cff751c3f06a99a73a03a5233636112f2e1619ec74c3a202dd1b4c6e117cc69180985b55f22cf29c84491d96841e40fcc42679f1c256c360e94cb06697b12c6c0f1386ac6d004848dafe2772374d4f2e742a881c1b4977ceb87cdb0e7484761729120c618bd9361f84dee11bb016feba3fd79f4da646aebd839a14a73f8af45bafd30a1e109e7479bf0899ba468471a6e20614b0bf756ef7b31963b615a62809dae243e9d1126d3d5b70b071bddbd34b00d2f45aae6171cff297975847d226103bdd03a2cec8e8cf6f4415a4be71c350e5be3c21eb70ff34ec5ffd28338dabf8c1d609de7451e11cc2e8b660cf99159cb08d8aa62bfee7fb1231d892feca6b63921322855540258afdeca960f9368dec98e5eae83cd527e5e93b17bd6a07f6b63b80217182a147612ab7a0794e62346796dcc5529a10a933b7f72d5d33eb928b30af3d5cc73e011833731d90c92ebc291a687927ef539e9ec8535dd147d08fa6e547b3f76187d6833ce5746d4aa75c8e3b220d98e1004a5d3d263fb246fa39e5975b653c713a8a93ee933dc495ab5ff23512ae8deb94ec9804266e8b3d8abd8f091dc2723a633d9ef8aede0473793b5574ee3df32f761d6f6cf38cfa6c9fce744312a23003eb092dd2b4918ed540e04107e92452ae5e824ef080c576457a4e1a7008153c7ad3416411cd9bc2f7eabc849103891c8c76daad05dfe1d1ee1932ae34dd45f166f3b460c54afa8f739e85eef8c075d47ad74c9c29a2d32ffb9628f4c5e75c5942828ba86446a636436622343667c68a49dfb39a87fcf78469aa1d653180d767ac07d13c70e178215732dc92edc3261952ed4fa41575bb5987ac8f8b206b2b6a9189fad8a16e77940859ffbdbdff3328ba048ab49e885386ea1039dd279777ffc5d39ccfa75abdc3d087f7fd0c114c2893359a73df9ff9d576c1186f06bcbf1c8d33ddc6962b99a6d88cb831b9923addbcb231f61bd3bc5388e99164688050c8cc6596a14e4e0f3c116a590d4be2604977b2a98cc7e65cd019ca9b9014110835f023d74157893a0bfbb720302084b8d5b2e9cbf47d7584b16820f39766d4ec5b2ff9b3351db5519eadc16532802937f353d7c3a6f85da2416199afc0ccfc62449d62a7bbe13e4692a1bee60eb3010947ca41b67807626fd9c4ef5ee30a3f453adb2afb75833e5cc61e7f47cef2bb2603669302e46d487476ecc3956fa50f497b5978784d91bed6b490159828700b536840b86ee414b92be19bfe0f3a3ddf70b5ca0265b46b3f02a2e81e78d0b9ede9120f6e0654c6d4b8f1ae621227ac496d1466954dcee7fc2fc30332ea32d880e3ae6f2bd2a51af4fce17667339d786d899c6593356edb904106fae578cc86761832c817c3d3c88d0055374a50f168b11fd2830145981f05abf17b78bdd1a2c39ef3cadcbbdc67c6147796b846294ee3f7f338ef88c3a35b79f72aa3766786a4c71bd24c692029aab0bd3d7b35a94523593bdf5c05955a89eb788142dbb6aaf14e11a21fb1973ca7b58c0cefd95716c93d831a0ba5c846a32466c38173efe6945cd2b1b5d80155640f4be0502d7bab37ac8cf61af3c82e67d7e71571b28e301be4c353a514a1ef65eed14ab8095d0fcc6496eacc61d32abbef6f47bd3246a20469ba947d9dedb162c46c4d0583a95091549619e1aa77353ef610238bf500ebd263bf01b53a6344a256b76f92bd0b9d04eb75386a0473149188053a7625f09cac9644a0ef47d4f62f162b1734c29f63fe75de0565e66a2e8650d1dd2e485c02b5d9b3071e75243719da22b393e8c48d61e02c27a7a25207016ded044feaffbc88c1b4a56ae6a3975fae02e0bb08dee8d76d948168edb76e38e6c1289788818ca56cd1ed88e9cd7cb75a04421cd2f0c7b3273e357a60092176b3b0432c1ffadcce9eef6ce500223dca548d86b718d9c4d2f08bcb65eaf5b7a602bc0c4683ada4e32b0064b9c1eb25d1a83981c4327f8a935f8126fa61f5e036f78f9030c7bd5f18132ed8a04569359a94b45ea5a03d86e73f44e590f2202b0e29e2eb94d375647694ba291cc517bfa9b5e2d3b9fb9b0f354ebc377a02cb221a56e7cc08ba2e16f16c2b2ea64e192d3f72230349b163cf0d61604706a4b214f9d2ff498f047b8c4d11854c0cb9ac3ee677ff34ef56f4a66fc93f4855ec5c2166dddd559dc6c04571104f58f94dbc4604e2e35537ed636d46252648dbd8c233d866a9e759888f55000935ab443cb6446f8e1e0c7888f133ab77f0d3332009d227a8d57d00ed75b366a6f11af156c8d035ee496989566dddd4c2d7dff4a9a37eb7c27e31fc1f9f7d8ceec3d7358613a06764403842efc8d0fe1f0a5c694f1c7510492a7c5d7adc70d8a402a0d7929d9c96c2037e6a87dd879d9c2e3a7e698b0c59005835d19587d1e2b9f0f9bd9247843b59093319107fad11038ad51de4f47f9791ca5486472bb6f3f9a1624c1bf23010eca19fd566cafb7b8856f88f7a79d41cafb9e13690536738c8f6dde4f45615d8651f04cd38540ce1e42a67f783efeb34f69b8b29f042c7092fcaf583b830ff771d4d7013a963c430e648ba5d6d614ece091d5a7b288a0f038ac61690afcff24a047dddaaf8ec8ecade0e9b91af6a3c95406b4c54d58ba60c5e7f0f48575723ac495b6966c47bd79493ce99bd435ec93d23f398538912f69e886741c69840032cb9a23a39db0776ea216f2bc5ecf44c86298cd8c0c47c6e3dd00d924636cbd3cf158c474e4d418f9816da7c01e0b3144f4705309e6463ac258d09143aa1a75661e7870f4eab5a59c26e8556e4b349ee87f86650b6c7b463d8116844960809c527d1138f8605d2bf16751f9cc342fc29289f7dd16793c5e30eaa60f73df8af1369d10d5f8173163ba67cad86d00420643ebb51b4d8439dcba19c0d462d0e4399a017ca5586c4ff7715c66744f84fdb4b555fe9552b41bf55315c14ef09769aa1c0f20d660bdef7977063d1cdbb43c3c8c5494e0de125853a9f502b1b543eed51b394745ba2487cfb704ca7d4fca578bd008a9ef92f2609ece7e3ebc8e67a8962ac21792a85b6f6591bc5d1421989cb1969d6a1fbc3c931077f20ccb4687c3164daa5350561b2f727e62ea340b35009f27ba5938c35c401a8368a31cbd3c9b0e90399b08f870b41376efd6dfebedd1f5e18e018842fee29e7478546badcf853b152c830a8407f97b383e36ed193b37d1a0f524d70096376aa631815f62f61df92eb2c1ee759441a637f3de4de61c9050914c107def50845f8f597766a1918895bbd48ee6bc457f0afce2b722b2a218eda2a6b6b509db27bf370b728b360eb7feb37f7febfbbf53c3bde8854a469834bb7507ad443f65e4530606641b6c111589c2ee54e1b453532671ec9b7229e442a22484f1f9e4be510862a3a412b8d2da4f0db4efbb2a293eb3ad2309e483648c8586cc97bf4530fc5f9e3e2db61f2e97c151de7b34bf4af57fbe68ebb5e63d2b8c6a446f189daec590386653dec980a74b53cd70ef951b09b953b0523ef0e3192ee0cf63104189a02e0c0d63e3496fee04c18bb1b516036641308b7b10ca7d144dadbdfa0f16dbcedd5839076b5085e864c2f9b9a9cbe4bf20ec13d9516d7e2752fd9f15cbc4bbdf140f088521f7f082066f09cd15689506208677aed5b1d630611532398a53279bbc9c13770083334e7b5ac3efaf2566f7191689054ecf65c14a88bb4c9665281d84be63e80929d1997b4895eda56b70d99ecad0ded11bbe17596578099265ee301d3032c10e531e2ddcb3a12a4a6624b5c254c927f3a7a6878fa4fc4a326f362e91d96e720a8bfd0ea894b792f86d24aa7365db5af96a4b6b1415f6bf495717aeaf64c12a9109d51246c5a19a194d257e7c94f2e3a399110c87440dbd13e205b9d837927cd0a6998943e0f8521b7bb0ef31da5921958bd61184a22bab7de1a913ee334d56b1988d8351f7f10e401a364e4d40327d12905115102f1c228cf60bff32998f30969e088cb79c88980e4c88df55f3d5e8610fd9f67384708210144b337aa8dad35ca53711459d984ccd924ca2c3eac2f0803bbb14ef708f9ae0455cc1ad5aa7e87834ed5ee00d4a99c22aa6de45889ca1de15ba223ac76903ccf5efd058f8323780629453d33de46eb5e7e4f92d0ff75573b07bfbd0836a6634159de3ecddd7546e026fa54b0f14e845e1c309dc7a5eb8b8a2b0a883b041fbd26e5187a079c9e6b70a8fc52e026ad863acaa4e108c004354854c7736cbb7ab7ed79", 0x1000}, {&(0x7f0000000280)="049159c8673601a3c23b8d73d20b9570b4", 0x11}, {&(0x7f00000014c0)="5332f1", 0x3}, {&(0x7f0000001500)="7974c68008d7ff80f30b4139773531d505ab8e728d2572f034cfec409eda65719abfedfd686a3a4113693379c78eda00bc7980fb552f2ebce2179a7376d86ff98e997fca6db6367c921c0fdeeb80f4625a8137a8c73f613eb9dd9b984bf0387a753995129fb0cf22e5116242fe7e93a2966c4f48dbdb1340955f66c404c7f23166e7e09cadd5e1dbea9dea", 0x8b}, {&(0x7f00000015c0)="4848e6c620c1056d09717f96693056905777eb", 0x13}], 0x8, &(0x7f0000001680)=[{0x48, 0xe5e4027ed27d0bed, 0x5, "98b9b0ca6fa75e32623c3d3aa2df65bbb4d6e0f47c8306257d29a4c2bf1199de7575347f0428158aaf26521e93aa60c0d3"}, {0x40, 0xff, 0x9, "3192ae7e60201a38d6082aa484ccd331df315168666181d5bb282b57d4c02fd43dbc3d7a37114cbf6eb7"}, {0x80, 0xd8c03c988baaffa0, 0x5, "77267868da371c01d22010adf9f307066c16d4c6b899757ba57afcee076aab3fdcd41d7fcf56fbc64cb02eb1865d91b149a872e812484fd5507e27280d3aab407513758cfb15cd5841b5d1b8cb001c7b199e7ae6a3d7a04beb22b444f041bb72f72c437173cf1ca975e7"}, {0x10, 0x10f, 0x10001}, {0x1010, 0xe8b05951c1e5712c, 0x9, "576c931a3f3cd2077e89301524510fe70478c5830f733a3cbee57e63f535ee85cba01a26e5b5b0112b3b768901dd5f44c44d054e2407d9cbc76e36a2d5aed472390e884b8d90d96c8f5272f04b1e5234b09c775b8b0cf026e73ac954e2a179f877a4e5a0ea64f2ce859022a0ecc57eb17382ce16e35feb3a5c78c05d375ef7643a755403f81fc09515d4a284275f351b078029de6c655599947c6973abf4804ff3e6cb49f33de2db7ba0b143f71e11e76a8d33e7c6ff197ea12fb911d70577c9b04ae8933c5b178af65c5ae34057cee7a09affec499c458254ab1d3c9bdb691606e421e4ea097f65e9421ef1fd35f2f282729f2fb13443e85e09adc6df0c94f9e28c3267c584fbc528d2a9b376eb81d34097ced2d31cd76b536ec2aa8a5ee62287b447e76920d67d3a3c7820f961853660a7b35bbb441b7415f32da7f0e8befbf1992ee139c1f155d5dbb77f899cce9678a718f9cb23fa0ac220a9eadc68f68c4d03a3e7da167cdf9c5180fbec9b5244681e02180226a12d7064f5dd55c3a5722ef789f3940c03aefa6e119ed2ac937769628adeb31f71de28bf3462580c7d0294edb5fac8d390872c42fbc994c52c56571d8b4f16c76ec20ccd0918a479f4cd1095e507a7f5d3573bdfa9f12323c5e58116d697abd41d0b05cdfd804eb77d464f7bd21bed1bbd562f4e9f254207f23eddbe7e96608f837c53f1acc930d90a0f7251c99bf6fde4729ae4673e7728b507e1f5d4813c160323ee360c54f4ebfef6603cad9b2a15d2a9231e6fdf26a3fc60082a8be83354438ac12b7d3493f08ec8a8d476d004312c4db2e245a1bd1e5d94f7dccd96cd20fe430a26f720c9b41626020bc158369d2b7994f335ce3bec50fa041287b35b15533ac51ab47530db201ee48345e7cdb338cd68e6eef6bbb4076ac03346adfb6dd8ca1c3111e74da71fcc86f1ae186f8d8b01309bb08081aa412d9e0b484107b9fa77c1f696dd6b0dbea3fb3dbd75b40895f3522f6df5dd222b6850deacc967933030cffb3ce0501a88ff5bd519cfb76b6a32dfa75225e084d385c779593e8042b552d399c14a19c256e524a80871d3426bff1c0534a4e842c1749da538909b107c86a154f53e44eff26651c98810dc54a0fa80481a4dacc2d29f915f28f7386f982655415b0abb8fba02452a0f76f1b3b92dcce01c7b6985e3103b48042704481a8a575fa824ad521840202a44931ac9e62715b3da6e0c4b8857bed0dd95740e087ee8569ebf2c220ed7ae4cfaf0d431928e773e3baed7b51181c598de012ce9274dc0968ededf7ab0f904ee147f6fedc2aea6d4b19a841c3e97749eeb793b6a974e21da858de977378e3142f32357849996c942f18378be5127c2fd55c09c55360558470dc2b982955960d9d240d56a412a9fe19a0f8de392f162e6b3cdee294993f2140aaa315d8667727c74221210cae294ce6355104619ae03aff71e38420478cc261dd91ddd0fd20a82ade0866e67b7654a4619620ad5737c286133e5fa5fa5c87dc869042909221a637a1612f6c6c874f4669e12adcd97c1c4c06f0675300d1e79a94c557495556205e4fa25e9bab46fbe9e204d6359f935f5ab81a91eecd45e2208ce5a0a42e9946b6c08ab46b72c9d5836c463288317023a342e4518bb53b9f572ce9f657eba553b68e2325837d93006374cfd3d0ea8d6d184e2a06e30ccd59ef57b4f9a4240a335f6211766e32b4156a8c07939713ba1b9f54f38abbe5eb17db7225e99dc36aa08e52373d4239eec473dc977c1ec568ca686ceadae355e5bb0c8e7b7acb018e210fe225a7a2a7a2ea3948b55738b2573bbbd7bdc0d888bd92bacce63cfea14ecc125ab27ce3556a83a1cfafc48455fb0b74b1473b69f37b3a22b9634ea09304896f7189f4f2d3e4d1aa2a9edd8afd19c74a2fb58c8489961363f80616992f23fc93694b172744d13531d928e16e832fb9a957f0ba26f5c0865fde20f40c9abc3be0688d549186c1c786fb4912da9d348bc62a478436d0c6df863f1541e2bc94111b126e2ff458833d670dc548276b9025a636d2b4ce28e39d82ae59e157d2fd31b649fab8695457faf0d01c6d7f2001181ca6b2f1fe5cb82e016d4e3871120889baaca81ca39369cec2c8ed8701ba1ce8909110d9b22e4357b251c4428baf144a126f5bb705ddb320c4b4c04f54424b7ce893a8cf2c84b54b4307d028c01bc6767de15ff75a351cdcbae258db4f6ad124181c1015dd38e9eb6fdd57d92a2a53883f7217eb4e03e184eb1b87ac6dc6b17fc63e641e9e21f5257c5d4067440214d1096b50b23abdc67c48c50c67a1795a237e86fd6b6ea4173302c3b6f9ee8f3b5a87b1bed725ad5a74f7e5fece5b345d424f2eb8335efe1eae5e174de9a50c437c3d3759b3e0be201d396759e22b5ec8d0180b79b120c6401dd23c551e9d8d9bee6548856e601514dd7f97848f80eb3257f9c0ebd985af368877e670b08c1866b7d8976b2e64b8224b8a47afd669e135bbdc9efe23d1ef32b0fbbcbf4572a71dd366c3c69447552ea6cc7235a53d191c2c983c663eb3c327a27879ae74635e85aadefa1a1701e09a2fd75aab774c8a2755db717c0bed355cf85ed0cbf6aeaa1b5f764f59524fcc0d5db7f75976ae82f4cbf51a5d0b4133cefe13668652bdfbe7c151fbe606b6311c3e7e21a48919ab3dd0b8b72c294ae84071493ef20b18f0356c7e2103d0c0d937b8f2b2984b5fd99aa01bceed28daa0d77d2e6b24af616fcdccb3c913bb0733cfb8d8ecf4c8d6bec38dabf2b3de3d76d194153f7de3115f5b6c39532290f5f1fb71f70b1dc3a1cd3735466602bc6420ab74aba09b811a3d2712b077257d604776cd73c0f95b5dc0943cd2202b920f3b87a87aaf998282fe0240ce3acee27c551c99cec0f4e6b102dcb40a497884cd3ae2b15516538d782a4ac27682f4cf931bce287284e72d947476925191fc1863ca1e9b9d15831c895503e1f2738e1faf47042fb14c67cda0bb92abf087290b708313bfbf8c49d525b2dd072b50c152d9045493a2e3a5da950968c0650acb128b7b8c5f464e5a6494e011bbc208be866e57c4fb63921a4165ea145d889e46e119aab497865a9bb265b361da2233ba3b3cbc35c298b607926622df93fb27d7a1ed0c694c06295438caeb9fcce8fca4ee9c03f31a5911a72f6c7b72c9f326ce81450d350e45adf50c52dd17cee7053d3859be95935a9a7ee6c5777f664168aa747b7ef5c4d4b1aaae57914cd1643bd40c503f58c11fc481c4e15bce1a5c47ebefa8bc72fec623df92644cf1420c8fa7d8a9e2086248d9a5d478ba823493526c7a6ed994360ee34563360b3c4f39bcb060d09605a8e33cfbed0dbf00d080e0975ffed2080fec6091da74be8f096fb72b70609f29e021e53176fe31ef6543818f851600a6dd0d416809391aa447ca7f11dd0325ab53a9e1c596fecc35ed2d3e149bcbcb5013dc2f98b8eb81498aacd1e086bd17087c9edfc13a455a7f56e47f3efb6efbaa49291f18c58e4de4318fe12e9de2f93ad77dbaa27dd408cc48841525ffd6dc853c595b1cb01fa1d7f0fb06f78f6a7cc627b0dde954d5fd7d338dd42e07d9313bc3fe7f39d0468334332f5523a1b83b27ceb1c98a716d2b1ee8c4280a118321c36df08db793143cc8077d7ee8e1e1a43e69f9e3e7715fab8237a80f4c0bf94556a402d45ac0119fdd32bbc8dfccc1e5971807084e9333da380e7f554ebf9c684e70488cbf8eeb100fdf1b4fd303b51b7bc6c0d14742ed41629942d84be8ab53407ef68562a9a1490455f838512290d4291961f47f0c8dbfbcf5d9b687759711c138792d0e4efbf2be2850ab5dc3e2cfeb016043fd39748e2d3a11c5ed6119c0c6b808d8b4e6fd1261aab7b5c2180fc38f5d3ccef9adcee71e493c5b03ba196f488125c82f475df5c48e51429b9457abc7e8de639c829a340f609f41e8012a1f145c724c905f0847c7af67480f5ac40ef3c48a0611a00326273f6b070700be21873de81602456cfcf807e57916a615764c2c8f97bd240e9706bb3e3c003dff16a28417fee03a4e776a794cd537a5ca9ed8a14e71cb104790f61eab663d4b3bb7ba6bc9a1a6a63480ab9c4a4361aeeee5295e44ca51a0dab93a5c16f72f8bc0381a31eaa073bb9fee836f28eaa0e5dab3b59958ac59eb64238d97b854b2bffc351a380ca767a507b9fee6b28a17581bacbab475651a1c0dfcd33f18e80b5ca5fadfc771f22e61f7f3879ce13d365e0043a0f89d3a4fa318dc77a53c474ae818a6909cae94d832c8732ee8c84e2806efb4c2f272eb6f1e1383d2e1cc75de575fa7bfa408771c8803d3ceac428fc89528328ba32c4386d5a977aebc1e96437e567e581ce392cb9fedf757b7209994f9f9e8f8f4f88a83e65e29457c2d1b68ed729ab29577ac47dcd5e69801b235cb6aaab54e6351f143c627cbaaf85d6aed10d6f662c720885211a37bd42563cf17f58663766c35441303c153697fc45454f4c0b25319ec0c6d65dd92b0a7db0fe9112ffe921425d211c36722262b7e64f6aa2b2167c87db36c7b7b3156395088117495834d11305b4a9b8f4fc86e4c0149b3b05a1cf33134e3f52c0ddbee7efbfbb07811b190a8c9450ba36a9cca752d25e1a150c2a77e0fe3e0fc2d327fed8d69dbcc31cff2811da155f28568f89f4fc3cf18a0fd3c2f813a5b10c1bc339d2a49c1273ab92fe7f5b08106310dd0723fe0e265eeea848be12a83e80b225671e0ae4341e5cb94ebed408a770c3084022443ae69427a2ecd17d1d1dc12b7a6cec8afb0894a739109042ee200d5572743aa46e579cf01b0aff2505c0dff6b02306cc5b11fdabafccd42285537dabb3f2c7acfc6170da16e7237997ff0b95b5ee8dafa7a7b1cded2b199206c0ce45dfee3db3dd827d272ba13061c604ad19b6300a60ab14903d2a63a38d3a40c714ff1af9dc35d2c4fef16c2d6f17f1c2aec02b1bda038a8d9a861cd82d5ceae5669e2e5ae77bbe88253ac311c74d4fa36d9b5b52602f09566fa1b43c7eb481479b4eac4904d5610d679dca9e8c2a90fe16c1b82b697df6bc36562a139ad3857e3f0d52b9876efbbf7023b120667a8849dddff0db88df12616e787becb9443606fb05e9dbcc8c6f9d2727a39b42018fda5f508c23a2b23632c44ed0a2c25e565bf04842c9d2fff6848ee8c08159c32c5cf8199a71c4f6f2805723df436c7f9d3acab89a883db1c3f77f7ae8f98d2164c8f81dbc8c174c9bf100299f9061df7a94635886a51b86d053da2567f09660652a4e61024af45e89d6635d4bb56dc443be5c9f8ddfdb6e1a7abdb033e9c5a772fd0a6b3b0b79349c092bc245ad5eab2d285aaa05716a270eafbf3846e2af8a3616f0e34e2cebfa7ba8a96798e52efec071062481aabc03e21fd2f67ceb04366796ab31562e614e2e96df7aa27e48441e8c85fa81ccc6a582978c6a697953ec94623d27fc11758eef17d97aaf457121b031158431c239a2f51e8be559792bc806092dfaddbf79884f8b9d50397db0a129e66ae844895f943d45068647e348736a711f291ae666e573a1168d671c8a69273c39003c997fea55e0299fe2f2ebab004f5f31d6a56c71cf20b0cd39bd02359228d1394000c7fde1c293ecfa1cad7fa0a60ecf4411a0241a788ceab6aadeb76eba9cc39ba6b94cfa7af26e5c70ba2da33a6f80a5593bed6bc62a8a84556f18251db0fc33e808dba5772013e5bf455db7c2de4837b41911d8dc9deb52d9e970597bf5df2101096e77a3d44b98f9ac32abda28"}, {0x38, 0x116, 0xff, "44fe7b96c52b336433132d874ba811963a07cc4cb1165cd050331d1ea84396d63dd2fa016c81"}], 0x1160}, 0x2000080) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x70, 0xfe, 0xf7, 0x7, 0xfc, 0x0, 0x1, 0x80800, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x8, @perf_config_ext={0x1, 0x1}, 0x1214c, 0x74e, 0x4, 0x2, 0xce, 0x0, 0x6}, r1, 0xa, r2, 0xc) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) mkdirat$cgroup(r4, &(0x7f0000000100)='syz1\x00', 0x1ff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000002840)='cpuset.effective_cpus\x00', 0x0, 0x0) 06:23:13 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000005, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 737.943848][T12712] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 737.951836][T12712] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 737.959825][T12712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 737.967808][T12712] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:13 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:13 executing program 2 (fault-call:8 fault-nth:7): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:13 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x70020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 738.206704][T12749] FAULT_INJECTION: forcing a failure. [ 738.206704][T12749] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 738.313226][T12749] CPU: 1 PID: 12749 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 738.321602][T12749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.331786][T12749] Call Trace: [ 738.335088][T12749] dump_stack+0x197/0x210 [ 738.339423][T12749] should_fail.cold+0xa/0x15 [ 738.339442][T12749] ? fault_create_debugfs_attr+0x180/0x180 [ 738.339458][T12749] ? ___might_sleep+0x163/0x2c0 [ 738.339478][T12749] should_fail_alloc_page+0x50/0x60 [ 738.339498][T12749] __alloc_pages_nodemask+0x1a1/0x910 [ 738.365288][T12749] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 738.370856][T12749] ? __alloc_pages_slowpath+0x2920/0x2920 [ 738.376595][T12749] ? kasan_unpoison_shadow+0x35/0x50 [ 738.381904][T12749] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 738.388162][T12749] alloc_pages_current+0x107/0x210 [ 738.393287][T12749] __vmalloc_node_range+0x4f8/0x810 [ 738.398492][T12749] ? bpf_map_area_alloc+0x20/0x30 [ 738.398506][T12749] __vmalloc_node_flags_caller+0x71/0x90 [ 738.398519][T12749] ? bpf_map_area_alloc+0x20/0x30 [ 738.398533][T12749] __bpf_map_area_alloc+0xde/0xf0 [ 738.398547][T12749] bpf_map_area_alloc+0x20/0x30 [ 738.398564][T12749] htab_map_alloc+0x8d3/0x11c0 [ 738.428831][T12749] ? htab_map_update_elem+0xca0/0xca0 [ 738.434228][T12749] __do_sys_bpf+0x478/0x37b0 [ 738.438843][T12749] ? bpf_prog_load+0x18a0/0x18a0 [ 738.443794][T12749] ? __kasan_check_write+0x14/0x20 [ 738.448911][T12749] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 738.454467][T12749] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 738.459765][T12749] ? wait_for_completion+0x440/0x440 [ 738.465069][T12749] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 738.471344][T12749] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 738.476822][T12749] ? do_syscall_64+0x26/0x790 [ 738.481506][T12749] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.487611][T12749] ? do_syscall_64+0x26/0x790 [ 738.492289][T12749] __x64_sys_bpf+0x73/0xb0 [ 738.496696][T12749] do_syscall_64+0xfa/0x790 [ 738.501186][T12749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.507052][T12749] RIP: 0033:0x45a679 [ 738.510929][T12749] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.530640][T12749] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 738.539039][T12749] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 738.546991][T12749] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 738.554941][T12749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 738.562894][T12749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 738.570845][T12749] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000007fff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r3, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r6 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xfffffffffffffcb8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x20004, 0x5}, &(0x7f0000000380)=0x100000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r4, 0x0, 0xd, &(0x7f0000000080)='rdma.current\x00', r7}, 0x30) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xff, 0x7, 0x0, 0x40, 0x0, 0x5, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x800, 0xfffffffffffffffb, 0x80, 0x5, 0x7, 0x3f, 0x3ff}, r8, 0x7, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) 06:23:22 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000006, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0x4, [@volatile={0x7, 0x0, 0x0, 0x9, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0xf7}}, @struct={0x1, 0x8, 0x0, 0x4, 0x1, 0xffffff7f, [{0x9, 0x2, 0x8001}, {0xb, 0x3, 0xbf1d}, {0x10, 0x5, 0x4}, {0x4, 0x2, 0x78}, {0x10, 0x4, 0x35}, {0x9, 0x4, 0x10000}, {0x1, 0x3, 0x401}, {0x3, 0x1, 0x10001}]}, @union={0x7, 0x2, 0x0, 0x5, 0x0, 0x40, [{0x6, 0x4, 0x9}, {0xa, 0x3, 0x5}]}, @volatile={0xb, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/255, 0xdc, 0xff, 0x1}, 0x20) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x8, 0xfc, 0x2, 0x64, 0x0, 0x0, 0x9875248b5d8ed7cf, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x4, 0x300000000000000}, 0x2a0, 0x9, 0x0, 0x3, 0x4, 0x2}, r1, 0xb, r0, 0x0) getpid() socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:23:22 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:22 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000002, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:22 executing program 2 (fault-call:8 fault-nth:8): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:22 executing program 3: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x4f, 0x6, 0xee, 0x0, 0xfffffffffffffff8, 0x80, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080)}, 0x10000, 0x80000001, 0x0, 0x3, 0x4, 0x80000001, 0x1000}, 0x0, 0x4, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)='cpu.stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r6, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) perf_event_open(0x0, r5, 0x2, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r7, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) [ 747.030319][T12779] FAULT_INJECTION: forcing a failure. [ 747.030319][T12779] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 747.089802][T12779] CPU: 1 PID: 12779 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 747.098182][T12779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.108255][T12779] Call Trace: [ 747.111570][T12779] dump_stack+0x197/0x210 [ 747.115921][T12779] should_fail.cold+0xa/0x15 [ 747.120540][T12779] ? fault_create_debugfs_attr+0x180/0x180 [ 747.126366][T12779] ? ___might_sleep+0x163/0x2c0 [ 747.131248][T12779] should_fail_alloc_page+0x50/0x60 [ 747.136466][T12779] __alloc_pages_nodemask+0x1a1/0x910 [ 747.141859][T12779] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 747.147428][T12779] ? __alloc_pages_slowpath+0x2920/0x2920 [ 747.153172][T12779] ? kasan_unpoison_shadow+0x35/0x50 [ 747.158471][T12779] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 747.164743][T12779] alloc_pages_current+0x107/0x210 [ 747.169847][T12779] ? ___might_sleep+0x163/0x2c0 [ 747.174690][T12779] __vmalloc_node_range+0x4f8/0x810 [ 747.179887][T12779] ? bpf_map_area_alloc+0x20/0x30 [ 747.184902][T12779] __vmalloc_node_flags_caller+0x71/0x90 [ 747.190528][T12779] ? bpf_map_area_alloc+0x20/0x30 [ 747.195543][T12779] __bpf_map_area_alloc+0xde/0xf0 [ 747.200556][T12779] bpf_map_area_alloc+0x20/0x30 [ 747.205396][T12779] htab_map_alloc+0x8d3/0x11c0 [ 747.210337][T12779] ? htab_map_update_elem+0xca0/0xca0 [ 747.215699][T12779] __do_sys_bpf+0x478/0x37b0 [ 747.220284][T12779] ? bpf_prog_load+0x18a0/0x18a0 [ 747.225225][T12779] ? __kasan_check_write+0x14/0x20 [ 747.230330][T12779] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 747.235864][T12779] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 747.241140][T12779] ? wait_for_completion+0x440/0x440 [ 747.246424][T12779] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 747.252667][T12779] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 747.258112][T12779] ? do_syscall_64+0x26/0x790 [ 747.262776][T12779] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.268829][T12779] ? do_syscall_64+0x26/0x790 [ 747.273502][T12779] __x64_sys_bpf+0x73/0xb0 [ 747.277910][T12779] do_syscall_64+0xfa/0x790 [ 747.282406][T12779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.288289][T12779] RIP: 0033:0x45a679 [ 747.292173][T12779] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.311768][T12779] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 747.320168][T12779] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 747.328134][T12779] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:23:22 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000003, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:22 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 747.336091][T12779] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 747.344046][T12779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 747.352002][T12779] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:22 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000004, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:22 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000007, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:23 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:23:29 executing program 2 (fault-call:8 fault-nth:9): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:29 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000005, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:29 executing program 3: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x4f, 0x6, 0xee, 0x0, 0xfffffffffffffff8, 0x80, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080)}, 0x10000, 0x80000001, 0x0, 0x3, 0x4, 0x80000001, 0x1000}, 0x0, 0x4, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)='cpu.stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r6, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) perf_event_open(0x0, r5, 0x2, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r7, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 06:23:29 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:29 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000008, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 754.424151][T12844] FAULT_INJECTION: forcing a failure. [ 754.424151][T12844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.454735][T12844] CPU: 1 PID: 12844 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 754.463113][T12844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.473183][T12844] Call Trace: [ 754.476503][T12844] dump_stack+0x197/0x210 [ 754.480866][T12844] should_fail.cold+0xa/0x15 [ 754.485498][T12844] ? fault_create_debugfs_attr+0x180/0x180 [ 754.491327][T12844] ? ___might_sleep+0x163/0x2c0 [ 754.496210][T12844] should_fail_alloc_page+0x50/0x60 [ 754.501434][T12844] __alloc_pages_nodemask+0x1a1/0x910 [ 754.506823][T12844] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 754.512402][T12844] ? __alloc_pages_slowpath+0x2920/0x2920 [ 754.518144][T12844] ? kasan_unpoison_shadow+0x35/0x50 [ 754.523424][T12844] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 754.529656][T12844] alloc_pages_current+0x107/0x210 [ 754.534754][T12844] ? ___might_sleep+0x163/0x2c0 [ 754.539593][T12844] __vmalloc_node_range+0x4f8/0x810 [ 754.544789][T12844] ? bpf_map_area_alloc+0x20/0x30 [ 754.549799][T12844] __vmalloc_node_flags_caller+0x71/0x90 [ 754.555416][T12844] ? bpf_map_area_alloc+0x20/0x30 [ 754.560429][T12844] __bpf_map_area_alloc+0xde/0xf0 [ 754.565442][T12844] bpf_map_area_alloc+0x20/0x30 [ 754.570281][T12844] htab_map_alloc+0x8d3/0x11c0 [ 754.575042][T12844] ? htab_map_update_elem+0xca0/0xca0 [ 754.580402][T12844] __do_sys_bpf+0x478/0x37b0 [ 754.584983][T12844] ? bpf_prog_load+0x18a0/0x18a0 [ 754.589935][T12844] ? __kasan_check_write+0x14/0x20 [ 754.595050][T12844] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 754.600605][T12844] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 754.605890][T12844] ? wait_for_completion+0x440/0x440 [ 754.611176][T12844] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 754.617414][T12844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 754.622868][T12844] ? do_syscall_64+0x26/0x790 [ 754.627536][T12844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.633586][T12844] ? do_syscall_64+0x26/0x790 [ 754.638257][T12844] __x64_sys_bpf+0x73/0xb0 [ 754.642662][T12844] do_syscall_64+0xfa/0x790 [ 754.647156][T12844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.653041][T12844] RIP: 0033:0x45a679 06:23:29 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000006, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 754.656924][T12844] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 754.676514][T12844] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 754.684912][T12844] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 754.692870][T12844] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 754.700826][T12844] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 754.708883][T12844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 754.716841][T12844] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:30 executing program 2 (fault-call:8 fault-nth:10): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:30 executing program 3: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed48, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8922, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81\n?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') gettid() socket$kcm(0xa, 0x3, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000ffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2daa71cf6025488b02040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001405e7bec58d361d53ba9e6d5c9d1cdd0befacfa0e67ec35bb169aa3f3e2675dc6dc5aa3b3557a1b3525b03f57fa45b12518a8426b1411279fdc20561007e09677fec4c00dfe2eb9a7201aa6a224c08a5d562a1dd1e8bcbfd2dbe4709a9f500fd9bd920a"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0x5ee, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f04305000fffff00004000638877fbac141421e9", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x3) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 06:23:30 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000007, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:30 executing program 5 (fault-call:15 fault-nth:0): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:30 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000009, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 755.022631][T12888] FAULT_INJECTION: forcing a failure. [ 755.022631][T12888] name failslab, interval 1, probability 0, space 0, times 0 [ 755.097753][T12888] CPU: 1 PID: 12888 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 755.106125][T12888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.106874][T12896] FAULT_INJECTION: forcing a failure. [ 755.106874][T12896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 755.116186][T12888] Call Trace: [ 755.116211][T12888] dump_stack+0x197/0x210 [ 755.116232][T12888] should_fail.cold+0xa/0x15 [ 755.116251][T12888] ? fault_create_debugfs_attr+0x180/0x180 [ 755.116268][T12888] ? ___might_sleep+0x163/0x2c0 [ 755.116292][T12888] __should_failslab+0x121/0x190 [ 755.147449][T12888] should_failslab+0x9/0x14 [ 755.161684][T12888] kmem_cache_alloc_trace+0x2d3/0x790 [ 755.167077][T12888] htab_map_alloc+0xe3/0x11c0 [ 755.171781][T12888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.178038][T12888] ? htab_map_update_elem+0xca0/0xca0 [ 755.183420][T12888] __do_sys_bpf+0x478/0x37b0 [ 755.188012][T12888] ? bpf_prog_load+0x18a0/0x18a0 [ 755.192958][T12888] ? __kasan_check_write+0x14/0x20 [ 755.198083][T12888] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 755.203627][T12888] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 755.208902][T12888] ? wait_for_completion+0x440/0x440 [ 755.214184][T12888] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 755.220431][T12888] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 755.225887][T12888] ? do_syscall_64+0x26/0x790 [ 755.230556][T12888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.236613][T12888] ? do_syscall_64+0x26/0x790 [ 755.241292][T12888] __x64_sys_bpf+0x73/0xb0 [ 755.245707][T12888] do_syscall_64+0xfa/0x790 [ 755.250205][T12888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.256088][T12888] RIP: 0033:0x45a679 [ 755.259976][T12888] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.279576][T12888] RSP: 002b:00007f0c28546c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 755.287982][T12888] RAX: ffffffffffffffda RBX: 00007f0c28546c90 RCX: 000000000045a679 [ 755.295942][T12888] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 755.303900][T12888] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 755.311890][T12888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c285476d4 [ 755.319853][T12888] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 755.341764][T12896] CPU: 0 PID: 12896 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 755.350138][T12896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.360208][T12896] Call Trace: [ 755.363508][T12896] dump_stack+0x197/0x210 [ 755.367860][T12896] should_fail.cold+0xa/0x15 [ 755.372471][T12896] ? fault_create_debugfs_attr+0x180/0x180 [ 755.378300][T12896] ? ___might_sleep+0x163/0x2c0 [ 755.383181][T12896] should_fail_alloc_page+0x50/0x60 [ 755.388409][T12896] __alloc_pages_nodemask+0x1a1/0x910 [ 755.393798][T12896] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 755.399371][T12896] ? __alloc_pages_slowpath+0x2920/0x2920 [ 755.405113][T12896] ? kasan_unpoison_shadow+0x35/0x50 [ 755.410422][T12896] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 755.416692][T12896] alloc_pages_current+0x107/0x210 [ 755.421823][T12896] ? ___might_sleep+0x163/0x2c0 [ 755.426699][T12896] __vmalloc_node_range+0x4f8/0x810 [ 755.431926][T12896] ? bpf_map_area_alloc+0x20/0x30 [ 755.436971][T12896] __vmalloc_node_flags_caller+0x71/0x90 [ 755.442623][T12896] ? bpf_map_area_alloc+0x20/0x30 [ 755.447669][T12896] __bpf_map_area_alloc+0xde/0xf0 [ 755.452708][T12896] bpf_map_area_alloc+0x20/0x30 [ 755.457576][T12896] htab_map_alloc+0x8d3/0x11c0 [ 755.462368][T12896] ? htab_map_update_elem+0xca0/0xca0 [ 755.467748][T12896] __do_sys_bpf+0x478/0x37b0 [ 755.472332][T12896] ? bpf_prog_load+0x18a0/0x18a0 [ 755.472345][T12896] ? __kasan_check_write+0x14/0x20 [ 755.472359][T12896] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 755.472373][T12896] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 755.472386][T12896] ? wait_for_completion+0x440/0x440 [ 755.472406][T12896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 755.472431][T12896] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 755.510204][T12896] ? do_syscall_64+0x26/0x790 [ 755.514863][T12896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.520923][T12896] ? do_syscall_64+0x26/0x790 [ 755.525660][T12896] __x64_sys_bpf+0x73/0xb0 [ 755.530059][T12896] do_syscall_64+0xfa/0x790 [ 755.534548][T12896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.540416][T12896] RIP: 0033:0x45a679 [ 755.544392][T12896] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.563990][T12896] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 755.572380][T12896] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 755.580330][T12896] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 755.588276][T12896] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 755.596229][T12896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 755.604182][T12896] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair(0x9, 0x6, 0x89, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 06:23:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000008, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x80802, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(r2, 0x0, 0x2, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x63, 0xa, [@datasec={0x1, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xfffffff7, 0x2}], 'CC'}, @datasec={0x5, 0x5, 0x0, 0xf, 0x1, [{0x4, 0x7, 0x7f}, {0x1, 0xfffffff7, 0x9}, {0x1, 0xfffffffc, 0x3b84da31}, {0x5, 0x4, 0xfffffff8}, {0x5, 0x100, 0xffffff81}], '|'}]}, {0x0, [0x5f, 0x30, 0x5f, 0x0, 0x30, 0x60, 0x0, 0x2e]}}, &(0x7f0000000100)=""/43, 0x86, 0x2b}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0xf0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x29, 0x7, 0x0, 0x111) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}) 06:23:39 executing program 5 (fault-call:15 fault-nth:1): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:39 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000a, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:39 executing program 2 (fault-call:8 fault-nth:11): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 763.703704][T12918] FAULT_INJECTION: forcing a failure. [ 763.703704][T12918] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 763.733844][T12928] FAULT_INJECTION: forcing a failure. [ 763.733844][T12928] name failslab, interval 1, probability 0, space 0, times 0 [ 763.734160][T12918] CPU: 0 PID: 12918 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 763.754871][T12918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.764940][T12918] Call Trace: [ 763.768249][T12918] dump_stack+0x197/0x210 [ 763.772611][T12918] should_fail.cold+0xa/0x15 [ 763.777227][T12918] ? fault_create_debugfs_attr+0x180/0x180 [ 763.783055][T12918] ? ___might_sleep+0x163/0x2c0 [ 763.787924][T12918] should_fail_alloc_page+0x50/0x60 [ 763.793172][T12918] __alloc_pages_nodemask+0x1a1/0x910 [ 763.798575][T12918] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 763.804149][T12918] ? __alloc_pages_slowpath+0x2920/0x2920 [ 763.809899][T12918] ? kasan_unpoison_shadow+0x35/0x50 [ 763.815211][T12918] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 763.821469][T12918] alloc_pages_current+0x107/0x210 [ 763.826593][T12918] ? ___might_sleep+0x163/0x2c0 [ 763.831467][T12918] __vmalloc_node_range+0x4f8/0x810 [ 763.836685][T12918] ? bpf_map_area_alloc+0x20/0x30 [ 763.841731][T12918] __vmalloc_node_flags_caller+0x71/0x90 [ 763.847360][T12918] ? bpf_map_area_alloc+0x20/0x30 [ 763.852382][T12918] __bpf_map_area_alloc+0xde/0xf0 [ 763.857402][T12918] bpf_map_area_alloc+0x20/0x30 [ 763.862244][T12918] htab_map_alloc+0x8d3/0x11c0 [ 763.867002][T12918] ? htab_map_update_elem+0xca0/0xca0 [ 763.872361][T12918] __do_sys_bpf+0x478/0x37b0 [ 763.876940][T12918] ? bpf_prog_load+0x18a0/0x18a0 [ 763.881873][T12918] ? __kasan_check_write+0x14/0x20 [ 763.886989][T12918] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 763.892525][T12918] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 763.897817][T12918] ? wait_for_completion+0x440/0x440 [ 763.903096][T12918] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.909328][T12918] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 763.914771][T12918] ? do_syscall_64+0x26/0x790 [ 763.919433][T12918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.925516][T12918] ? do_syscall_64+0x26/0x790 [ 763.930212][T12918] __x64_sys_bpf+0x73/0xb0 [ 763.934620][T12918] do_syscall_64+0xfa/0x790 [ 763.939115][T12918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.944993][T12918] RIP: 0033:0x45a679 [ 763.948878][T12918] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.968464][T12918] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 763.976858][T12918] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 763.984813][T12918] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 763.992769][T12918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 764.000724][T12918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 764.008679][T12918] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 764.016659][T12928] CPU: 1 PID: 12928 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 764.025005][T12928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.035077][T12928] Call Trace: [ 764.038366][T12928] dump_stack+0x197/0x210 [ 764.038389][T12928] should_fail.cold+0xa/0x15 [ 764.038411][T12928] ? fault_create_debugfs_attr+0x180/0x180 [ 764.053108][T12928] ? ___might_sleep+0x163/0x2c0 [ 764.057973][T12928] __should_failslab+0x121/0x190 [ 764.057990][T12928] should_failslab+0x9/0x14 [ 764.058013][T12928] kmem_cache_alloc_node_trace+0x274/0x750 [ 764.073243][T12928] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 764.078798][T12928] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 764.078812][T12928] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 764.078832][T12928] __kmalloc_node+0x3d/0x70 [ 764.078850][T12928] __bpf_map_area_alloc+0xbd/0xf0 [ 764.078864][T12928] bpf_map_area_alloc+0x20/0x30 06:23:39 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000b, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000009, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 764.078884][T12928] htab_map_alloc+0x589/0x11c0 [ 764.100163][T12928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.100179][T12928] ? htab_map_update_elem+0xca0/0xca0 [ 764.100195][T12928] __do_sys_bpf+0x478/0x37b0 [ 764.100212][T12928] ? bpf_prog_load+0x18a0/0x18a0 [ 764.100226][T12928] ? __kasan_check_write+0x14/0x20 [ 764.100239][T12928] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 764.100258][T12928] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 764.109864][T12928] ? wait_for_completion+0x440/0x440 [ 764.109887][T12928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 764.109914][T12928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 764.109929][T12928] ? do_syscall_64+0x26/0x790 [ 764.109943][T12928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.109955][T12928] ? do_syscall_64+0x26/0x790 [ 764.109972][T12928] __x64_sys_bpf+0x73/0xb0 [ 764.109993][T12928] do_syscall_64+0xfa/0x790 [ 764.121601][T12928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.121614][T12928] RIP: 0033:0x45a679 [ 764.121628][T12928] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.121635][T12928] RSP: 002b:00007f0c28546c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 764.121648][T12928] RAX: ffffffffffffffda RBX: 00007f0c28546c90 RCX: 000000000045a679 [ 764.121657][T12928] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 764.121665][T12928] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 764.121672][T12928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c285476d4 [ 764.121679][T12928] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000a, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:39 executing program 2 (fault-call:8 fault-nth:12): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:39 executing program 5 (fault-call:15 fault-nth:2): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 764.539958][T12964] FAULT_INJECTION: forcing a failure. [ 764.539958][T12964] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 764.585875][T12964] CPU: 1 PID: 12964 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 764.594258][T12964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.604328][T12964] Call Trace: [ 764.604356][T12964] dump_stack+0x197/0x210 [ 764.604377][T12964] should_fail.cold+0xa/0x15 [ 764.604396][T12964] ? fault_create_debugfs_attr+0x180/0x180 [ 764.604411][T12964] ? ___might_sleep+0x163/0x2c0 [ 764.604436][T12964] should_fail_alloc_page+0x50/0x60 [ 764.604452][T12964] __alloc_pages_nodemask+0x1a1/0x910 [ 764.604466][T12964] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 764.604482][T12964] ? __alloc_pages_slowpath+0x2920/0x2920 [ 764.604509][T12964] ? kasan_unpoison_shadow+0x35/0x50 [ 764.643766][T12964] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 764.643787][T12964] alloc_pages_current+0x107/0x210 [ 764.643799][T12964] ? ___might_sleep+0x163/0x2c0 [ 764.643820][T12964] __vmalloc_node_range+0x4f8/0x810 [ 764.671198][T12964] ? bpf_map_area_alloc+0x20/0x30 06:23:40 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000c, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 764.671217][T12964] __vmalloc_node_flags_caller+0x71/0x90 [ 764.671232][T12964] ? bpf_map_area_alloc+0x20/0x30 [ 764.671245][T12964] __bpf_map_area_alloc+0xde/0xf0 [ 764.671260][T12964] bpf_map_area_alloc+0x20/0x30 [ 764.671273][T12964] htab_map_alloc+0x8d3/0x11c0 [ 764.671295][T12964] ? htab_map_update_elem+0xca0/0xca0 [ 764.671309][T12964] __do_sys_bpf+0x478/0x37b0 [ 764.671328][T12964] ? bpf_prog_load+0x18a0/0x18a0 [ 764.671342][T12964] ? __kasan_check_write+0x14/0x20 [ 764.671357][T12964] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 764.671379][T12964] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 764.687340][T12964] ? wait_for_completion+0x440/0x440 [ 764.687363][T12964] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 764.687387][T12964] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 764.687411][T12964] ? do_syscall_64+0x26/0x790 [ 764.760015][T12964] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.766107][T12964] ? do_syscall_64+0x26/0x790 [ 764.770814][T12964] __x64_sys_bpf+0x73/0xb0 [ 764.775252][T12964] do_syscall_64+0xfa/0x790 [ 764.779774][T12964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.785675][T12964] RIP: 0033:0x45a679 [ 764.789581][T12964] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.809196][T12964] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 764.817627][T12964] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 764.825612][T12964] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 764.833606][T12964] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 764.841732][T12964] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 764.849721][T12964] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 764.867300][T12984] FAULT_INJECTION: forcing a failure. [ 764.867300][T12984] name failslab, interval 1, probability 0, space 0, times 0 [ 764.887129][T12984] CPU: 1 PID: 12984 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 764.895631][T12984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.905737][T12984] Call Trace: [ 764.909063][T12984] dump_stack+0x197/0x210 [ 764.913428][T12984] should_fail.cold+0xa/0x15 [ 764.918044][T12984] ? fault_create_debugfs_attr+0x180/0x180 [ 764.923874][T12984] ? ___might_sleep+0x163/0x2c0 [ 764.928754][T12984] __should_failslab+0x121/0x190 [ 764.936842][T12984] should_failslab+0x9/0x14 [ 764.941369][T12984] kmem_cache_alloc_node_trace+0x274/0x750 [ 764.947216][T12984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.953447][T12984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.959677][T12984] ? debug_smp_processor_id+0x33/0x18a [ 764.965125][T12984] __get_vm_area_node+0x12b/0x4f0 [ 764.970135][T12984] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 764.975669][T12984] __vmalloc_node_range+0xd4/0x810 [ 764.980900][T12984] ? bpf_map_area_alloc+0x20/0x30 [ 764.985928][T12984] ? kasan_unpoison_shadow+0x35/0x50 [ 764.991320][T12984] ? bpf_map_area_alloc+0x20/0x30 [ 764.996343][T12984] __vmalloc_node_flags_caller+0x71/0x90 [ 765.001967][T12984] ? bpf_map_area_alloc+0x20/0x30 [ 765.006978][T12984] __bpf_map_area_alloc+0xde/0xf0 [ 765.011987][T12984] bpf_map_area_alloc+0x20/0x30 [ 765.016829][T12984] htab_map_alloc+0x8d3/0x11c0 [ 765.021599][T12984] ? htab_map_update_elem+0xca0/0xca0 [ 765.026956][T12984] __do_sys_bpf+0x478/0x37b0 [ 765.031537][T12984] ? bpf_prog_load+0x18a0/0x18a0 [ 765.036459][T12984] ? __kasan_check_write+0x14/0x20 [ 765.041556][T12984] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 765.047138][T12984] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 765.052419][T12984] ? wait_for_completion+0x440/0x440 [ 765.057750][T12984] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 765.063986][T12984] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 765.069429][T12984] ? do_syscall_64+0x26/0x790 [ 765.074091][T12984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.080141][T12984] ? do_syscall_64+0x26/0x790 [ 765.084805][T12984] __x64_sys_bpf+0x73/0xb0 [ 765.089221][T12984] do_syscall_64+0xfa/0x790 [ 765.093730][T12984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.099626][T12984] RIP: 0033:0x45a679 [ 765.103512][T12984] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.123099][T12984] RSP: 002b:00007f0c28546c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 765.131494][T12984] RAX: ffffffffffffffda RBX: 00007f0c28546c90 RCX: 000000000045a679 [ 765.139460][T12984] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 765.147425][T12984] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 765.155391][T12984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c285476d4 [ 765.163352][T12984] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000b, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:50 executing program 2 (fault-call:8 fault-nth:13): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000d, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:50 executing program 5 (fault-call:15 fault-nth:3): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) 06:23:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x84) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1019c0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000080)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x0, 0x0, 0xffffff7f}, 0x4d, 0x0}, 0x0) 06:23:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000c, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 774.999885][T12999] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! [ 775.017806][T13006] FAULT_INJECTION: forcing a failure. [ 775.017806][T13006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 775.056352][T13006] CPU: 1 PID: 13006 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 775.064728][T13006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.074800][T13006] Call Trace: [ 775.078111][T13006] dump_stack+0x197/0x210 [ 775.082487][T13006] should_fail.cold+0xa/0x15 [ 775.087122][T13006] ? fault_create_debugfs_attr+0x180/0x180 [ 775.092949][T13006] ? ___might_sleep+0x163/0x2c0 [ 775.097833][T13006] should_fail_alloc_page+0x50/0x60 06:23:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000d, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 775.103057][T13006] __alloc_pages_nodemask+0x1a1/0x910 [ 775.108442][T13006] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 775.114005][T13006] ? __alloc_pages_slowpath+0x2920/0x2920 [ 775.119752][T13006] ? kasan_unpoison_shadow+0x35/0x50 [ 775.125059][T13006] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 775.131323][T13006] alloc_pages_current+0x107/0x210 [ 775.136451][T13006] ? ___might_sleep+0x163/0x2c0 [ 775.141325][T13006] __vmalloc_node_range+0x4f8/0x810 [ 775.146548][T13006] ? bpf_map_area_alloc+0x20/0x30 06:23:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000e, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 775.151591][T13006] __vmalloc_node_flags_caller+0x71/0x90 [ 775.157249][T13006] ? bpf_map_area_alloc+0x20/0x30 [ 775.162296][T13006] __bpf_map_area_alloc+0xde/0xf0 [ 775.167338][T13006] bpf_map_area_alloc+0x20/0x30 [ 775.172209][T13006] htab_map_alloc+0x8d3/0x11c0 [ 775.177127][T13006] ? htab_map_update_elem+0xca0/0xca0 [ 775.182544][T13006] __do_sys_bpf+0x478/0x37b0 [ 775.187163][T13006] ? bpf_prog_load+0x18a0/0x18a0 [ 775.192124][T13006] ? __kasan_check_write+0x14/0x20 [ 775.197258][T13006] ? __mutex_unlock_slowpath+0xf0/0x6a0 06:23:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000e, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 775.202837][T13006] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 775.208153][T13006] ? wait_for_completion+0x440/0x440 [ 775.213465][T13006] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 775.219740][T13006] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.225218][T13006] ? do_syscall_64+0x26/0x790 [ 775.229916][T13006] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.236003][T13006] ? do_syscall_64+0x26/0x790 [ 775.240712][T13006] __x64_sys_bpf+0x73/0xb0 [ 775.245153][T13006] do_syscall_64+0xfa/0x790 [ 775.249679][T13006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.255590][T13006] RIP: 0033:0x45a679 [ 775.259497][T13006] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.279114][T13006] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 775.287543][T13006] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 775.295533][T13006] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:23:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000f, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 775.303520][T13006] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 775.311504][T13006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 775.319486][T13006] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 775.344588][T13038] FAULT_INJECTION: forcing a failure. [ 775.344588][T13038] name failslab, interval 1, probability 0, space 0, times 0 [ 775.381336][T13038] CPU: 1 PID: 13038 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 775.389715][T13038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.399783][T13038] Call Trace: [ 775.403091][T13038] dump_stack+0x197/0x210 [ 775.407445][T13038] should_fail.cold+0xa/0x15 [ 775.412110][T13038] ? fault_create_debugfs_attr+0x180/0x180 [ 775.417940][T13038] ? ___might_sleep+0x163/0x2c0 [ 775.422810][T13038] __should_failslab+0x121/0x190 06:23:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000f, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000010, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 775.427771][T13038] should_failslab+0x9/0x14 [ 775.432300][T13038] kmem_cache_alloc_node_trace+0x274/0x750 [ 775.438126][T13038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.444388][T13038] ? debug_smp_processor_id+0x33/0x18a [ 775.449875][T13038] __get_vm_area_node+0x12b/0x4f0 [ 775.454915][T13038] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 775.460482][T13038] __vmalloc_node_range+0xd4/0x810 [ 775.465609][T13038] ? bpf_map_area_alloc+0x20/0x30 [ 775.470650][T13038] ? kasan_unpoison_shadow+0x35/0x50 [ 775.475959][T13038] ? bpf_map_area_alloc+0x20/0x30 [ 775.481005][T13038] __vmalloc_node_flags_caller+0x71/0x90 [ 775.486664][T13038] ? bpf_map_area_alloc+0x20/0x30 [ 775.491719][T13038] __bpf_map_area_alloc+0xde/0xf0 [ 775.496764][T13038] bpf_map_area_alloc+0x20/0x30 [ 775.501632][T13038] htab_map_alloc+0x8d3/0x11c0 [ 775.506429][T13038] ? htab_map_update_elem+0xca0/0xca0 [ 775.511822][T13038] __do_sys_bpf+0x478/0x37b0 [ 775.516438][T13038] ? bpf_prog_load+0x18a0/0x18a0 [ 775.521389][T13038] ? __kasan_check_write+0x14/0x20 [ 775.526527][T13038] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 775.532096][T13038] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 775.537407][T13038] ? wait_for_completion+0x440/0x440 [ 775.542727][T13038] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 775.549002][T13038] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.554481][T13038] ? do_syscall_64+0x26/0x790 [ 775.559181][T13038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.565270][T13038] ? do_syscall_64+0x26/0x790 [ 775.569973][T13038] __x64_sys_bpf+0x73/0xb0 [ 775.574412][T13038] do_syscall_64+0xfa/0x790 [ 775.578942][T13038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.584853][T13038] RIP: 0033:0x45a679 [ 775.588763][T13038] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.608375][T13038] RSP: 002b:00007f0c28546c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 775.616800][T13038] RAX: ffffffffffffffda RBX: 00007f0c28546c90 RCX: 000000000045a679 [ 775.624777][T13038] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:23:51 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000011, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:51 executing program 2 (fault-call:8 fault-nth:14): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 775.624787][T13038] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 775.624796][T13038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c285476d4 [ 775.624804][T13038] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 775.695293][T13064] FAULT_INJECTION: forcing a failure. [ 775.695293][T13064] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 775.717244][T13064] CPU: 0 PID: 13064 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 775.725607][T13064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.725614][T13064] Call Trace: [ 775.725635][T13064] dump_stack+0x197/0x210 [ 775.725661][T13064] should_fail.cold+0xa/0x15 [ 775.748001][T13064] ? fault_create_debugfs_attr+0x180/0x180 [ 775.753822][T13064] ? ___might_sleep+0x163/0x2c0 [ 775.758683][T13064] should_fail_alloc_page+0x50/0x60 [ 775.758697][T13064] __alloc_pages_nodemask+0x1a1/0x910 [ 775.758713][T13064] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 775.758728][T13064] ? __alloc_pages_slowpath+0x2920/0x2920 [ 775.758748][T13064] ? kasan_unpoison_shadow+0x35/0x50 [ 775.758770][T13064] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 775.758786][T13064] alloc_pages_current+0x107/0x210 [ 775.758797][T13064] ? ___might_sleep+0x163/0x2c0 [ 775.758812][T13064] __vmalloc_node_range+0x4f8/0x810 [ 775.758834][T13064] ? bpf_map_area_alloc+0x20/0x30 [ 775.758852][T13064] __vmalloc_node_flags_caller+0x71/0x90 [ 775.774941][T13064] ? bpf_map_area_alloc+0x20/0x30 [ 775.797238][T13064] __bpf_map_area_alloc+0xde/0xf0 [ 775.817907][T13064] bpf_map_area_alloc+0x20/0x30 [ 775.817924][T13064] htab_map_alloc+0x8d3/0x11c0 [ 775.817949][T13064] ? htab_map_update_elem+0xca0/0xca0 [ 775.842947][T13064] __do_sys_bpf+0x478/0x37b0 [ 775.847549][T13064] ? bpf_prog_load+0x18a0/0x18a0 [ 775.852509][T13064] ? __kasan_check_write+0x14/0x20 [ 775.857638][T13064] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 775.863210][T13064] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 775.868514][T13064] ? wait_for_completion+0x440/0x440 [ 775.873819][T13064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 775.880086][T13064] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.885558][T13064] ? do_syscall_64+0x26/0x790 [ 775.890254][T13064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.896343][T13064] ? do_syscall_64+0x26/0x790 [ 775.901036][T13064] __x64_sys_bpf+0x73/0xb0 [ 775.905474][T13064] do_syscall_64+0xfa/0x790 [ 775.910003][T13064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.915905][T13064] RIP: 0033:0x45a679 [ 775.919814][T13064] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:23:51 executing program 5 (fault-call:15 fault-nth:4): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 775.939603][T13064] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 775.948031][T13064] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 775.956018][T13064] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 775.964005][T13064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 775.971995][T13064] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 775.979988][T13064] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 776.047170][T13072] FAULT_INJECTION: forcing a failure. [ 776.047170][T13072] name failslab, interval 1, probability 0, space 0, times 0 [ 776.084395][T13072] CPU: 0 PID: 13072 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 776.092773][T13072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.102841][T13072] Call Trace: [ 776.106136][T13072] dump_stack+0x197/0x210 [ 776.110470][T13072] should_fail.cold+0xa/0x15 [ 776.115144][T13072] ? fault_create_debugfs_attr+0x180/0x180 [ 776.120951][T13072] ? ___might_sleep+0x163/0x2c0 [ 776.125799][T13072] __should_failslab+0x121/0x190 [ 776.130724][T13072] should_failslab+0x9/0x14 [ 776.135225][T13072] kmem_cache_alloc_node_trace+0x274/0x750 [ 776.141025][T13072] ? do_raw_spin_unlock+0x178/0x270 [ 776.146216][T13072] __kmalloc_node+0x3d/0x70 [ 776.150702][T13072] __vmalloc_node_range+0x1db/0x810 [ 776.155885][T13072] ? bpf_map_area_alloc+0x20/0x30 [ 776.160905][T13072] __vmalloc_node_flags_caller+0x71/0x90 [ 776.166528][T13072] ? bpf_map_area_alloc+0x20/0x30 [ 776.171533][T13072] __bpf_map_area_alloc+0xde/0xf0 [ 776.176537][T13072] bpf_map_area_alloc+0x20/0x30 [ 776.181411][T13072] htab_map_alloc+0x8d3/0x11c0 [ 776.186171][T13072] ? htab_map_update_elem+0xca0/0xca0 [ 776.191524][T13072] __do_sys_bpf+0x478/0x37b0 [ 776.196095][T13072] ? bpf_prog_load+0x18a0/0x18a0 [ 776.201024][T13072] ? __kasan_check_write+0x14/0x20 [ 776.206129][T13072] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 776.211682][T13072] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 776.216949][T13072] ? wait_for_completion+0x440/0x440 [ 776.222231][T13072] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 776.228489][T13072] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 776.233938][T13072] ? do_syscall_64+0x26/0x790 [ 776.238610][T13072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.244667][T13072] ? do_syscall_64+0x26/0x790 [ 776.249356][T13072] __x64_sys_bpf+0x73/0xb0 [ 776.253775][T13072] do_syscall_64+0xfa/0x790 [ 776.258279][T13072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.264155][T13072] RIP: 0033:0x45a679 [ 776.268132][T13072] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 776.287735][T13072] RSP: 002b:00007f0c28567c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 776.296138][T13072] RAX: ffffffffffffffda RBX: 00007f0c28567c90 RCX: 000000000045a679 [ 776.304094][T13072] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 776.312045][T13072] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 776.320008][T13072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c285686d4 [ 776.327971][T13072] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:23:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r1, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000002100020000020000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000100)={r1, r3}) recvmsg(r4, &(0x7f00000023c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r4, &(0x7f0000000580)={0x0, 0x113, &(0x7f0000000200)=[{&(0x7f0000000140)="b1ccea18de2b2cebd9e3c888760babe2111fac8be617734360af4358a5d134453a9bfadedcfab813e2723e85d858d32eed84892adb7e4aca67f3d60cb2d5621babe80cc1e8f18cffd1b405220ff8324f890bf2b8e39de186152b3ea6edad73dc856d00492c6ce0722fbadd62342afb7223cc63093ac224f3fd924518c1896e1b3eb6cfb33bc1e00280"}]}, 0x0) 06:23:59 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000010, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:23:59 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000012, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:59 executing program 2 (fault-call:8 fault-nth:15): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:23:59 executing program 5 (fault-call:15 fault-nth:5): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 784.390505][T13091] FAULT_INJECTION: forcing a failure. [ 784.390505][T13091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 784.418547][T13091] CPU: 1 PID: 13091 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 784.426923][T13091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.436995][T13091] Call Trace: [ 784.440312][T13091] dump_stack+0x197/0x210 [ 784.441821][T13099] FAULT_INJECTION: forcing a failure. [ 784.441821][T13099] name failslab, interval 1, probability 0, space 0, times 0 [ 784.444666][T13091] should_fail.cold+0xa/0x15 [ 784.461827][T13091] ? fault_create_debugfs_attr+0x180/0x180 [ 784.467653][T13091] ? ___might_sleep+0x163/0x2c0 [ 784.472530][T13091] should_fail_alloc_page+0x50/0x60 [ 784.477743][T13091] __alloc_pages_nodemask+0x1a1/0x910 [ 784.483135][T13091] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 784.488705][T13091] ? __alloc_pages_slowpath+0x2920/0x2920 [ 784.494456][T13091] ? kasan_unpoison_shadow+0x35/0x50 [ 784.499769][T13091] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 784.506158][T13091] alloc_pages_current+0x107/0x210 [ 784.511304][T13091] ? ___might_sleep+0x163/0x2c0 [ 784.516177][T13091] __vmalloc_node_range+0x4f8/0x810 [ 784.521405][T13091] ? bpf_map_area_alloc+0x20/0x30 [ 784.526442][T13091] __vmalloc_node_flags_caller+0x71/0x90 [ 784.532086][T13091] ? bpf_map_area_alloc+0x20/0x30 [ 784.537138][T13091] __bpf_map_area_alloc+0xde/0xf0 [ 784.542187][T13091] bpf_map_area_alloc+0x20/0x30 [ 784.547052][T13091] htab_map_alloc+0x8d3/0x11c0 [ 784.551827][T13091] ? htab_map_update_elem+0xca0/0xca0 [ 784.557210][T13091] __do_sys_bpf+0x478/0x37b0 [ 784.561825][T13091] ? bpf_prog_load+0x18a0/0x18a0 [ 784.566782][T13091] ? __kasan_check_write+0x14/0x20 [ 784.571907][T13091] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 784.577477][T13091] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 784.582791][T13091] ? wait_for_completion+0x440/0x440 [ 784.588110][T13091] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 784.594374][T13091] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 784.599854][T13091] ? do_syscall_64+0x26/0x790 [ 784.604563][T13091] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.610653][T13091] ? do_syscall_64+0x26/0x790 [ 784.615348][T13091] __x64_sys_bpf+0x73/0xb0 [ 784.619792][T13091] do_syscall_64+0xfa/0x790 [ 784.624317][T13091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.630230][T13091] RIP: 0033:0x45a679 [ 784.634149][T13091] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.653886][T13091] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 784.662295][T13091] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 784.670262][T13091] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 784.670270][T13091] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 06:24:00 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000011, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000013, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 784.670277][T13091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 784.670284][T13091] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 784.697010][T13099] CPU: 1 PID: 13099 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 784.710917][T13099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.720990][T13099] Call Trace: [ 784.724302][T13099] dump_stack+0x197/0x210 [ 784.728664][T13099] should_fail.cold+0xa/0x15 [ 784.733276][T13099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.739535][T13099] ? fault_create_debugfs_attr+0x180/0x180 [ 784.745360][T13099] ? ___might_sleep+0x163/0x2c0 [ 784.750239][T13099] __should_failslab+0x121/0x190 [ 784.755192][T13099] should_failslab+0x9/0x14 [ 784.759712][T13099] kmem_cache_alloc_node+0x268/0x740 [ 784.765013][T13099] ? ___might_sleep+0x163/0x2c0 [ 784.769888][T13099] alloc_vmap_area+0xc8d/0x2030 [ 784.774757][T13099] ? __get_vm_area_node+0x12b/0x4f0 [ 784.779969][T13099] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 784.785544][T13099] ? purge_vmap_area_lazy+0x40/0x40 [ 784.790768][T13099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.797031][T13099] ? debug_smp_processor_id+0x33/0x18a [ 784.802522][T13099] __get_vm_area_node+0x179/0x4f0 [ 784.807713][T13099] __vmalloc_node_range+0xd4/0x810 [ 784.812849][T13099] ? bpf_map_area_alloc+0x20/0x30 [ 784.817895][T13099] ? kasan_unpoison_shadow+0x35/0x50 [ 784.823206][T13099] ? bpf_map_area_alloc+0x20/0x30 [ 784.828252][T13099] __vmalloc_node_flags_caller+0x71/0x90 [ 784.833910][T13099] ? bpf_map_area_alloc+0x20/0x30 06:24:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000014, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 784.838964][T13099] __bpf_map_area_alloc+0xde/0xf0 [ 784.844007][T13099] bpf_map_area_alloc+0x20/0x30 [ 784.848859][T13099] htab_map_alloc+0x8d3/0x11c0 [ 784.848886][T13099] ? htab_map_update_elem+0xca0/0xca0 [ 784.848903][T13099] __do_sys_bpf+0x478/0x37b0 [ 784.848922][T13099] ? bpf_prog_load+0x18a0/0x18a0 [ 784.848937][T13099] ? __kasan_check_write+0x14/0x20 [ 784.848951][T13099] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 784.848966][T13099] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 784.848981][T13099] ? wait_for_completion+0x440/0x440 [ 784.849001][T13099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 784.849027][T13099] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 784.849041][T13099] ? do_syscall_64+0x26/0x790 [ 784.849055][T13099] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.849072][T13099] ? do_syscall_64+0x26/0x790 [ 784.879670][T13099] __x64_sys_bpf+0x73/0xb0 [ 784.879692][T13099] do_syscall_64+0xfa/0x790 [ 784.879720][T13099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.879737][T13099] RIP: 0033:0x45a679 [ 784.917368][T13099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.917377][T13099] RSP: 002b:00007f0c28546c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 784.917392][T13099] RAX: ffffffffffffffda RBX: 00007f0c28546c90 RCX: 000000000045a679 [ 784.917401][T13099] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 784.917410][T13099] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 06:24:00 executing program 2 (fault-call:8 fault-nth:16): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 784.917419][T13099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0c285476d4 [ 784.917428][T13099] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:24:00 executing program 5 (fault-call:15 fault-nth:6): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 785.036447][T13127] FAULT_INJECTION: forcing a failure. [ 785.036447][T13127] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 785.079839][T13127] CPU: 1 PID: 13127 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 785.088376][T13127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.098442][T13127] Call Trace: [ 785.101744][T13127] dump_stack+0x197/0x210 [ 785.106093][T13127] should_fail.cold+0xa/0x15 [ 785.110805][T13127] ? fault_create_debugfs_attr+0x180/0x180 [ 785.116708][T13127] ? ___might_sleep+0x163/0x2c0 [ 785.121596][T13127] should_fail_alloc_page+0x50/0x60 06:24:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000015, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 785.121613][T13127] __alloc_pages_nodemask+0x1a1/0x910 [ 785.121628][T13127] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 785.121646][T13127] ? __alloc_pages_slowpath+0x2920/0x2920 [ 785.121663][T13127] ? kasan_unpoison_shadow+0x35/0x50 [ 785.121680][T13127] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 785.121704][T13127] alloc_pages_current+0x107/0x210 [ 785.121716][T13127] ? ___might_sleep+0x163/0x2c0 [ 785.121733][T13127] __vmalloc_node_range+0x4f8/0x810 [ 785.121756][T13127] ? bpf_map_area_alloc+0x20/0x30 [ 785.143624][T13127] __vmalloc_node_flags_caller+0x71/0x90 [ 785.143640][T13127] ? bpf_map_area_alloc+0x20/0x30 [ 785.143657][T13127] __bpf_map_area_alloc+0xde/0xf0 [ 785.160263][T13127] bpf_map_area_alloc+0x20/0x30 [ 785.160279][T13127] htab_map_alloc+0x8d3/0x11c0 [ 785.160304][T13127] ? htab_map_update_elem+0xca0/0xca0 [ 785.160319][T13127] __do_sys_bpf+0x478/0x37b0 [ 785.160336][T13127] ? bpf_prog_load+0x18a0/0x18a0 [ 785.160350][T13127] ? __kasan_check_write+0x14/0x20 [ 785.160365][T13127] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 785.160377][T13127] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 785.160390][T13127] ? wait_for_completion+0x440/0x440 [ 785.160411][T13127] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 785.160435][T13127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 785.160453][T13127] ? do_syscall_64+0x26/0x790 [ 785.200712][T13127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.200728][T13127] ? do_syscall_64+0x26/0x790 [ 785.200761][T13127] __x64_sys_bpf+0x73/0xb0 [ 785.200777][T13127] do_syscall_64+0xfa/0x790 [ 785.200793][T13127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.200804][T13127] RIP: 0033:0x45a679 [ 785.200820][T13127] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.200828][T13127] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 785.200840][T13127] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 785.200847][T13127] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 785.200860][T13127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 785.334749][T13127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 785.342735][T13127] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:24:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) r1 = gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x91fc, 0x5, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x6, 0x0, 0xfd, 0x0, 0x5, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x0, 0x4, 0x1, 0x7, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x7fffffff, 0x1}, r1, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:24:00 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000012, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0xf, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x7, 0x0, 0x9, 0x5, 0x0, 0x1, 0x100, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x400f3703, 0x2, @perf_bp={&(0x7f00000003c0), 0x4}, 0x18008, 0x1, 0x3ff, 0x3, 0xff, 0x40000000, 0x1}, 0xffffffffffffffff, 0xf, r0, 0x1) r3 = getpid() perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1fffffe}}, r3, 0x1, r2, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x60f9f8ce, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x5, 0x2}, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x1, 0x8, 0x7f}, &(0x7f0000000240)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x7fffffff}}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) 06:24:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:10 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000016, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:10 executing program 2 (fault-call:8 fault-nth:17): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:10 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000013, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:10 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r0) close(r1) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, 0x0, 0x0) close(r0) [ 794.796727][T13174] FAULT_INJECTION: forcing a failure. [ 794.796727][T13174] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 794.816083][T13174] CPU: 1 PID: 13174 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 794.824453][T13174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.834517][T13174] Call Trace: [ 794.837825][T13174] dump_stack+0x197/0x210 [ 794.842183][T13174] should_fail.cold+0xa/0x15 [ 794.846799][T13174] ? fault_create_debugfs_attr+0x180/0x180 [ 794.852641][T13174] ? ___might_sleep+0x163/0x2c0 [ 794.857524][T13174] should_fail_alloc_page+0x50/0x60 [ 794.862752][T13174] __alloc_pages_nodemask+0x1a1/0x910 [ 794.868336][T13174] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 794.873958][T13174] ? __alloc_pages_slowpath+0x2920/0x2920 [ 794.879705][T13174] ? kasan_unpoison_shadow+0x35/0x50 [ 794.885090][T13174] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 794.891374][T13174] alloc_pages_current+0x107/0x210 [ 794.896604][T13174] ? ___might_sleep+0x163/0x2c0 [ 794.901469][T13174] __vmalloc_node_range+0x4f8/0x810 [ 794.906688][T13174] ? bpf_map_area_alloc+0x20/0x30 [ 794.911734][T13174] __vmalloc_node_flags_caller+0x71/0x90 [ 794.917377][T13174] ? bpf_map_area_alloc+0x20/0x30 [ 794.922402][T13174] __bpf_map_area_alloc+0xde/0xf0 [ 794.922418][T13174] bpf_map_area_alloc+0x20/0x30 [ 794.922433][T13174] htab_map_alloc+0x8d3/0x11c0 [ 794.922459][T13174] ? htab_map_update_elem+0xca0/0xca0 [ 794.922473][T13174] __do_sys_bpf+0x478/0x37b0 [ 794.922496][T13174] ? bpf_prog_load+0x18a0/0x18a0 [ 794.942455][T13174] ? __kasan_check_write+0x14/0x20 [ 794.942473][T13174] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 794.942492][T13174] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 794.967921][T13174] ? wait_for_completion+0x440/0x440 [ 794.973231][T13174] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 794.979503][T13174] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 794.984986][T13174] ? do_syscall_64+0x26/0x790 [ 794.989688][T13174] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.995771][T13174] ? do_syscall_64+0x26/0x790 [ 795.000467][T13174] __x64_sys_bpf+0x73/0xb0 [ 795.004911][T13174] do_syscall_64+0xfa/0x790 [ 795.009440][T13174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.015345][T13174] RIP: 0033:0x45a679 [ 795.019250][T13174] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 795.038855][T13174] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 06:24:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xff0b}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="0000003f0000007e5bc5795eca0000080000000000000000ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0xfffffffffffffe05, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 06:24:10 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000017, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x70020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 795.038869][T13174] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 795.038877][T13174] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 795.038884][T13174] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 795.038891][T13174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 795.038924][T13174] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:24:10 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000014, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="0000003f0000007e5bc5795ecaffff81000000000000003fffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 06:24:10 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000018, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xa2, 0x30, &(0x7f0000000300)="2e1c16f8868021bc13fe4cfc4c1ec92cd9bc36bab440b57a60b478463d67cc12518809c075f6957f3f26595e1387e94dcd692ab75474776fd7744b6fd13ea3b8f6360326ea0ccf7dcef5f927b46c1345f330856d56914a61b63bda51a6b8e0d5cbb43b8429714a5574a3c3438722a5c3429188d2a7600f34c6db51167adab89943af1ef982553c821d09e33dad77111665cb05d5dd284eb154dee5679814acbbe491", &(0x7f0000000100)=""/48, 0x7, 0x0, 0x38, 0x83, &(0x7f0000000140)="7b902f45cea1d832a502f055190a90dad2d9d53653ced3788b63f79b7c387feac877c89a0ff544ebe965edbc7a9480944aa28cf58356593a", &(0x7f00000003c0)="2d8dd17113c5eec61aa6bfb23aec910736838fd07a193a8282dbb7bb644adebb4009fe0f042da377d71f03ac385c31d290df89a1c7a609d3be25cd401ca8f9ebf219d04ece884ac0c81ed552d09a0e1224a9f5c945e4847ca7950621882209b4cd9e2d6c0bde134f72f54882fe373d543452b496762dca1527cc22b6e42bc33e09bd0c"}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x2, 0x6, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x12, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x1000, 0x7, 0x2, 0x6, 0x400, 0xffff0904, 0x8}, r0, 0x1, r4, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:24:19 executing program 2 (fault-call:8 fault-nth:18): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:24:19 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000015, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:19 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000001c, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000002, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:19 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000028, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 804.051606][T13255] FAULT_INJECTION: forcing a failure. [ 804.051606][T13255] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:24:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000003, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 804.097122][T13255] CPU: 0 PID: 13255 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 804.105498][T13255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.115569][T13255] Call Trace: [ 804.118884][T13255] dump_stack+0x197/0x210 [ 804.123240][T13255] should_fail.cold+0xa/0x15 [ 804.127855][T13255] ? fault_create_debugfs_attr+0x180/0x180 [ 804.133682][T13255] ? ___might_sleep+0x163/0x2c0 [ 804.138563][T13255] should_fail_alloc_page+0x50/0x60 [ 804.143780][T13255] __alloc_pages_nodemask+0x1a1/0x910 [ 804.149173][T13255] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 804.154739][T13255] ? __alloc_pages_slowpath+0x2920/0x2920 [ 804.160488][T13255] ? kasan_unpoison_shadow+0x35/0x50 [ 804.165794][T13255] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 804.172154][T13255] alloc_pages_current+0x107/0x210 [ 804.177284][T13255] ? ___might_sleep+0x163/0x2c0 [ 804.182165][T13255] __vmalloc_node_range+0x4f8/0x810 [ 804.187394][T13255] ? bpf_map_area_alloc+0x20/0x30 [ 804.192441][T13255] __vmalloc_node_flags_caller+0x71/0x90 [ 804.198096][T13255] ? bpf_map_area_alloc+0x20/0x30 [ 804.203146][T13255] __bpf_map_area_alloc+0xde/0xf0 [ 804.208195][T13255] bpf_map_area_alloc+0x20/0x30 [ 804.213070][T13255] htab_map_alloc+0x8d3/0x11c0 [ 804.217867][T13255] ? htab_map_update_elem+0xca0/0xca0 [ 804.223260][T13255] __do_sys_bpf+0x478/0x37b0 [ 804.227876][T13255] ? bpf_prog_load+0x18a0/0x18a0 [ 804.232838][T13255] ? __kasan_check_write+0x14/0x20 [ 804.237976][T13255] ? __mutex_unlock_slowpath+0xf0/0x6a0 06:24:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000004, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 804.243552][T13255] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 804.248863][T13255] ? wait_for_completion+0x440/0x440 [ 804.254174][T13255] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 804.260445][T13255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 804.265919][T13255] ? do_syscall_64+0x26/0x790 [ 804.270619][T13255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.276710][T13255] ? do_syscall_64+0x26/0x790 [ 804.281418][T13255] __x64_sys_bpf+0x73/0xb0 [ 804.285842][T13255] do_syscall_64+0xfa/0x790 [ 804.290345][T13255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.290356][T13255] RIP: 0033:0x45a679 [ 804.290369][T13255] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 804.290376][T13255] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 804.290388][T13255] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 804.290395][T13255] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:24:19 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000030, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 804.290402][T13255] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 804.290415][T13255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 804.360170][T13255] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:24:19 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000016, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000005, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x4d5a2d40bb26c9d, 0xb6, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)=0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:24:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000048, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:28 executing program 2 (fault-call:8 fault-nth:19): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:24:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000006, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:28 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000017, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 813.228345][T13331] FAULT_INJECTION: forcing a failure. [ 813.228345][T13331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 813.267852][T13331] CPU: 0 PID: 13331 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 06:24:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000007, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000058, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 813.276225][T13331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.286290][T13331] Call Trace: [ 813.289601][T13331] dump_stack+0x197/0x210 [ 813.293961][T13331] should_fail.cold+0xa/0x15 [ 813.298583][T13331] ? fault_create_debugfs_attr+0x180/0x180 [ 813.304404][T13331] ? ___might_sleep+0x163/0x2c0 [ 813.309283][T13331] should_fail_alloc_page+0x50/0x60 [ 813.314497][T13331] __alloc_pages_nodemask+0x1a1/0x910 [ 813.319884][T13331] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 813.325443][T13331] ? __alloc_pages_slowpath+0x2920/0x2920 [ 813.331178][T13331] ? kasan_unpoison_shadow+0x35/0x50 [ 813.336582][T13331] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 813.342841][T13331] alloc_pages_current+0x107/0x210 [ 813.347962][T13331] ? ___might_sleep+0x163/0x2c0 [ 813.352838][T13331] __vmalloc_node_range+0x4f8/0x810 [ 813.358070][T13331] ? bpf_map_area_alloc+0x20/0x30 [ 813.363119][T13331] __vmalloc_node_flags_caller+0x71/0x90 [ 813.368768][T13331] ? bpf_map_area_alloc+0x20/0x30 [ 813.373807][T13331] __bpf_map_area_alloc+0xde/0xf0 06:24:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000060, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 813.378862][T13331] bpf_map_area_alloc+0x20/0x30 [ 813.383724][T13331] htab_map_alloc+0x8d3/0x11c0 [ 813.388512][T13331] ? htab_map_update_elem+0xca0/0xca0 [ 813.393900][T13331] __do_sys_bpf+0x478/0x37b0 [ 813.398505][T13331] ? bpf_prog_load+0x18a0/0x18a0 [ 813.403448][T13331] ? __kasan_check_write+0x14/0x20 [ 813.408568][T13331] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 813.414147][T13331] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 813.419452][T13331] ? wait_for_completion+0x440/0x440 06:24:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000008, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 813.424755][T13331] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 813.431015][T13331] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 813.436481][T13331] ? do_syscall_64+0x26/0x790 [ 813.441171][T13331] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.447252][T13331] ? do_syscall_64+0x26/0x790 [ 813.451954][T13331] __x64_sys_bpf+0x73/0xb0 [ 813.456388][T13331] do_syscall_64+0xfa/0x790 [ 813.460911][T13331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.466805][T13331] RIP: 0033:0x45a679 06:24:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000070, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 813.470704][T13331] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 813.490313][T13331] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 813.498739][T13331] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 813.506732][T13331] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 813.514713][T13331] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 813.522702][T13331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 813.530687][T13331] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:24:29 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000078, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:41 executing program 2 (fault-call:8 fault-nth:20): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:41 executing program 1: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:24:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000018, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:41 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000009, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:41 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000088, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) [ 826.570539][T13398] FAULT_INJECTION: forcing a failure. [ 826.570539][T13398] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 826.594603][T13398] CPU: 0 PID: 13398 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 826.602971][T13398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.613037][T13398] Call Trace: [ 826.616347][T13398] dump_stack+0x197/0x210 06:24:42 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000090, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 826.620704][T13398] should_fail.cold+0xa/0x15 [ 826.625318][T13398] ? fault_create_debugfs_attr+0x180/0x180 [ 826.631139][T13398] ? ___might_sleep+0x163/0x2c0 [ 826.636020][T13398] should_fail_alloc_page+0x50/0x60 [ 826.641234][T13398] __alloc_pages_nodemask+0x1a1/0x910 [ 826.646620][T13398] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 826.652188][T13398] ? __alloc_pages_slowpath+0x2920/0x2920 [ 826.657945][T13398] ? kasan_unpoison_shadow+0x35/0x50 [ 826.663275][T13398] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 826.669535][T13398] alloc_pages_current+0x107/0x210 [ 826.674659][T13398] ? ___might_sleep+0x163/0x2c0 [ 826.679505][T13398] __vmalloc_node_range+0x4f8/0x810 [ 826.679530][T13398] ? bpf_map_area_alloc+0x20/0x30 [ 826.679543][T13398] __vmalloc_node_flags_caller+0x71/0x90 [ 826.679555][T13398] ? bpf_map_area_alloc+0x20/0x30 [ 826.679572][T13398] __bpf_map_area_alloc+0xde/0xf0 [ 826.705433][T13398] bpf_map_area_alloc+0x20/0x30 [ 826.710301][T13398] htab_map_alloc+0x8d3/0x11c0 [ 826.715098][T13398] ? htab_map_update_elem+0xca0/0xca0 [ 826.720494][T13398] __do_sys_bpf+0x478/0x37b0 [ 826.725111][T13398] ? bpf_prog_load+0x18a0/0x18a0 [ 826.730083][T13398] ? __kasan_check_write+0x14/0x20 [ 826.735212][T13398] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 826.740773][T13398] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 826.746085][T13398] ? wait_for_completion+0x440/0x440 [ 826.751389][T13398] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 826.757660][T13398] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 826.763141][T13398] ? do_syscall_64+0x26/0x790 06:24:42 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000180, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 826.767837][T13398] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.773930][T13398] ? do_syscall_64+0x26/0x790 [ 826.778628][T13398] __x64_sys_bpf+0x73/0xb0 [ 826.783066][T13398] do_syscall_64+0xfa/0x790 [ 826.787588][T13398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.793491][T13398] RIP: 0033:0x45a679 [ 826.797392][T13398] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:24:42 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000a0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:42 executing program 2 (fault-call:8 fault-nth:21): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 826.816995][T13398] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 826.817011][T13398] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 826.817019][T13398] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 826.817033][T13398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 826.841472][T13398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 826.841481][T13398] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 826.942474][T13432] FAULT_INJECTION: forcing a failure. [ 826.942474][T13432] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 826.966236][T13432] CPU: 0 PID: 13432 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 826.974599][T13432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.974606][T13432] Call Trace: [ 826.974627][T13432] dump_stack+0x197/0x210 [ 826.974651][T13432] should_fail.cold+0xa/0x15 [ 826.996902][T13432] ? fault_create_debugfs_attr+0x180/0x180 [ 827.002722][T13432] ? ___might_sleep+0x163/0x2c0 [ 827.007593][T13432] should_fail_alloc_page+0x50/0x60 [ 827.012808][T13432] __alloc_pages_nodemask+0x1a1/0x910 [ 827.018201][T13432] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 827.023771][T13432] ? __alloc_pages_slowpath+0x2920/0x2920 [ 827.029500][T13432] ? kasan_unpoison_shadow+0x35/0x50 [ 827.029519][T13432] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 06:24:42 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000a8, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 827.029538][T13432] alloc_pages_current+0x107/0x210 [ 827.029549][T13432] ? ___might_sleep+0x163/0x2c0 [ 827.029569][T13432] __vmalloc_node_range+0x4f8/0x810 [ 827.056207][T13432] ? bpf_map_area_alloc+0x20/0x30 [ 827.061254][T13432] __vmalloc_node_flags_caller+0x71/0x90 [ 827.066900][T13432] ? bpf_map_area_alloc+0x20/0x30 [ 827.071946][T13432] __bpf_map_area_alloc+0xde/0xf0 [ 827.076987][T13432] bpf_map_area_alloc+0x20/0x30 [ 827.081847][T13432] htab_map_alloc+0x8d3/0x11c0 [ 827.086642][T13432] ? htab_map_update_elem+0xca0/0xca0 06:24:42 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000b8, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 827.092027][T13432] __do_sys_bpf+0x478/0x37b0 [ 827.096628][T13432] ? bpf_prog_load+0x18a0/0x18a0 [ 827.101568][T13432] ? __kasan_check_write+0x14/0x20 [ 827.101584][T13432] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 827.101598][T13432] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 827.101611][T13432] ? wait_for_completion+0x440/0x440 [ 827.101635][T13432] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 827.122819][T13432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 827.122838][T13432] ? do_syscall_64+0x26/0x790 06:24:42 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000c0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 827.139183][T13432] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.145269][T13432] ? do_syscall_64+0x26/0x790 [ 827.149963][T13432] __x64_sys_bpf+0x73/0xb0 [ 827.154393][T13432] do_syscall_64+0xfa/0x790 [ 827.158913][T13432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.164808][T13432] RIP: 0033:0x45a679 [ 827.168712][T13432] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.188323][T13432] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 827.196745][T13432] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 827.204726][T13432] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 827.204734][T13432] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 827.204741][T13432] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 827.204749][T13432] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:24:49 executing program 2 (fault-call:8 fault-nth:22): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:49 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000a, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:49 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000300, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:49 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000d0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r3, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r8 = perf_event_open$cgroup(&(0x7f0000000300)={0x3d7da396e1f7f479, 0x70, 0x3, 0x3f, 0x97, 0x5, 0x0, 0xc29, 0x80210, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x1ac80, 0x7, 0x9, 0x4, 0x8, 0xfffffc36, 0x1}, r4, 0x5, r6, 0x2) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x1, 0x0, 0xc2, 0x0, 0x3f, 0x88030, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb6a8, 0x0, @perf_bp={&(0x7f0000000040), 0x10}, 0x40, 0x101, 0xfffffff7, 0x1, 0x3f00000000000, 0x3, 0x7fe}, r2, 0x2, r8, 0x8) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:24:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:24:49 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000d8, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 833.851269][T13468] FAULT_INJECTION: forcing a failure. [ 833.851269][T13468] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 833.884603][T13468] CPU: 0 PID: 13468 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 833.892980][T13468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.903047][T13468] Call Trace: [ 833.906354][T13468] dump_stack+0x197/0x210 [ 833.910711][T13468] should_fail.cold+0xa/0x15 [ 833.915329][T13468] ? fault_create_debugfs_attr+0x180/0x180 [ 833.921143][T13468] ? ___might_sleep+0x163/0x2c0 [ 833.926016][T13468] should_fail_alloc_page+0x50/0x60 [ 833.931230][T13468] __alloc_pages_nodemask+0x1a1/0x910 [ 833.936608][T13468] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 833.942167][T13468] ? __alloc_pages_slowpath+0x2920/0x2920 06:24:49 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000e8, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 833.947987][T13468] ? kasan_unpoison_shadow+0x35/0x50 [ 833.953302][T13468] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 833.959560][T13468] alloc_pages_current+0x107/0x210 [ 833.964710][T13468] ? ___might_sleep+0x163/0x2c0 [ 833.969583][T13468] __vmalloc_node_range+0x4f8/0x810 [ 833.974808][T13468] ? bpf_map_area_alloc+0x20/0x30 [ 833.979843][T13468] __vmalloc_node_flags_caller+0x71/0x90 [ 833.985471][T13468] ? bpf_map_area_alloc+0x20/0x30 [ 833.990490][T13468] __bpf_map_area_alloc+0xde/0xf0 [ 833.990504][T13468] bpf_map_area_alloc+0x20/0x30 [ 833.990518][T13468] htab_map_alloc+0x8d3/0x11c0 [ 833.990540][T13468] ? htab_map_update_elem+0xca0/0xca0 [ 833.990554][T13468] __do_sys_bpf+0x478/0x37b0 [ 833.990569][T13468] ? bpf_prog_load+0x18a0/0x18a0 [ 833.990586][T13468] ? __kasan_check_write+0x14/0x20 [ 834.025100][T13468] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 834.030632][T13468] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 834.035900][T13468] ? wait_for_completion+0x440/0x440 [ 834.041170][T13468] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 834.047403][T13468] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.052843][T13468] ? do_syscall_64+0x26/0x790 [ 834.057502][T13468] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.063550][T13468] ? do_syscall_64+0x26/0x790 [ 834.068213][T13468] __x64_sys_bpf+0x73/0xb0 [ 834.072620][T13468] do_syscall_64+0xfa/0x790 [ 834.077110][T13468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.082980][T13468] RIP: 0033:0x45a679 [ 834.086856][T13468] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 834.106441][T13468] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 834.114833][T13468] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 834.122786][T13468] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 834.130739][T13468] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 834.138693][T13468] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 834.146645][T13468] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:24:49 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000b, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:49 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000500, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:49 executing program 2 (fault-call:8 fault-nth:23): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:49 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000f0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:49 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000180, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 834.408293][T13511] FAULT_INJECTION: forcing a failure. [ 834.408293][T13511] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 834.431448][T13511] CPU: 0 PID: 13511 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 834.439829][T13511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.449901][T13511] Call Trace: [ 834.453226][T13511] dump_stack+0x197/0x210 [ 834.457595][T13511] should_fail.cold+0xa/0x15 [ 834.464646][T13511] ? fault_create_debugfs_attr+0x180/0x180 [ 834.470477][T13511] ? ___might_sleep+0x163/0x2c0 [ 834.475366][T13511] should_fail_alloc_page+0x50/0x60 [ 834.480596][T13511] __alloc_pages_nodemask+0x1a1/0x910 [ 834.485994][T13511] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 834.491570][T13511] ? __alloc_pages_slowpath+0x2920/0x2920 [ 834.497322][T13511] ? kasan_unpoison_shadow+0x35/0x50 [ 834.502632][T13511] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 834.508895][T13511] alloc_pages_current+0x107/0x210 [ 834.514013][T13511] ? ___might_sleep+0x163/0x2c0 [ 834.518884][T13511] __vmalloc_node_range+0x4f8/0x810 [ 834.524107][T13511] ? bpf_map_area_alloc+0x20/0x30 [ 834.529158][T13511] __vmalloc_node_flags_caller+0x71/0x90 [ 834.534821][T13511] ? bpf_map_area_alloc+0x20/0x30 [ 834.539867][T13511] __bpf_map_area_alloc+0xde/0xf0 [ 834.544906][T13511] bpf_map_area_alloc+0x20/0x30 [ 834.549773][T13511] htab_map_alloc+0x8d3/0x11c0 [ 834.554571][T13511] ? htab_map_update_elem+0xca0/0xca0 [ 834.559968][T13511] __do_sys_bpf+0x478/0x37b0 [ 834.564578][T13511] ? bpf_prog_load+0x18a0/0x18a0 [ 834.569538][T13511] ? __kasan_check_write+0x14/0x20 [ 834.574660][T13511] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 834.580469][T13511] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 834.585760][T13511] ? wait_for_completion+0x440/0x440 [ 834.591048][T13511] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 834.597283][T13511] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.602750][T13511] ? do_syscall_64+0x26/0x790 [ 834.607436][T13511] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.613608][T13511] ? do_syscall_64+0x26/0x790 [ 834.618282][T13511] __x64_sys_bpf+0x73/0xb0 [ 834.622704][T13511] do_syscall_64+0xfa/0x790 [ 834.627339][T13511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.633221][T13511] RIP: 0033:0x45a679 [ 834.637349][T13511] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:24:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000600, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:24:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000300, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 834.656969][T13511] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 834.665498][T13511] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 834.673809][T13511] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 834.681877][T13511] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 834.690141][T13511] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 834.698111][T13511] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:24:50 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000c, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000500, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:00 executing program 2 (fault-call:8 fault-nth:24): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:00 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000700, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:00 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000d, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) write$cgroup_int(r3, 0x0, 0x0) 06:25:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x7, 0x8, 0x88, 0x3, 0x0, 0xc20, 0x800, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x6, @perf_bp={&(0x7f0000000000), 0x6}, 0x1000, 0x8, 0xffffffff, 0x6, 0x6, 0x8000000, 0x1}, r0, 0xf, 0xffffffffffffffff, 0x5) socketpair(0x11, 0x6, 0x0, &(0x7f0000000100)) r2 = socket$kcm(0x2b, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x9, 0x4, 0x8, 0xf1a}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r4}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0xfffffffc}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$sock(r2, &(0x7f0000000380)={&(0x7f0000000280)=@in6={0xa, 0x4e23, 0xd82, @loopback, 0xffff}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)="65b7cd99379897f53c4b2314e4b956674c03209e442b96a9e45d4a01544ac695", 0x20}, {&(0x7f0000000140)="46dfd53b482dff465e884271143f011bf0", 0x11}], 0x2, &(0x7f0000000340)=[@txtime={{0x18, 0x1, 0x3d, 0x4be}}], 0x18}, 0x24) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 845.162426][T13571] FAULT_INJECTION: forcing a failure. [ 845.162426][T13571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 845.197921][T13571] CPU: 1 PID: 13571 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 06:25:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000600, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 845.206295][T13571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.216363][T13571] Call Trace: [ 845.219671][T13571] dump_stack+0x197/0x210 [ 845.224026][T13571] should_fail.cold+0xa/0x15 [ 845.228645][T13571] ? fault_create_debugfs_attr+0x180/0x180 [ 845.234471][T13571] ? ___might_sleep+0x163/0x2c0 [ 845.239359][T13571] should_fail_alloc_page+0x50/0x60 [ 845.244572][T13571] __alloc_pages_nodemask+0x1a1/0x910 [ 845.249938][T13571] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 845.249957][T13571] ? __alloc_pages_slowpath+0x2920/0x2920 06:25:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000700, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 845.249977][T13571] ? kasan_unpoison_shadow+0x35/0x50 [ 845.249995][T13571] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 845.250011][T13571] alloc_pages_current+0x107/0x210 [ 845.250022][T13571] ? ___might_sleep+0x163/0x2c0 [ 845.250041][T13571] __vmalloc_node_range+0x4f8/0x810 [ 845.287909][T13571] ? bpf_map_area_alloc+0x20/0x30 [ 845.292951][T13571] __vmalloc_node_flags_caller+0x71/0x90 [ 845.298596][T13571] ? bpf_map_area_alloc+0x20/0x30 [ 845.303638][T13571] __bpf_map_area_alloc+0xde/0xf0 06:25:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000900, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 845.308685][T13571] bpf_map_area_alloc+0x20/0x30 [ 845.313552][T13571] htab_map_alloc+0x8d3/0x11c0 [ 845.318346][T13571] ? htab_map_update_elem+0xca0/0xca0 [ 845.323734][T13571] __do_sys_bpf+0x478/0x37b0 [ 845.328347][T13571] ? bpf_prog_load+0x18a0/0x18a0 [ 845.333298][T13571] ? __kasan_check_write+0x14/0x20 [ 845.338530][T13571] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 845.344092][T13571] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 845.349387][T13571] ? wait_for_completion+0x440/0x440 [ 845.354691][T13571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 845.360959][T13571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.366427][T13571] ? do_syscall_64+0x26/0x790 [ 845.371104][T13571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.371116][T13571] ? do_syscall_64+0x26/0x790 [ 845.371134][T13571] __x64_sys_bpf+0x73/0xb0 [ 845.371149][T13571] do_syscall_64+0xfa/0x790 [ 845.371165][T13571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.371176][T13571] RIP: 0033:0x45a679 [ 845.371188][T13571] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.371201][T13571] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 845.428746][T13571] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 845.436738][T13571] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 845.444723][T13571] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 845.452710][T13571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 06:25:00 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000e, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:00 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000900, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 845.460692][T13571] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000a00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:01 executing program 2 (fault-call:8 fault-nth:25): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:01 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000b00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 845.699522][T13619] FAULT_INJECTION: forcing a failure. [ 845.699522][T13619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:25:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000a00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 845.755842][T13619] CPU: 0 PID: 13619 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 845.764228][T13619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.774302][T13619] Call Trace: [ 845.777612][T13619] dump_stack+0x197/0x210 [ 845.781964][T13619] should_fail.cold+0xa/0x15 [ 845.786577][T13619] ? fault_create_debugfs_attr+0x180/0x180 [ 845.792397][T13619] ? ___might_sleep+0x163/0x2c0 [ 845.797271][T13619] should_fail_alloc_page+0x50/0x60 [ 845.802485][T13619] __alloc_pages_nodemask+0x1a1/0x910 [ 845.807859][T13619] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 845.813425][T13619] ? __alloc_pages_slowpath+0x2920/0x2920 [ 845.819167][T13619] ? kasan_unpoison_shadow+0x35/0x50 [ 845.824476][T13619] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 845.830738][T13619] alloc_pages_current+0x107/0x210 [ 845.835869][T13619] ? ___might_sleep+0x163/0x2c0 [ 845.840743][T13619] __vmalloc_node_range+0x4f8/0x810 [ 845.845968][T13619] ? bpf_map_area_alloc+0x20/0x30 [ 845.851009][T13619] __vmalloc_node_flags_caller+0x71/0x90 [ 845.856663][T13619] ? bpf_map_area_alloc+0x20/0x30 [ 845.861708][T13619] __bpf_map_area_alloc+0xde/0xf0 [ 845.866757][T13619] bpf_map_area_alloc+0x20/0x30 [ 845.871621][T13619] htab_map_alloc+0x8d3/0x11c0 [ 845.876416][T13619] ? htab_map_update_elem+0xca0/0xca0 [ 845.881808][T13619] __do_sys_bpf+0x478/0x37b0 [ 845.886420][T13619] ? bpf_prog_load+0x18a0/0x18a0 [ 845.891375][T13619] ? __kasan_check_write+0x14/0x20 [ 845.896500][T13619] ? __mutex_unlock_slowpath+0xf0/0x6a0 06:25:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000b00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 845.902062][T13619] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 845.907367][T13619] ? wait_for_completion+0x440/0x440 [ 845.912680][T13619] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 845.918957][T13619] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.924439][T13619] ? do_syscall_64+0x26/0x790 [ 845.929139][T13619] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.935223][T13619] ? do_syscall_64+0x26/0x790 [ 845.939931][T13619] __x64_sys_bpf+0x73/0xb0 [ 845.944371][T13619] do_syscall_64+0xfa/0x790 [ 845.948900][T13619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.954804][T13619] RIP: 0033:0x45a679 [ 845.958723][T13619] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.978315][T13619] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 845.978328][T13619] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 845.978336][T13619] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 845.978344][T13619] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 845.978352][T13619] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 845.978359][T13619] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) write$cgroup_int(r3, 0x0, 0x0) 06:25:08 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000000f, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:08 executing program 2 (fault-call:8 fault-nth:26): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:08 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000c00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:08 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000c00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}, 0x0, 0x9d9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:25:08 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000d00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 853.491816][T13975] FAULT_INJECTION: forcing a failure. [ 853.491816][T13975] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 853.545321][T13975] CPU: 1 PID: 13975 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 853.553698][T13975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.563754][T13975] Call Trace: [ 853.567051][T13975] dump_stack+0x197/0x210 [ 853.571408][T13975] should_fail.cold+0xa/0x15 [ 853.576023][T13975] ? fault_create_debugfs_attr+0x180/0x180 [ 853.581844][T13975] ? ___might_sleep+0x163/0x2c0 [ 853.586708][T13975] should_fail_alloc_page+0x50/0x60 [ 853.591919][T13975] __alloc_pages_nodemask+0x1a1/0x910 [ 853.597303][T13975] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 853.602869][T13975] ? __alloc_pages_slowpath+0x2920/0x2920 [ 853.608605][T13975] ? kasan_unpoison_shadow+0x35/0x50 [ 853.614016][T13975] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 853.620287][T13975] alloc_pages_current+0x107/0x210 [ 853.625412][T13975] ? ___might_sleep+0x163/0x2c0 [ 853.630283][T13975] __vmalloc_node_range+0x4f8/0x810 [ 853.635508][T13975] ? bpf_map_area_alloc+0x20/0x30 [ 853.640553][T13975] __vmalloc_node_flags_caller+0x71/0x90 [ 853.646196][T13975] ? bpf_map_area_alloc+0x20/0x30 [ 853.651235][T13975] __bpf_map_area_alloc+0xde/0xf0 [ 853.656276][T13975] bpf_map_area_alloc+0x20/0x30 [ 853.661144][T13975] htab_map_alloc+0x8d3/0x11c0 [ 853.665931][T13975] ? htab_map_update_elem+0xca0/0xca0 [ 853.671308][T13975] __do_sys_bpf+0x478/0x37b0 [ 853.675911][T13975] ? bpf_prog_load+0x18a0/0x18a0 [ 853.680858][T13975] ? __kasan_check_write+0x14/0x20 [ 853.685984][T13975] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 853.691625][T13975] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 853.696908][T13975] ? wait_for_completion+0x440/0x440 [ 853.702207][T13975] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 853.708476][T13975] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 853.713930][T13975] ? do_syscall_64+0x26/0x790 [ 853.718623][T13975] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.724699][T13975] ? do_syscall_64+0x26/0x790 [ 853.729393][T13975] __x64_sys_bpf+0x73/0xb0 [ 853.733824][T13975] do_syscall_64+0xfa/0x790 [ 853.738347][T13975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.744245][T13975] RIP: 0033:0x45a679 [ 853.748151][T13975] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 853.767855][T13975] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 853.776283][T13975] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 853.784268][T13975] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:25:09 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000e00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:09 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000f00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 853.792252][T13975] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 853.800239][T13975] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 853.808217][T13975] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:09 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000d00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:09 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000010, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:09 executing program 2 (fault-call:8 fault-nth:27): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 854.135389][T14022] FAULT_INJECTION: forcing a failure. [ 854.135389][T14022] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 854.204137][T14022] CPU: 1 PID: 14022 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 854.212519][T14022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.222587][T14022] Call Trace: [ 854.225901][T14022] dump_stack+0x197/0x210 [ 854.230262][T14022] should_fail.cold+0xa/0x15 [ 854.234889][T14022] ? fault_create_debugfs_attr+0x180/0x180 [ 854.240715][T14022] ? ___might_sleep+0x163/0x2c0 [ 854.245591][T14022] should_fail_alloc_page+0x50/0x60 [ 854.250812][T14022] __alloc_pages_nodemask+0x1a1/0x910 [ 854.256214][T14022] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 854.261778][T14022] ? __alloc_pages_slowpath+0x2920/0x2920 [ 854.267518][T14022] ? kasan_unpoison_shadow+0x35/0x50 [ 854.272830][T14022] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 854.279096][T14022] alloc_pages_current+0x107/0x210 [ 854.284292][T14022] ? ___might_sleep+0x163/0x2c0 [ 854.289155][T14022] __vmalloc_node_range+0x4f8/0x810 [ 854.289178][T14022] ? bpf_map_area_alloc+0x20/0x30 [ 854.289192][T14022] __vmalloc_node_flags_caller+0x71/0x90 [ 854.289204][T14022] ? bpf_map_area_alloc+0x20/0x30 [ 854.289219][T14022] __bpf_map_area_alloc+0xde/0xf0 [ 854.289233][T14022] bpf_map_area_alloc+0x20/0x30 [ 854.289248][T14022] htab_map_alloc+0x8d3/0x11c0 [ 854.289273][T14022] ? htab_map_update_elem+0xca0/0xca0 [ 854.289289][T14022] __do_sys_bpf+0x478/0x37b0 [ 854.289306][T14022] ? bpf_prog_load+0x18a0/0x18a0 [ 854.289319][T14022] ? __kasan_check_write+0x14/0x20 [ 854.289342][T14022] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 854.305159][T14022] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 854.305181][T14022] ? wait_for_completion+0x440/0x440 [ 854.360881][T14022] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 854.367140][T14022] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 854.372699][T14022] ? do_syscall_64+0x26/0x790 [ 854.377427][T14022] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 854.383542][T14022] ? do_syscall_64+0x26/0x790 [ 854.388260][T14022] __x64_sys_bpf+0x73/0xb0 [ 854.392666][T14022] do_syscall_64+0xfa/0x790 [ 854.397157][T14022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 854.403044][T14022] RIP: 0033:0x45a679 [ 854.406933][T14022] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 854.426521][T14022] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 854.435024][T14022] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 854.442987][T14022] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 854.450947][T14022] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 854.458909][T14022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 854.466872][T14022] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) write$cgroup_int(r3, 0x0, 0x0) 06:25:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001100, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000011, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000e00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:20 executing program 2 (fault-call:8 fault-nth:28): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x10000, 0x81}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0xc, &(0x7f00000005c0)='cgroup.stat\x00'}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = gettid() r4 = gettid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r5, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r6 = perf_event_open(&(0x7f00000006c0)={0x4, 0x70, 0x40, 0x1, 0x6, 0x4, 0x0, 0x7ff, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0x9, 0x4}, 0x10, 0x1f, 0x0, 0x8, 0x4, 0x1000, 0x4}, r0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000640)={0x6, 0x70, 0x41, 0x5, 0x1, 0x6, 0x0, 0x6472, 0xa0020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x3f, 0x3}, 0x28840, 0x4, 0x6, 0x2, 0x401, 0x7fffffff, 0x1f}, r4, 0x4, r6, 0x2) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0x1e, 0x5a, &(0x7f0000000340)="5ca024102d8371e33473ca7f9eb82ff3d52f9fb9d7e778e058964a07477c", &(0x7f0000000380)=""/90, 0xfffff97a, 0x0, 0xa8, 0x75, &(0x7f0000000400)="74fca121c1550edced9119d21fcc6860e3ec2f69894d78675f7e9f50ba3f1edd5510d87658207439c43059234eeeb84151ab0f7804e96b31ca084ef65de110d9b0d8df24a1efcca59b09327d47045ef4757154fc1d54557ef55f845d11d68452d483591dab232026ccace3a572b289ac4bca198e1813d09a474b5afeed0ed77ae5f957ac6f91faf37bbf64c261b368ca8c6912af5b7d9018a367c8d863b7bca14069a9044f6178f9", &(0x7f00000004c0)="8f234a3da6d9c82f0163d896a1e3b2ab388c0bbaa79f089feff493849a81c106722f6599aabde2d4a71e108d7c07cfef6aecc4ef8092a029ce258ac21cd4c4392de6babad90e23b0de9a28b7e7646ef2dca1a1a1642dc367f7a2fae0b6755e429b42f72682a78a3430cd2f790916df5b750edce989"}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r7, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r8 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7, 0x2, 0x7f, 0x1, 0x0, 0x2, 0x408, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x101, 0xfffffffffffffcae}, 0x890, 0x0, 0xffff, 0xc111749149906819, 0xd91b23f, 0x1f, 0x7fff}, r3, 0x5, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_ID(r8, 0x80082407, &(0x7f0000000280)) r9 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x81, 0x64, 0x20, 0x8, 0x0, 0x4df5, 0x100, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x6}, 0x8004, 0x6, 0x2391, 0x5, 0x2, 0x3, 0x39}, r0, 0x1, r2, 0x0) write$cgroup_pid(r1, &(0x7f0000000300)=r0, 0x12) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000080)) [ 864.806646][T14071] FAULT_INJECTION: forcing a failure. [ 864.806646][T14071] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 864.828053][T14071] CPU: 1 PID: 14071 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 864.836442][T14071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.846517][T14071] Call Trace: [ 864.849821][T14071] dump_stack+0x197/0x210 06:25:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001200, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 864.854177][T14071] should_fail.cold+0xa/0x15 [ 864.858798][T14071] ? fault_create_debugfs_attr+0x180/0x180 [ 864.864627][T14071] ? ___might_sleep+0x163/0x2c0 [ 864.869513][T14071] should_fail_alloc_page+0x50/0x60 [ 864.874733][T14071] __alloc_pages_nodemask+0x1a1/0x910 [ 864.880784][T14071] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 864.886336][T14071] ? __alloc_pages_slowpath+0x2920/0x2920 [ 864.892072][T14071] ? kasan_unpoison_shadow+0x35/0x50 [ 864.897383][T14071] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 864.903644][T14071] alloc_pages_current+0x107/0x210 [ 864.908774][T14071] ? ___might_sleep+0x163/0x2c0 [ 864.913652][T14071] __vmalloc_node_range+0x4f8/0x810 [ 864.918877][T14071] ? bpf_map_area_alloc+0x20/0x30 [ 864.923928][T14071] __vmalloc_node_flags_caller+0x71/0x90 [ 864.929575][T14071] ? bpf_map_area_alloc+0x20/0x30 [ 864.934615][T14071] __bpf_map_area_alloc+0xde/0xf0 [ 864.939650][T14071] bpf_map_area_alloc+0x20/0x30 [ 864.944519][T14071] htab_map_alloc+0x8d3/0x11c0 [ 864.949313][T14071] ? htab_map_update_elem+0xca0/0xca0 06:25:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000012, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 864.954702][T14071] __do_sys_bpf+0x478/0x37b0 [ 864.959312][T14071] ? bpf_prog_load+0x18a0/0x18a0 [ 864.964271][T14071] ? __kasan_check_write+0x14/0x20 [ 864.969404][T14071] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 864.974961][T14071] ? retint_kernel+0x2b/0x2b [ 864.979554][T14071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.979568][T14071] ? debug_smp_processor_id+0x33/0x18a [ 864.979584][T14071] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 864.979611][T14071] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 864.979623][T14071] ? do_syscall_64+0x26/0x790 06:25:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001300, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 864.979641][T14071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 865.013628][T14071] ? do_syscall_64+0x26/0x790 [ 865.018326][T14071] __x64_sys_bpf+0x73/0xb0 [ 865.022757][T14071] do_syscall_64+0xfa/0x790 [ 865.027279][T14071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 865.033175][T14071] RIP: 0033:0x45a679 [ 865.037103][T14071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 865.056711][T14071] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 865.056724][T14071] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 865.056732][T14071] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 865.056739][T14071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 865.056747][T14071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 865.056753][T14071] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000f00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001400, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:20 executing program 2 (fault-call:8 fault-nth:29): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 865.333446][T14117] FAULT_INJECTION: forcing a failure. [ 865.333446][T14117] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 865.366646][T14117] CPU: 0 PID: 14117 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 865.375021][T14117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.385087][T14117] Call Trace: [ 865.388402][T14117] dump_stack+0x197/0x210 [ 865.392764][T14117] should_fail.cold+0xa/0x15 [ 865.397385][T14117] ? fault_create_debugfs_attr+0x180/0x180 [ 865.403212][T14117] ? ___might_sleep+0x163/0x2c0 [ 865.408096][T14117] should_fail_alloc_page+0x50/0x60 [ 865.413315][T14117] __alloc_pages_nodemask+0x1a1/0x910 [ 865.418702][T14117] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 865.424268][T14117] ? __alloc_pages_slowpath+0x2920/0x2920 [ 865.430010][T14117] ? kasan_unpoison_shadow+0x35/0x50 [ 865.435329][T14117] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 865.441588][T14117] alloc_pages_current+0x107/0x210 [ 865.446721][T14117] ? ___might_sleep+0x163/0x2c0 [ 865.451594][T14117] __vmalloc_node_range+0x4f8/0x810 [ 865.456818][T14117] ? bpf_map_area_alloc+0x20/0x30 [ 865.461862][T14117] __vmalloc_node_flags_caller+0x71/0x90 [ 865.467506][T14117] ? bpf_map_area_alloc+0x20/0x30 [ 865.472534][T14117] __bpf_map_area_alloc+0xde/0xf0 [ 865.477589][T14117] bpf_map_area_alloc+0x20/0x30 [ 865.482426][T14117] htab_map_alloc+0x8d3/0x11c0 [ 865.487179][T14117] ? htab_map_update_elem+0xca0/0xca0 [ 865.492551][T14117] __do_sys_bpf+0x478/0x37b0 [ 865.497140][T14117] ? bpf_prog_load+0x18a0/0x18a0 [ 865.502079][T14117] ? __kasan_check_write+0x14/0x20 [ 865.507176][T14117] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 865.512702][T14117] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 865.517975][T14117] ? wait_for_completion+0x440/0x440 [ 865.523257][T14117] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 865.529487][T14117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 865.534983][T14117] ? do_syscall_64+0x26/0x790 [ 865.539645][T14117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 865.545734][T14117] ? do_syscall_64+0x26/0x790 [ 865.550447][T14117] __x64_sys_bpf+0x73/0xb0 [ 865.554845][T14117] do_syscall_64+0xfa/0x790 [ 865.559331][T14117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 865.565205][T14117] RIP: 0033:0x45a679 [ 865.569095][T14117] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 865.588685][T14117] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 865.597086][T14117] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 865.605053][T14117] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 865.613009][T14117] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 865.620963][T14117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 865.628916][T14117] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:25:31 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001500, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:31 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000013, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:31 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001100, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:31 executing program 2 (fault-call:8 fault-nth:30): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 876.184536][T14147] FAULT_INJECTION: forcing a failure. [ 876.184536][T14147] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 876.203860][T14147] CPU: 0 PID: 14147 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 876.212261][T14147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.222325][T14147] Call Trace: [ 876.225631][T14147] dump_stack+0x197/0x210 [ 876.229991][T14147] should_fail.cold+0xa/0x15 [ 876.234611][T14147] ? fault_create_debugfs_attr+0x180/0x180 [ 876.240439][T14147] ? ___might_sleep+0x163/0x2c0 [ 876.245320][T14147] should_fail_alloc_page+0x50/0x60 [ 876.250547][T14147] __alloc_pages_nodemask+0x1a1/0x910 [ 876.255939][T14147] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 876.261503][T14147] ? __alloc_pages_slowpath+0x2920/0x2920 [ 876.267242][T14147] ? kasan_unpoison_shadow+0x35/0x50 [ 876.272545][T14147] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 876.278812][T14147] alloc_pages_current+0x107/0x210 [ 876.283941][T14147] ? ___might_sleep+0x163/0x2c0 [ 876.288814][T14147] __vmalloc_node_range+0x4f8/0x810 [ 876.294073][T14147] ? bpf_map_area_alloc+0x20/0x30 [ 876.299118][T14147] __vmalloc_node_flags_caller+0x71/0x90 [ 876.304768][T14147] ? bpf_map_area_alloc+0x20/0x30 [ 876.309811][T14147] __bpf_map_area_alloc+0xde/0xf0 [ 876.314856][T14147] bpf_map_area_alloc+0x20/0x30 [ 876.319724][T14147] htab_map_alloc+0x8d3/0x11c0 [ 876.324495][T14147] ? htab_map_update_elem+0xca0/0xca0 [ 876.329860][T14147] __do_sys_bpf+0x478/0x37b0 [ 876.329877][T14147] ? bpf_prog_load+0x18a0/0x18a0 [ 876.329890][T14147] ? __kasan_check_write+0x14/0x20 [ 876.329904][T14147] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 876.329917][T14147] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 876.329931][T14147] ? wait_for_completion+0x440/0x440 [ 876.329951][T14147] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 876.329983][T14147] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 876.372384][T14147] ? do_syscall_64+0x26/0x790 [ 876.377214][T14147] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 06:25:31 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001600, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:31 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001700, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 876.383303][T14147] ? do_syscall_64+0x26/0x790 [ 876.388008][T14147] __x64_sys_bpf+0x73/0xb0 [ 876.392442][T14147] do_syscall_64+0xfa/0x790 [ 876.396974][T14147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.402878][T14147] RIP: 0033:0x45a679 [ 876.406783][T14147] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 876.426397][T14147] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 06:25:31 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:31 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000014, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:31 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001200, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 876.434822][T14147] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 876.442897][T14147] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 876.450879][T14147] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 876.458862][T14147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 876.466847][T14147] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:31 executing program 2 (fault-call:8 fault-nth:31): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 876.675318][T14192] FAULT_INJECTION: forcing a failure. [ 876.675318][T14192] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 876.694126][T14192] CPU: 0 PID: 14192 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 876.702501][T14192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.712561][T14192] Call Trace: [ 876.712586][T14192] dump_stack+0x197/0x210 [ 876.712611][T14192] should_fail.cold+0xa/0x15 [ 876.712634][T14192] ? fault_create_debugfs_attr+0x180/0x180 [ 876.730624][T14192] ? ___might_sleep+0x163/0x2c0 [ 876.735502][T14192] should_fail_alloc_page+0x50/0x60 [ 876.740722][T14192] __alloc_pages_nodemask+0x1a1/0x910 [ 876.746120][T14192] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 876.751687][T14192] ? __alloc_pages_slowpath+0x2920/0x2920 [ 876.757419][T14192] ? kasan_unpoison_shadow+0x35/0x50 [ 876.762727][T14192] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 876.768985][T14192] alloc_pages_current+0x107/0x210 [ 876.774108][T14192] ? ___might_sleep+0x163/0x2c0 [ 876.778981][T14192] __vmalloc_node_range+0x4f8/0x810 [ 876.784206][T14192] ? bpf_map_area_alloc+0x20/0x30 [ 876.789246][T14192] __vmalloc_node_flags_caller+0x71/0x90 [ 876.794899][T14192] ? bpf_map_area_alloc+0x20/0x30 [ 876.799946][T14192] __bpf_map_area_alloc+0xde/0xf0 [ 876.804986][T14192] bpf_map_area_alloc+0x20/0x30 [ 876.809831][T14192] htab_map_alloc+0x8d3/0x11c0 [ 876.809854][T14192] ? htab_map_update_elem+0xca0/0xca0 [ 876.809868][T14192] __do_sys_bpf+0x478/0x37b0 [ 876.809885][T14192] ? bpf_prog_load+0x18a0/0x18a0 [ 876.809899][T14192] ? __kasan_check_write+0x14/0x20 [ 876.809913][T14192] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 876.809925][T14192] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 876.809942][T14192] ? wait_for_completion+0x440/0x440 [ 876.850749][T14192] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 876.857018][T14192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 876.862510][T14192] ? do_syscall_64+0x26/0x790 [ 876.867207][T14192] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.873410][T14192] ? do_syscall_64+0x26/0x790 [ 876.878109][T14192] __x64_sys_bpf+0x73/0xb0 [ 876.882554][T14192] do_syscall_64+0xfa/0x790 [ 876.887079][T14192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.892987][T14192] RIP: 0033:0x45a679 [ 876.896899][T14192] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 876.916515][T14192] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 876.924942][T14192] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 876.932926][T14192] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 876.940912][T14192] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 876.948891][T14192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 876.956858][T14192] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:25:46 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001c00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:46 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001300, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:46 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000015, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:46 executing program 2 (fault-call:8 fault-nth:32): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 890.765142][T14218] FAULT_INJECTION: forcing a failure. [ 890.765142][T14218] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 890.788652][T14218] CPU: 1 PID: 14218 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 890.797024][T14218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.807091][T14218] Call Trace: [ 890.810394][T14218] dump_stack+0x197/0x210 [ 890.814747][T14218] should_fail.cold+0xa/0x15 [ 890.819361][T14218] ? fault_create_debugfs_attr+0x180/0x180 [ 890.825180][T14218] ? ___might_sleep+0x163/0x2c0 [ 890.830061][T14218] should_fail_alloc_page+0x50/0x60 [ 890.835275][T14218] __alloc_pages_nodemask+0x1a1/0x910 [ 890.840660][T14218] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 890.846226][T14218] ? __alloc_pages_slowpath+0x2920/0x2920 [ 890.851963][T14218] ? kasan_unpoison_shadow+0x35/0x50 [ 890.857258][T14218] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 06:25:46 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001400, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 890.863517][T14218] alloc_pages_current+0x107/0x210 [ 890.868647][T14218] ? ___might_sleep+0x163/0x2c0 [ 890.873513][T14218] __vmalloc_node_range+0x4f8/0x810 [ 890.878753][T14218] ? bpf_map_area_alloc+0x20/0x30 [ 890.883808][T14218] __vmalloc_node_flags_caller+0x71/0x90 [ 890.889457][T14218] ? bpf_map_area_alloc+0x20/0x30 [ 890.894498][T14218] __bpf_map_area_alloc+0xde/0xf0 [ 890.899518][T14218] bpf_map_area_alloc+0x20/0x30 [ 890.899532][T14218] htab_map_alloc+0x8d3/0x11c0 [ 890.899555][T14218] ? htab_map_update_elem+0xca0/0xca0 [ 890.899569][T14218] __do_sys_bpf+0x478/0x37b0 [ 890.899586][T14218] ? bpf_prog_load+0x18a0/0x18a0 [ 890.899599][T14218] ? __kasan_check_write+0x14/0x20 [ 890.899613][T14218] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 890.899627][T14218] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 890.899642][T14218] ? wait_for_completion+0x440/0x440 [ 890.899660][T14218] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 890.899685][T14218] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 890.899698][T14218] ? do_syscall_64+0x26/0x790 [ 890.899716][T14218] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.967765][T14218] ? do_syscall_64+0x26/0x790 [ 890.972466][T14218] __x64_sys_bpf+0x73/0xb0 [ 890.976909][T14218] do_syscall_64+0xfa/0x790 [ 890.981529][T14218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.987445][T14218] RIP: 0033:0x45a679 [ 890.991355][T14218] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:25:46 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000002800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:46 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001500, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 891.012026][T14218] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 891.020455][T14218] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 891.028439][T14218] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 891.036534][T14218] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 891.044626][T14218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 891.052613][T14218] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:46 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000016, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:46 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000003000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:46 executing program 2 (fault-call:8 fault-nth:33): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 891.273548][T14269] FAULT_INJECTION: forcing a failure. [ 891.273548][T14269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 891.357015][T14269] CPU: 1 PID: 14269 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 891.365393][T14269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.375458][T14269] Call Trace: [ 891.378776][T14269] dump_stack+0x197/0x210 [ 891.383136][T14269] should_fail.cold+0xa/0x15 [ 891.387752][T14269] ? fault_create_debugfs_attr+0x180/0x180 [ 891.393578][T14269] ? ___might_sleep+0x163/0x2c0 [ 891.398455][T14269] should_fail_alloc_page+0x50/0x60 [ 891.403682][T14269] __alloc_pages_nodemask+0x1a1/0x910 [ 891.409080][T14269] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 891.414649][T14269] ? __alloc_pages_slowpath+0x2920/0x2920 [ 891.420390][T14269] ? kasan_unpoison_shadow+0x35/0x50 [ 891.425681][T14269] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 891.431914][T14269] alloc_pages_current+0x107/0x210 [ 891.437004][T14269] ? ___might_sleep+0x163/0x2c0 [ 891.441843][T14269] __vmalloc_node_range+0x4f8/0x810 [ 891.447037][T14269] ? bpf_map_area_alloc+0x20/0x30 [ 891.452055][T14269] __vmalloc_node_flags_caller+0x71/0x90 [ 891.457699][T14269] ? bpf_map_area_alloc+0x20/0x30 [ 891.462735][T14269] __bpf_map_area_alloc+0xde/0xf0 [ 891.467757][T14269] bpf_map_area_alloc+0x20/0x30 [ 891.472607][T14269] htab_map_alloc+0x8d3/0x11c0 [ 891.477361][T14269] ? htab_map_update_elem+0xca0/0xca0 [ 891.482765][T14269] __do_sys_bpf+0x478/0x37b0 [ 891.487344][T14269] ? bpf_prog_load+0x18a0/0x18a0 [ 891.492263][T14269] ? __kasan_check_write+0x14/0x20 [ 891.497363][T14269] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 891.502890][T14269] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 891.508158][T14269] ? wait_for_completion+0x440/0x440 [ 891.513432][T14269] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 891.519660][T14269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 891.525098][T14269] ? do_syscall_64+0x26/0x790 [ 891.529754][T14269] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.535875][T14269] ? do_syscall_64+0x26/0x790 [ 891.540562][T14269] __x64_sys_bpf+0x73/0xb0 [ 891.545020][T14269] do_syscall_64+0xfa/0x790 [ 891.549525][T14269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.555466][T14269] RIP: 0033:0x45a679 [ 891.559353][T14269] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 891.578958][T14269] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 891.587378][T14269] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 891.595392][T14269] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 891.603367][T14269] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 891.611346][T14269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 891.619316][T14269] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:25:55 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000003f00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:55 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001600, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:55 executing program 2 (fault-call:8 fault-nth:34): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:55 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000017, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 900.102098][T14297] FAULT_INJECTION: forcing a failure. [ 900.102098][T14297] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 900.115572][T14297] CPU: 0 PID: 14297 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 900.123919][T14297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.133989][T14297] Call Trace: [ 900.137298][T14297] dump_stack+0x197/0x210 [ 900.141659][T14297] should_fail.cold+0xa/0x15 [ 900.146280][T14297] ? fault_create_debugfs_attr+0x180/0x180 [ 900.152111][T14297] ? ___might_sleep+0x163/0x2c0 [ 900.156996][T14297] should_fail_alloc_page+0x50/0x60 [ 900.162223][T14297] __alloc_pages_nodemask+0x1a1/0x910 [ 900.167623][T14297] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 900.173199][T14297] ? __alloc_pages_slowpath+0x2920/0x2920 [ 900.178947][T14297] ? kasan_unpoison_shadow+0x35/0x50 [ 900.184257][T14297] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 900.190521][T14297] alloc_pages_current+0x107/0x210 [ 900.195655][T14297] ? ___might_sleep+0x163/0x2c0 [ 900.200535][T14297] __vmalloc_node_range+0x4f8/0x810 [ 900.205765][T14297] ? bpf_map_area_alloc+0x20/0x30 [ 900.210823][T14297] __vmalloc_node_flags_caller+0x71/0x90 [ 900.216478][T14297] ? bpf_map_area_alloc+0x20/0x30 [ 900.221531][T14297] __bpf_map_area_alloc+0xde/0xf0 [ 900.226577][T14297] bpf_map_area_alloc+0x20/0x30 [ 900.231451][T14297] htab_map_alloc+0x8d3/0x11c0 [ 900.236241][T14297] ? htab_map_update_elem+0xca0/0xca0 [ 900.241630][T14297] __do_sys_bpf+0x478/0x37b0 [ 900.246249][T14297] ? bpf_prog_load+0x18a0/0x18a0 [ 900.251205][T14297] ? __kasan_check_write+0x14/0x20 [ 900.256339][T14297] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 900.261900][T14297] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 900.267208][T14297] ? wait_for_completion+0x440/0x440 [ 900.272523][T14297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 900.278800][T14297] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 900.284283][T14297] ? do_syscall_64+0x26/0x790 [ 900.288979][T14297] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 900.295066][T14297] ? do_syscall_64+0x26/0x790 [ 900.299760][T14297] __x64_sys_bpf+0x73/0xb0 [ 900.299782][T14297] do_syscall_64+0xfa/0x790 [ 900.299802][T14297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 900.299818][T14297] RIP: 0033:0x45a679 [ 900.308716][T14297] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 900.338067][T14297] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 06:25:55 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000018, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:55 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001700, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:55 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000004000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 900.346493][T14297] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 900.354461][T14297] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 900.354468][T14297] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 900.354475][T14297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 900.354482][T14297] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:25:55 executing program 2 (fault-call:8 fault-nth:35): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:55 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000004800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:25:55 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000001c, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 900.579923][T14345] FAULT_INJECTION: forcing a failure. [ 900.579923][T14345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 900.660547][T14345] CPU: 1 PID: 14345 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 900.668928][T14345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.678992][T14345] Call Trace: [ 900.682293][T14345] dump_stack+0x197/0x210 [ 900.686648][T14345] should_fail.cold+0xa/0x15 [ 900.691272][T14345] ? fault_create_debugfs_attr+0x180/0x180 [ 900.697103][T14345] ? ___might_sleep+0x163/0x2c0 [ 900.701982][T14345] should_fail_alloc_page+0x50/0x60 [ 900.707193][T14345] __alloc_pages_nodemask+0x1a1/0x910 [ 900.712560][T14345] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 900.712580][T14345] ? __alloc_pages_slowpath+0x2920/0x2920 [ 900.712601][T14345] ? kasan_unpoison_shadow+0x35/0x50 [ 900.712615][T14345] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 900.712631][T14345] alloc_pages_current+0x107/0x210 [ 900.712644][T14345] ? ___might_sleep+0x163/0x2c0 [ 900.712661][T14345] __vmalloc_node_range+0x4f8/0x810 [ 900.712690][T14345] ? bpf_map_area_alloc+0x20/0x30 [ 900.756275][T14345] __vmalloc_node_flags_caller+0x71/0x90 [ 900.761955][T14345] ? bpf_map_area_alloc+0x20/0x30 [ 900.767001][T14345] __bpf_map_area_alloc+0xde/0xf0 [ 900.772036][T14345] bpf_map_area_alloc+0x20/0x30 [ 900.776904][T14345] htab_map_alloc+0x8d3/0x11c0 [ 900.781699][T14345] ? htab_map_update_elem+0xca0/0xca0 [ 900.787093][T14345] __do_sys_bpf+0x478/0x37b0 [ 900.791708][T14345] ? bpf_prog_load+0x18a0/0x18a0 [ 900.796661][T14345] ? __kasan_check_write+0x14/0x20 [ 900.801795][T14345] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 900.807365][T14345] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 900.812672][T14345] ? wait_for_completion+0x440/0x440 [ 900.817989][T14345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 900.824268][T14345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 900.829859][T14345] ? do_syscall_64+0x26/0x790 [ 900.834552][T14345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 900.840637][T14345] ? do_syscall_64+0x26/0x790 [ 900.845350][T14345] __x64_sys_bpf+0x73/0xb0 [ 900.849790][T14345] do_syscall_64+0xfa/0x790 [ 900.854315][T14345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 900.860226][T14345] RIP: 0033:0x45a679 [ 900.864127][T14345] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 900.883742][T14345] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 900.892166][T14345] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 900.892174][T14345] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 900.892181][T14345] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 900.892188][T14345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 900.892195][T14345] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:26:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000005800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:04 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:04 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000028, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:04 executing program 2 (fault-call:8 fault-nth:36): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x800100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r1) [ 909.402878][T14377] FAULT_INJECTION: forcing a failure. [ 909.402878][T14377] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 909.435895][T14377] CPU: 1 PID: 14377 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 06:26:04 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000004000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000006000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 909.444275][T14377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.454352][T14377] Call Trace: [ 909.457670][T14377] dump_stack+0x197/0x210 [ 909.462097][T14377] should_fail.cold+0xa/0x15 [ 909.466728][T14377] ? fault_create_debugfs_attr+0x180/0x180 [ 909.472555][T14377] ? ___might_sleep+0x163/0x2c0 [ 909.477440][T14377] should_fail_alloc_page+0x50/0x60 [ 909.482662][T14377] __alloc_pages_nodemask+0x1a1/0x910 [ 909.488057][T14377] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 909.493630][T14377] ? __alloc_pages_slowpath+0x2920/0x2920 [ 909.499378][T14377] ? kasan_unpoison_shadow+0x35/0x50 [ 909.504692][T14377] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 909.510957][T14377] alloc_pages_current+0x107/0x210 [ 909.516089][T14377] ? ___might_sleep+0x163/0x2c0 [ 909.520964][T14377] __vmalloc_node_range+0x4f8/0x810 [ 909.526212][T14377] ? bpf_map_area_alloc+0x20/0x30 [ 909.531266][T14377] __vmalloc_node_flags_caller+0x71/0x90 [ 909.536928][T14377] ? bpf_map_area_alloc+0x20/0x30 [ 909.541978][T14377] __bpf_map_area_alloc+0xde/0xf0 [ 909.547028][T14377] bpf_map_area_alloc+0x20/0x30 06:26:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000007000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 909.551901][T14377] htab_map_alloc+0x8d3/0x11c0 [ 909.556697][T14377] ? htab_map_update_elem+0xca0/0xca0 [ 909.562109][T14377] __do_sys_bpf+0x478/0x37b0 [ 909.566735][T14377] ? bpf_prog_load+0x18a0/0x18a0 [ 909.571786][T14377] ? __kasan_check_write+0x14/0x20 [ 909.576925][T14377] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 909.582511][T14377] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 909.587951][T14377] ? wait_for_completion+0x440/0x440 [ 909.593272][T14377] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 909.599670][T14377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 909.605167][T14377] ? do_syscall_64+0x26/0x790 [ 909.609874][T14377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.615969][T14377] ? do_syscall_64+0x26/0x790 [ 909.620683][T14377] __x64_sys_bpf+0x73/0xb0 [ 909.625126][T14377] do_syscall_64+0xfa/0x790 [ 909.629656][T14377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.635571][T14377] RIP: 0033:0x45a679 06:26:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000007800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:05 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020001000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 909.639485][T14377] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 909.659107][T14377] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 909.667539][T14377] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 909.675532][T14377] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 909.683525][T14377] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 909.691512][T14377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 909.699511][T14377] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000008800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:26:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000030, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:20 executing program 2 (fault-call:8 fault-nth:37): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020002000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000009000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) openat$cgroup_ro(r3, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r5 = openat$cgroup_type(r3, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0xf9, 0x3, 0xff, 0x8, 0x0, 0xf3fb, 0xddd003f245bd0e83, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0xffffffff}, 0x22028, 0x1, 0xffff, 0x172f3a313a78c2c6, 0x9, 0x1, 0x6}, 0x0, 0xd, r0, 0x2) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) 06:26:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000a000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 924.805265][T14448] FAULT_INJECTION: forcing a failure. [ 924.805265][T14448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 924.836283][T14448] CPU: 1 PID: 14448 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 924.844667][T14448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 924.854743][T14448] Call Trace: [ 924.858053][T14448] dump_stack+0x197/0x210 [ 924.862386][T14448] should_fail.cold+0xa/0x15 [ 924.862406][T14448] ? fault_create_debugfs_attr+0x180/0x180 [ 924.862419][T14448] ? ___might_sleep+0x163/0x2c0 [ 924.862443][T14448] should_fail_alloc_page+0x50/0x60 [ 924.862462][T14448] __alloc_pages_nodemask+0x1a1/0x910 [ 924.888359][T14448] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 924.893929][T14448] ? __alloc_pages_slowpath+0x2920/0x2920 [ 924.899675][T14448] ? kasan_unpoison_shadow+0x35/0x50 [ 924.904981][T14448] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 924.911257][T14448] alloc_pages_current+0x107/0x210 [ 924.916387][T14448] ? ___might_sleep+0x163/0x2c0 [ 924.921261][T14448] __vmalloc_node_range+0x4f8/0x810 [ 924.926477][T14448] ? bpf_map_area_alloc+0x20/0x30 [ 924.931513][T14448] __vmalloc_node_flags_caller+0x71/0x90 [ 924.937156][T14448] ? bpf_map_area_alloc+0x20/0x30 [ 924.942194][T14448] __bpf_map_area_alloc+0xde/0xf0 [ 924.947231][T14448] bpf_map_area_alloc+0x20/0x30 06:26:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000a800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020003000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 924.952093][T14448] htab_map_alloc+0x8d3/0x11c0 [ 924.956885][T14448] ? htab_map_update_elem+0xca0/0xca0 [ 924.962279][T14448] __do_sys_bpf+0x478/0x37b0 [ 924.966893][T14448] ? bpf_prog_load+0x18a0/0x18a0 [ 924.971840][T14448] ? __kasan_check_write+0x14/0x20 [ 924.976958][T14448] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 924.982497][T14448] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 924.982511][T14448] ? wait_for_completion+0x440/0x440 [ 924.982531][T14448] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 924.982556][T14448] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 924.982568][T14448] ? do_syscall_64+0x26/0x790 [ 924.982586][T14448] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 925.009477][T14448] ? do_syscall_64+0x26/0x790 [ 925.020185][T14448] __x64_sys_bpf+0x73/0xb0 [ 925.020200][T14448] do_syscall_64+0xfa/0x790 [ 925.020223][T14448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 925.020233][T14448] RIP: 0033:0x45a679 06:26:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000b800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 925.020246][T14448] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 925.020258][T14448] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 925.066923][T14448] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 925.074909][T14448] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 925.082891][T14448] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 925.090874][T14448] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 925.098858][T14448] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:20 executing program 2 (fault-call:8 fault-nth:38): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000048, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 925.323716][T14495] FAULT_INJECTION: forcing a failure. [ 925.323716][T14495] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 925.379318][T14495] CPU: 0 PID: 14495 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 925.387690][T14495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 925.397754][T14495] Call Trace: [ 925.401056][T14495] dump_stack+0x197/0x210 [ 925.405406][T14495] should_fail.cold+0xa/0x15 [ 925.410020][T14495] ? fault_create_debugfs_attr+0x180/0x180 [ 925.415845][T14495] ? ___might_sleep+0x163/0x2c0 [ 925.420721][T14495] should_fail_alloc_page+0x50/0x60 [ 925.425940][T14495] __alloc_pages_nodemask+0x1a1/0x910 [ 925.431328][T14495] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 925.436897][T14495] ? __alloc_pages_slowpath+0x2920/0x2920 [ 925.442642][T14495] ? kasan_unpoison_shadow+0x35/0x50 [ 925.447940][T14495] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 925.454192][T14495] alloc_pages_current+0x107/0x210 [ 925.459314][T14495] ? ___might_sleep+0x163/0x2c0 [ 925.464174][T14495] __vmalloc_node_range+0x4f8/0x810 [ 925.469390][T14495] ? bpf_map_area_alloc+0x20/0x30 [ 925.474426][T14495] __vmalloc_node_flags_caller+0x71/0x90 [ 925.480072][T14495] ? bpf_map_area_alloc+0x20/0x30 [ 925.485262][T14495] __bpf_map_area_alloc+0xde/0xf0 [ 925.490277][T14495] bpf_map_area_alloc+0x20/0x30 [ 925.495115][T14495] htab_map_alloc+0x8d3/0x11c0 [ 925.499905][T14495] ? htab_map_update_elem+0xca0/0xca0 [ 925.505322][T14495] __do_sys_bpf+0x478/0x37b0 [ 925.509915][T14495] ? bpf_prog_load+0x18a0/0x18a0 [ 925.514834][T14495] ? __kasan_check_write+0x14/0x20 [ 925.519935][T14495] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 925.525473][T14495] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 925.530751][T14495] ? wait_for_completion+0x440/0x440 [ 925.536055][T14495] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 925.542297][T14495] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 925.547745][T14495] ? do_syscall_64+0x26/0x790 [ 925.552405][T14495] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 925.558464][T14495] ? do_syscall_64+0x26/0x790 [ 925.563196][T14495] __x64_sys_bpf+0x73/0xb0 [ 925.567601][T14495] do_syscall_64+0xfa/0x790 [ 925.572098][T14495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 925.577989][T14495] RIP: 0033:0x45a679 [ 925.581881][T14495] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 925.601491][T14495] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 925.609904][T14495] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 925.617904][T14495] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 925.625903][T14495] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 925.633858][T14495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 925.641822][T14495] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:26:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020004000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:35 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000c000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:35 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000058, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:35 executing program 2 (fault-call:8 fault-nth:39): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="75e10b4992c2607b", 0x8}], 0x1, &(0x7f0000000200)="8e361964401262ded25d96cc347562d6fc8b7b0e5e9c51925da978256c165afdb737a7cc09ac95efdddfd9c47b9bb24742f76a5e6f912afbbb7fecd21f0c3ad66269f54030161eda95a2ae6689a9da47aefd4adf26101915cb3cc27c8ee2bcd53dafb73ff53e46ccf6576ee06f98a50c4ab23a4735c56bafc4eb374a6d3717b9a2", 0x81, 0x66a26874bbb48802}, 0x4000000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 940.373583][T14521] FAULT_INJECTION: forcing a failure. [ 940.373583][T14521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 940.394253][T14521] CPU: 1 PID: 14521 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 940.402627][T14521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.412696][T14521] Call Trace: [ 940.416010][T14521] dump_stack+0x197/0x210 06:26:35 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000d000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 940.420375][T14521] should_fail.cold+0xa/0x15 [ 940.424995][T14521] ? fault_create_debugfs_attr+0x180/0x180 [ 940.430834][T14521] ? ___might_sleep+0x163/0x2c0 [ 940.435710][T14521] should_fail_alloc_page+0x50/0x60 [ 940.440931][T14521] __alloc_pages_nodemask+0x1a1/0x910 [ 940.446325][T14521] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 940.451889][T14521] ? __alloc_pages_slowpath+0x2920/0x2920 [ 940.457629][T14521] ? kasan_unpoison_shadow+0x35/0x50 [ 940.462938][T14521] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 940.469208][T14521] alloc_pages_current+0x107/0x210 [ 940.474336][T14521] ? ___might_sleep+0x163/0x2c0 [ 940.479210][T14521] __vmalloc_node_range+0x4f8/0x810 [ 940.484456][T14521] ? bpf_map_area_alloc+0x20/0x30 [ 940.489492][T14521] __vmalloc_node_flags_caller+0x71/0x90 [ 940.495140][T14521] ? bpf_map_area_alloc+0x20/0x30 [ 940.500190][T14521] __bpf_map_area_alloc+0xde/0xf0 [ 940.505240][T14521] bpf_map_area_alloc+0x20/0x30 [ 940.510155][T14521] htab_map_alloc+0x8d3/0x11c0 [ 940.514954][T14521] ? htab_map_update_elem+0xca0/0xca0 06:26:35 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000060, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:35 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000d800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 940.520346][T14521] __do_sys_bpf+0x478/0x37b0 [ 940.524951][T14521] ? bpf_prog_load+0x18a0/0x18a0 [ 940.529900][T14521] ? __kasan_check_write+0x14/0x20 [ 940.535031][T14521] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 940.540597][T14521] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 940.545903][T14521] ? wait_for_completion+0x440/0x440 [ 940.551206][T14521] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 940.557487][T14521] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 940.562968][T14521] ? do_syscall_64+0x26/0x790 [ 940.567667][T14521] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.573755][T14521] ? do_syscall_64+0x26/0x790 [ 940.578459][T14521] __x64_sys_bpf+0x73/0xb0 [ 940.582883][T14521] do_syscall_64+0xfa/0x790 [ 940.582907][T14521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.582919][T14521] RIP: 0033:0x45a679 [ 940.582937][T14521] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 940.616828][T14521] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 940.616845][T14521] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 940.616854][T14521] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 940.616863][T14521] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 940.616872][T14521] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 940.616887][T14521] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:36 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020005000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:36 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000e800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:36 executing program 2 (fault-call:8 fault-nth:40): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 940.936184][T14571] FAULT_INJECTION: forcing a failure. [ 940.936184][T14571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 940.978300][T14571] CPU: 0 PID: 14571 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 940.986685][T14571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.996758][T14571] Call Trace: [ 941.000066][T14571] dump_stack+0x197/0x210 [ 941.004428][T14571] should_fail.cold+0xa/0x15 [ 941.009045][T14571] ? fault_create_debugfs_attr+0x180/0x180 [ 941.014865][T14571] ? ___might_sleep+0x163/0x2c0 [ 941.019721][T14571] should_fail_alloc_page+0x50/0x60 [ 941.019736][T14571] __alloc_pages_nodemask+0x1a1/0x910 [ 941.019750][T14571] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 941.019768][T14571] ? __alloc_pages_slowpath+0x2920/0x2920 [ 941.019789][T14571] ? kasan_unpoison_shadow+0x35/0x50 [ 941.046863][T14571] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 941.053126][T14571] alloc_pages_current+0x107/0x210 [ 941.058258][T14571] ? ___might_sleep+0x163/0x2c0 [ 941.063137][T14571] __vmalloc_node_range+0x4f8/0x810 [ 941.068363][T14571] ? bpf_map_area_alloc+0x20/0x30 [ 941.073421][T14571] __vmalloc_node_flags_caller+0x71/0x90 [ 941.079080][T14571] ? bpf_map_area_alloc+0x20/0x30 [ 941.084130][T14571] __bpf_map_area_alloc+0xde/0xf0 [ 941.089178][T14571] bpf_map_area_alloc+0x20/0x30 [ 941.094058][T14571] htab_map_alloc+0x8d3/0x11c0 [ 941.098860][T14571] ? htab_map_update_elem+0xca0/0xca0 [ 941.104243][T14571] __do_sys_bpf+0x478/0x37b0 [ 941.108935][T14571] ? bpf_prog_load+0x18a0/0x18a0 [ 941.113859][T14571] ? __kasan_check_write+0x14/0x20 [ 941.118965][T14571] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 941.124533][T14571] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 941.129800][T14571] ? wait_for_completion+0x440/0x440 [ 941.135070][T14571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 941.141297][T14571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 941.146739][T14571] ? do_syscall_64+0x26/0x790 [ 941.151403][T14571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.157448][T14571] ? do_syscall_64+0x26/0x790 [ 941.162112][T14571] __x64_sys_bpf+0x73/0xb0 [ 941.166510][T14571] do_syscall_64+0xfa/0x790 [ 941.170998][T14571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.176900][T14571] RIP: 0033:0x45a679 [ 941.180796][T14571] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 941.200385][T14571] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 941.208778][T14571] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 941.216731][T14571] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 941.224684][T14571] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 941.232637][T14571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 941.240591][T14571] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0), 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, 0xffffffffffffffff, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:26:42 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000070, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:42 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000f000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:42 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020006000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:42 executing program 2 (fault-call:8 fault-nth:41): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@rc={0x1f, {0x1, 0xaa, 0x8, 0x0, 0x6, 0x2}, 0x57}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="87653bb005fe48788542e8966db811dc035e44b04687fed92d18f6392cea0de3966822b5", 0x24}], 0x1, &(0x7f0000000200)=[{0xa8, 0x10b, 0xdc6, "15423651054f2633cdb4d9e0f0bc474f0a8920b23f38ae70c61cd933321f1c4289214811c999055ebcec79a715588a45d4d7631a068e9542da0771a7b52f9c217c03c1022f9a083db00845c0e116594fcdc284fc043a83fdd6b11cf911b82c2af148589214b2ae95cfe75a53e760dc51bf609aea058dfd7b3f88b7ada95ed71b3be945e81f0c424b0c7e51433a74e7ff5bb25f13836a62de"}, {0xd0, 0x0, 0x3f, "90afef2e84262f619f6fa3701be595d8b4b10c6b48cdd20855dc0d0d20e60e8e9ea0329d7b99b7e8f5c04aeb81ebc282e1fbc373beda0a8b49d55954f4e464badd5f99b2760260c9c535d0222386761e55b31fbbf3a88d3af9f0a320906d83034574fac75d73b1339c5351791e7cc054737d98cd6ee2ddea26504903c3dc0f25a2b906b1aa075404c581fb9697942f6c6000b40c6f1e30857a8bb9e5d9ae24d74490550c9cd8cd35d8aea9f32b948ec97991490acbe2448a83"}, {0x48, 0xfe, 0x10001, "dc9aeb105aa6022ba163c28e015f26519d012a7ce317a52d0487a473b85adb87960d6051c0953cd5c40225f0b93fe63a4a7103"}, {0x100, 0x29, 0x4d88, "b73588b47de46cafef398ca8b23225792ce0eb79f7c90bbe1bf35c05737ee8255749c75f6add4363994526f611a41360c74807606c6ca079610807ad116d2185a585efee3d000d2eb07add3c16a951f9e9e9b6a717e2381ddbc0da06655062014e020b5595678a507469bce458620a31421d956e5d855739e1f77c01c6ed9d41cc318bb11b247f3dc016144d7960ff47bf3561e59419a0c416bea4c33446cb527a7a2b6f15ac8e4ebf175c58887cf8270778005b29cb02fcea85a0174dcc0506fafcf6c0cb6a763d34e3dcf8d05f6e54599dac138a400a68516b084ee2757fa06ac3ae79e851282ada38c16d"}, {0x80, 0x10e, 0x20, "93e97f44a19fc38b09d19d25b490ec71c3e5cdbeab5f512f27a07a70d38a27b7bb6e8bcfe3271924d5df3ffffd622ceae89f4eb2a5c62c10cd987c80f019cd71e7c07488958147847bacdee0141d780cc12edb1002ee7b2fa58c937e8dde33aba94931c531d7f43c7ad4"}, {0x78, 0x6, 0x1, "503ba9b6f53366c632f4003cc776ca86aa8e332c54c894b4c410a5122d8984b7fbb790bdd13ab48ff7901e469b34c847eacdb278653cf5b65912b16d33f99c8fea8490ce16568a5012cfb33ff9c66c611e0a788ebe9ca76dbb2a800f6b09b52591d985ebdf"}, {0xc0, 0x114, 0x3, "12d17f096180ed2c768d1b8a153333b092d2e6e571ac26992259c74923adff8e1e49ae915f69d2b5ebe1737583910322f2be61c5e81eb0967906afeac8dc1400fd90df3ceb1a38fb2073ff2b8a7a4a6feaf534c41a4f52c256a42a66b48e5b57a98d2c5c39701e5911bcc5ddd097d87ab46fd0cbb987b65be0cf09a1d422d231dc8916da32642e401162fa8d22e435f1e4f75751211d664da20294d1c19f38bb3ee3386000ffbc93d1a475589a81ed6d"}], 0x478}, 0x10000040) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 947.625259][T14591] FAULT_INJECTION: forcing a failure. [ 947.625259][T14591] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 947.649057][T14591] CPU: 0 PID: 14591 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 947.657424][T14591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.667491][T14591] Call Trace: [ 947.670799][T14591] dump_stack+0x197/0x210 [ 947.675159][T14591] should_fail.cold+0xa/0x15 [ 947.679768][T14591] ? fault_create_debugfs_attr+0x180/0x180 [ 947.685601][T14591] ? ___might_sleep+0x163/0x2c0 [ 947.690484][T14591] should_fail_alloc_page+0x50/0x60 [ 947.695706][T14591] __alloc_pages_nodemask+0x1a1/0x910 [ 947.701106][T14591] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 947.706681][T14591] ? __alloc_pages_slowpath+0x2920/0x2920 [ 947.712435][T14591] ? kasan_unpoison_shadow+0x35/0x50 [ 947.717750][T14591] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 947.724008][T14591] alloc_pages_current+0x107/0x210 [ 947.729134][T14591] ? ___might_sleep+0x163/0x2c0 [ 947.734006][T14591] __vmalloc_node_range+0x4f8/0x810 [ 947.739250][T14591] ? bpf_map_area_alloc+0x20/0x30 [ 947.744291][T14591] __vmalloc_node_flags_caller+0x71/0x90 [ 947.749942][T14591] ? bpf_map_area_alloc+0x20/0x30 [ 947.754982][T14591] __bpf_map_area_alloc+0xde/0xf0 [ 947.760026][T14591] bpf_map_area_alloc+0x20/0x30 [ 947.764892][T14591] htab_map_alloc+0x8d3/0x11c0 [ 947.769699][T14591] ? htab_map_update_elem+0xca0/0xca0 [ 947.775087][T14591] __do_sys_bpf+0x478/0x37b0 [ 947.779693][T14591] ? bpf_prog_load+0x18a0/0x18a0 [ 947.784649][T14591] ? __kasan_check_write+0x14/0x20 [ 947.789754][T14591] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 947.789769][T14591] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 947.789784][T14591] ? wait_for_completion+0x440/0x440 [ 947.789804][T14591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 947.789831][T14591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 947.817579][T14591] ? do_syscall_64+0x26/0x790 [ 947.822280][T14591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.828343][T14591] ? do_syscall_64+0x26/0x790 [ 947.833040][T14591] __x64_sys_bpf+0x73/0xb0 [ 947.837484][T14591] do_syscall_64+0xfa/0x790 [ 947.842006][T14591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.847904][T14591] RIP: 0033:0x45a679 [ 947.851810][T14591] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:26:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000010800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000011800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020007000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000012000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 947.871623][T14591] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 947.880047][T14591] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 947.888029][T14591] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 947.896018][T14591] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 947.904005][T14591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 947.911990][T14591] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:43 executing program 2 (fault-call:8 fault-nth:42): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020008000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 948.139034][T14640] FAULT_INJECTION: forcing a failure. [ 948.139034][T14640] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 948.180720][T14640] CPU: 1 PID: 14640 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 948.189089][T14640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.199154][T14640] Call Trace: [ 948.202482][T14640] dump_stack+0x197/0x210 [ 948.206840][T14640] should_fail.cold+0xa/0x15 [ 948.211463][T14640] ? fault_create_debugfs_attr+0x180/0x180 [ 948.217291][T14640] ? ___might_sleep+0x163/0x2c0 [ 948.222175][T14640] should_fail_alloc_page+0x50/0x60 [ 948.227392][T14640] __alloc_pages_nodemask+0x1a1/0x910 [ 948.232783][T14640] ? __alloc_pages_slowpath+0x2920/0x2920 [ 948.238528][T14640] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 948.244095][T14640] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 948.250088][T14640] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 948.256335][T14640] alloc_pages_current+0x107/0x210 [ 948.261462][T14640] __get_free_pages+0xc/0x40 [ 948.266064][T14640] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 948.271711][T14640] apply_to_page_range+0x445/0x700 [ 948.276842][T14640] ? memset+0x40/0x40 [ 948.280840][T14640] kasan_populate_vmalloc+0x68/0x90 [ 948.286047][T14640] __vmalloc_node_range+0x47e/0x810 [ 948.291264][T14640] ? bpf_map_area_alloc+0x20/0x30 [ 948.296304][T14640] __vmalloc_node_flags_caller+0x71/0x90 [ 948.301945][T14640] ? bpf_map_area_alloc+0x20/0x30 [ 948.306953][T14640] __bpf_map_area_alloc+0xde/0xf0 [ 948.311961][T14640] bpf_map_area_alloc+0x20/0x30 [ 948.316796][T14640] htab_map_alloc+0x8d3/0x11c0 [ 948.321581][T14640] ? htab_map_update_elem+0xca0/0xca0 [ 948.326931][T14640] __do_sys_bpf+0x478/0x37b0 [ 948.331500][T14640] ? bpf_prog_load+0x18a0/0x18a0 [ 948.336417][T14640] ? __kasan_check_write+0x14/0x20 [ 948.341558][T14640] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 948.347083][T14640] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 948.352352][T14640] ? wait_for_completion+0x440/0x440 [ 948.357630][T14640] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 948.363857][T14640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.369305][T14640] ? do_syscall_64+0x26/0x790 [ 948.373974][T14640] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.380020][T14640] ? do_syscall_64+0x26/0x790 [ 948.384678][T14640] __x64_sys_bpf+0x73/0xb0 [ 948.389091][T14640] do_syscall_64+0xfa/0x790 [ 948.393576][T14640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.399443][T14640] RIP: 0033:0x45a679 [ 948.403318][T14640] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.422896][T14640] RSP: 002b:00007f250db00c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 948.431284][T14640] RAX: ffffffffffffffda RBX: 00007f250db00c90 RCX: 000000000045a679 [ 948.439246][T14640] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 948.447191][T14640] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 948.455143][T14640] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db016d4 [ 948.463093][T14640] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0), 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, 0xffffffffffffffff, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:26:54 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000078, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:54 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000013000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:54 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020009000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:54 executing program 2 (fault-call:8 fault-nth:43): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:54 executing program 1: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) [ 958.988154][T14666] FAULT_INJECTION: forcing a failure. [ 958.988154][T14666] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 959.018342][T14666] CPU: 1 PID: 14666 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 959.026733][T14666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.036809][T14666] Call Trace: [ 959.040203][T14666] dump_stack+0x197/0x210 [ 959.044555][T14666] should_fail.cold+0xa/0x15 [ 959.049172][T14666] ? fault_create_debugfs_attr+0x180/0x180 [ 959.054993][T14666] ? ___might_sleep+0x163/0x2c0 [ 959.059876][T14666] should_fail_alloc_page+0x50/0x60 [ 959.065094][T14666] __alloc_pages_nodemask+0x1a1/0x910 [ 959.070497][T14666] ? __alloc_pages_slowpath+0x2920/0x2920 [ 959.076245][T14666] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 959.081805][T14666] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 959.087783][T14666] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 959.094022][T14666] alloc_pages_current+0x107/0x210 [ 959.094041][T14666] __get_free_pages+0xc/0x40 [ 959.094054][T14666] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 959.094071][T14666] apply_to_page_range+0x445/0x700 [ 959.094090][T14666] ? memset+0x40/0x40 [ 959.118479][T14666] kasan_populate_vmalloc+0x68/0x90 [ 959.123704][T14666] __vmalloc_node_range+0x47e/0x810 [ 959.128933][T14666] ? bpf_map_area_alloc+0x20/0x30 [ 959.133980][T14666] __vmalloc_node_flags_caller+0x71/0x90 [ 959.139631][T14666] ? bpf_map_area_alloc+0x20/0x30 [ 959.144675][T14666] __bpf_map_area_alloc+0xde/0xf0 [ 959.149733][T14666] bpf_map_area_alloc+0x20/0x30 [ 959.154608][T14666] htab_map_alloc+0x8d3/0x11c0 [ 959.159402][T14666] ? htab_map_update_elem+0xca0/0xca0 [ 959.164802][T14666] __do_sys_bpf+0x478/0x37b0 [ 959.169416][T14666] ? bpf_prog_load+0x18a0/0x18a0 [ 959.174372][T14666] ? __kasan_check_write+0x14/0x20 [ 959.179507][T14666] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 959.185072][T14666] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 959.190379][T14666] ? wait_for_completion+0x440/0x440 [ 959.195810][T14666] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 959.202085][T14666] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 959.207562][T14666] ? do_syscall_64+0x26/0x790 [ 959.212238][T14666] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.212251][T14666] ? do_syscall_64+0x26/0x790 [ 959.212269][T14666] __x64_sys_bpf+0x73/0xb0 [ 959.212284][T14666] do_syscall_64+0xfa/0x790 [ 959.212301][T14666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.212310][T14666] RIP: 0033:0x45a679 [ 959.212328][T14666] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 959.261323][T14666] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 959.269748][T14666] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 959.277738][T14666] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:26:54 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000088, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:54 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000090, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:54 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000013800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 959.285726][T14666] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 959.293708][T14666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 959.301697][T14666] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:26:54 executing program 2 (fault-call:8 fault-nth:44): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:26:54 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000a0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 959.469617][T14709] FAULT_INJECTION: forcing a failure. [ 959.469617][T14709] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 959.492454][T14709] CPU: 0 PID: 14709 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 959.500839][T14709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.510904][T14709] Call Trace: [ 959.514207][T14709] dump_stack+0x197/0x210 06:26:54 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000a000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 959.518559][T14709] should_fail.cold+0xa/0x15 [ 959.523154][T14709] ? fault_create_debugfs_attr+0x180/0x180 [ 959.528971][T14709] ? ___might_sleep+0x163/0x2c0 [ 959.533849][T14709] should_fail_alloc_page+0x50/0x60 [ 959.539067][T14709] __alloc_pages_nodemask+0x1a1/0x910 [ 959.544461][T14709] ? find_held_lock+0x35/0x130 [ 959.549247][T14709] ? __alloc_pages_slowpath+0x2920/0x2920 [ 959.554968][T14709] ? lock_downgrade+0x920/0x920 [ 959.559811][T14709] ? rwlock_bug.part.0+0x90/0x90 [ 959.559825][T14709] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 959.559843][T14709] alloc_pages_current+0x107/0x210 [ 959.559860][T14709] __get_free_pages+0xc/0x40 [ 959.559872][T14709] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 959.559890][T14709] apply_to_page_range+0x445/0x700 [ 959.559906][T14709] ? memset+0x40/0x40 [ 959.591474][T14709] kasan_populate_vmalloc+0x68/0x90 [ 959.591491][T14709] __vmalloc_node_range+0x47e/0x810 [ 959.591513][T14709] ? bpf_map_area_alloc+0x20/0x30 [ 959.600691][T14709] __vmalloc_node_flags_caller+0x71/0x90 [ 959.600708][T14709] ? bpf_map_area_alloc+0x20/0x30 [ 959.600721][T14709] __bpf_map_area_alloc+0xde/0xf0 [ 959.600736][T14709] bpf_map_area_alloc+0x20/0x30 [ 959.600751][T14709] htab_map_alloc+0x8d3/0x11c0 [ 959.600774][T14709] ? htab_map_update_elem+0xca0/0xca0 [ 959.600789][T14709] __do_sys_bpf+0x478/0x37b0 [ 959.600804][T14709] ? bpf_prog_load+0x18a0/0x18a0 [ 959.600821][T14709] ? __kasan_check_write+0x14/0x20 [ 959.656373][T14709] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 959.661944][T14709] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 959.667255][T14709] ? wait_for_completion+0x440/0x440 [ 959.672567][T14709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 959.678843][T14709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 959.684323][T14709] ? do_syscall_64+0x26/0x790 [ 959.689012][T14709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.695079][T14709] ? do_syscall_64+0x26/0x790 [ 959.695101][T14709] __x64_sys_bpf+0x73/0xb0 [ 959.704204][T14709] do_syscall_64+0xfa/0x790 [ 959.708731][T14709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.714631][T14709] RIP: 0033:0x45a679 [ 959.718536][T14709] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 959.738155][T14709] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 959.746582][T14709] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 959.754566][T14709] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 959.762551][T14709] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 959.770536][T14709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 959.778521][T14709] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0), 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, 0xffffffffffffffff, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:27:09 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000a8, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:09 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000b000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:09 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000014800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:09 executing program 2 (fault-call:8 fault-nth:45): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000001540)={&(0x7f0000000000)=@nfc, 0xffffffffffffff6f, &(0x7f0000001440)=[{&(0x7f0000000080)=""/13, 0xfffffffffffffe9c}, {&(0x7f0000000100)}, {&(0x7f0000000200)=""/212, 0xd4}, {&(0x7f0000000300)=""/107, 0x6b}, {&(0x7f0000000380)=""/4096, 0x12a8}, {&(0x7f0000001380)=""/192, 0xc0}, {&(0x7f0000000140)=""/10, 0xa}], 0x7, &(0x7f00000014c0)=""/120, 0xffffffffffffffb8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000001580)={r3}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 974.588961][T14751] FAULT_INJECTION: forcing a failure. [ 974.588961][T14751] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 974.621555][T14751] CPU: 1 PID: 14751 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 06:27:10 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000c000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 974.629934][T14751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.640003][T14751] Call Trace: [ 974.643314][T14751] dump_stack+0x197/0x210 [ 974.647671][T14751] should_fail.cold+0xa/0x15 [ 974.652386][T14751] ? fault_create_debugfs_attr+0x180/0x180 [ 974.658217][T14751] ? ___might_sleep+0x163/0x2c0 [ 974.663098][T14751] should_fail_alloc_page+0x50/0x60 [ 974.668318][T14751] __alloc_pages_nodemask+0x1a1/0x910 [ 974.673714][T14751] ? find_held_lock+0x35/0x130 [ 974.678499][T14751] ? __alloc_pages_slowpath+0x2920/0x2920 [ 974.684240][T14751] ? lock_downgrade+0x920/0x920 [ 974.689111][T14751] ? rwlock_bug.part.0+0x90/0x90 [ 974.689128][T14751] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 974.689146][T14751] alloc_pages_current+0x107/0x210 [ 974.689167][T14751] __get_free_pages+0xc/0x40 [ 974.705424][T14751] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 974.715633][T14751] apply_to_page_range+0x445/0x700 [ 974.720762][T14751] ? memset+0x40/0x40 [ 974.724769][T14751] kasan_populate_vmalloc+0x68/0x90 [ 974.729984][T14751] __vmalloc_node_range+0x47e/0x810 [ 974.735206][T14751] ? bpf_map_area_alloc+0x20/0x30 [ 974.740248][T14751] __vmalloc_node_flags_caller+0x71/0x90 [ 974.745912][T14751] ? bpf_map_area_alloc+0x20/0x30 [ 974.750963][T14751] __bpf_map_area_alloc+0xde/0xf0 [ 974.756005][T14751] bpf_map_area_alloc+0x20/0x30 [ 974.760881][T14751] htab_map_alloc+0x8d3/0x11c0 [ 974.765686][T14751] ? htab_map_update_elem+0xca0/0xca0 [ 974.771079][T14751] __do_sys_bpf+0x478/0x37b0 [ 974.775798][T14751] ? bpf_prog_load+0x18a0/0x18a0 [ 974.780752][T14751] ? __kasan_check_write+0x14/0x20 06:27:10 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000d000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 974.785880][T14751] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 974.791442][T14751] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 974.796752][T14751] ? wait_for_completion+0x440/0x440 [ 974.802167][T14751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 974.808436][T14751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 974.813923][T14751] ? do_syscall_64+0x26/0x790 [ 974.818727][T14751] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.824808][T14751] ? do_syscall_64+0x26/0x790 [ 974.829512][T14751] __x64_sys_bpf+0x73/0xb0 [ 974.833950][T14751] do_syscall_64+0xfa/0x790 [ 974.838470][T14751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.844370][T14751] RIP: 0033:0x45a679 [ 974.848277][T14751] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.867892][T14751] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 974.867908][T14751] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 06:27:10 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000015000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 974.867915][T14751] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 974.867922][T14751] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 974.867929][T14751] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 974.867936][T14751] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:10 executing program 2 (fault-call:8 fault-nth:46): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000b8, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:10 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000016000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 975.047383][T14790] FAULT_INJECTION: forcing a failure. [ 975.047383][T14790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 975.122934][T14790] CPU: 1 PID: 14790 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 975.131304][T14790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.141481][T14790] Call Trace: [ 975.144787][T14790] dump_stack+0x197/0x210 [ 975.149143][T14790] should_fail.cold+0xa/0x15 [ 975.153750][T14790] ? fault_create_debugfs_attr+0x180/0x180 [ 975.159572][T14790] ? ___might_sleep+0x163/0x2c0 [ 975.164449][T14790] should_fail_alloc_page+0x50/0x60 [ 975.169667][T14790] __alloc_pages_nodemask+0x1a1/0x910 [ 975.175069][T14790] ? __alloc_pages_slowpath+0x2920/0x2920 [ 975.180810][T14790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 975.187133][T14790] ? find_next_bit+0x107/0x130 [ 975.191911][T14790] pcpu_populate_chunk+0xf8/0x940 [ 975.196951][T14790] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 975.202678][T14790] ? find_next_bit+0x67/0x130 [ 975.207374][T14790] pcpu_alloc+0xd5b/0x1380 [ 975.211807][T14790] ? pcpu_alloc_area+0x820/0x820 [ 975.216759][T14790] ? bpf_map_area_alloc+0x20/0x30 [ 975.221800][T14790] __alloc_percpu_gfp+0x28/0x30 [ 975.226665][T14790] htab_map_alloc+0xdb9/0x11c0 [ 975.231450][T14790] ? htab_map_update_elem+0xca0/0xca0 [ 975.236830][T14790] __do_sys_bpf+0x478/0x37b0 [ 975.241433][T14790] ? bpf_prog_load+0x18a0/0x18a0 [ 975.246378][T14790] ? __kasan_check_write+0x14/0x20 [ 975.251495][T14790] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 975.257054][T14790] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 975.262352][T14790] ? wait_for_completion+0x440/0x440 [ 975.267651][T14790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 975.273910][T14790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 975.279379][T14790] ? do_syscall_64+0x26/0x790 [ 975.284067][T14790] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.290138][T14790] ? do_syscall_64+0x26/0x790 [ 975.294823][T14790] __x64_sys_bpf+0x73/0xb0 [ 975.299237][T14790] do_syscall_64+0xfa/0x790 [ 975.303728][T14790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.309606][T14790] RIP: 0033:0x45a679 [ 975.313491][T14790] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 975.333132][T14790] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 975.341525][T14790] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 975.349475][T14790] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 975.357424][T14790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 975.365373][T14790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 975.373324][T14790] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:27:19 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000016800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000c0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:19 executing program 2 (fault-call:8 fault-nth:47): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:19 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000e000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r2, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r0, 0x0, 0x12, &(0x7f0000000100)='./cgroup.cpu/syz1\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x2, 0x1, 0xf7, 0x1, 0x0, 0x4, 0xe7a236845c43eef0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x100000000, 0xbe4}, 0x200, 0xd7c8, 0xffffffff, 0x7, 0x4, 0x8000, 0x1f}, r3, 0x2, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 983.873019][T14827] FAULT_INJECTION: forcing a failure. [ 983.873019][T14827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 983.936401][T14827] CPU: 0 PID: 14827 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 983.944763][T14827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.954816][T14827] Call Trace: [ 983.954908][T14827] dump_stack+0x197/0x210 [ 983.954930][T14827] should_fail.cold+0xa/0x15 [ 983.954949][T14827] ? fault_create_debugfs_attr+0x180/0x180 [ 983.954962][T14827] ? ___might_sleep+0x163/0x2c0 [ 983.954987][T14827] should_fail_alloc_page+0x50/0x60 [ 983.983074][T14827] __alloc_pages_nodemask+0x1a1/0x910 [ 983.988460][T14827] ? __alloc_pages_slowpath+0x2920/0x2920 [ 983.994201][T14827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.000443][T14827] ? find_next_bit+0x107/0x130 [ 984.000465][T14827] pcpu_populate_chunk+0xf8/0x940 [ 984.000479][T14827] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 984.000490][T14827] ? find_next_bit+0x67/0x130 [ 984.000510][T14827] pcpu_alloc+0xd5b/0x1380 [ 984.000532][T14827] ? pcpu_alloc_area+0x820/0x820 [ 984.000547][T14827] ? bpf_map_area_alloc+0x20/0x30 [ 984.000577][T14827] __alloc_percpu_gfp+0x28/0x30 [ 984.020695][T14827] htab_map_alloc+0xdb9/0x11c0 [ 984.020721][T14827] ? htab_map_update_elem+0xca0/0xca0 [ 984.050005][T14827] __do_sys_bpf+0x478/0x37b0 [ 984.054620][T14827] ? bpf_prog_load+0x18a0/0x18a0 [ 984.059581][T14827] ? __kasan_check_write+0x14/0x20 [ 984.064715][T14827] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 984.070270][T14827] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 984.075578][T14827] ? wait_for_completion+0x440/0x440 [ 984.080879][T14827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.087158][T14827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 984.092739][T14827] ? do_syscall_64+0x26/0x790 [ 984.097437][T14827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.103519][T14827] ? do_syscall_64+0x26/0x790 [ 984.108219][T14827] __x64_sys_bpf+0x73/0xb0 [ 984.112648][T14827] do_syscall_64+0xfa/0x790 [ 984.117172][T14827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.123070][T14827] RIP: 0033:0x45a679 06:27:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000d0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:19 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000017800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:19 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000018000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 984.126975][T14827] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.146580][T14827] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 984.146594][T14827] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 984.146602][T14827] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 984.146609][T14827] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 984.146617][T14827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 06:27:19 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000019000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 984.146625][T14827] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:19 executing program 2 (fault-call:8 fault-nth:48): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:19 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000f000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 984.365508][T14874] FAULT_INJECTION: forcing a failure. [ 984.365508][T14874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 984.409432][T14874] CPU: 1 PID: 14874 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 984.417806][T14874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.427880][T14874] Call Trace: [ 984.431174][T14874] dump_stack+0x197/0x210 [ 984.435497][T14874] should_fail.cold+0xa/0x15 [ 984.440076][T14874] ? fault_create_debugfs_attr+0x180/0x180 [ 984.445896][T14874] ? ___might_sleep+0x163/0x2c0 [ 984.450765][T14874] should_fail_alloc_page+0x50/0x60 [ 984.455974][T14874] __alloc_pages_nodemask+0x1a1/0x910 [ 984.461378][T14874] ? __alloc_pages_slowpath+0x2920/0x2920 [ 984.467130][T14874] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.473386][T14874] ? find_next_bit+0x107/0x130 [ 984.478261][T14874] pcpu_populate_chunk+0xf8/0x940 [ 984.483302][T14874] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 984.489036][T14874] ? find_next_bit+0x67/0x130 [ 984.493733][T14874] pcpu_alloc+0xd5b/0x1380 [ 984.498172][T14874] ? pcpu_alloc_area+0x820/0x820 [ 984.503094][T14874] ? bpf_map_area_alloc+0x20/0x30 [ 984.508105][T14874] __alloc_percpu_gfp+0x28/0x30 [ 984.512947][T14874] htab_map_alloc+0xdb9/0x11c0 [ 984.517738][T14874] ? htab_map_update_elem+0xca0/0xca0 [ 984.523125][T14874] __do_sys_bpf+0x478/0x37b0 [ 984.527733][T14874] ? bpf_prog_load+0x18a0/0x18a0 [ 984.532681][T14874] ? __kasan_check_write+0x14/0x20 [ 984.537804][T14874] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 984.543364][T14874] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 984.548659][T14874] ? wait_for_completion+0x440/0x440 [ 984.553933][T14874] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.560177][T14874] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 984.565625][T14874] ? do_syscall_64+0x26/0x790 [ 984.570294][T14874] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.576339][T14874] ? do_syscall_64+0x26/0x790 [ 984.580999][T14874] __x64_sys_bpf+0x73/0xb0 [ 984.585398][T14874] do_syscall_64+0xfa/0x790 [ 984.589887][T14874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.595757][T14874] RIP: 0033:0x45a679 [ 984.599630][T14874] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.619328][T14874] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 984.627762][T14874] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 984.635716][T14874] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 984.643674][T14874] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 984.651630][T14874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 984.659582][T14874] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:26 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000019800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:27:26 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000d8, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:26 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020010000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:26 executing program 2 (fault-call:8 fault-nth:49): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 991.066593][T14899] FAULT_INJECTION: forcing a failure. [ 991.066593][T14899] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 991.080181][T14899] CPU: 0 PID: 14899 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 991.088524][T14899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.098597][T14899] Call Trace: [ 991.101900][T14899] dump_stack+0x197/0x210 [ 991.106258][T14899] should_fail.cold+0xa/0x15 [ 991.110878][T14899] ? fault_create_debugfs_attr+0x180/0x180 [ 991.116705][T14899] ? ___might_sleep+0x163/0x2c0 [ 991.121592][T14899] should_fail_alloc_page+0x50/0x60 [ 991.126817][T14899] __alloc_pages_nodemask+0x1a1/0x910 [ 991.132222][T14899] ? __alloc_pages_slowpath+0x2920/0x2920 [ 991.137977][T14899] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 991.144229][T14899] ? find_next_bit+0x107/0x130 [ 991.149019][T14899] pcpu_populate_chunk+0xf8/0x940 [ 991.154058][T14899] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 991.159793][T14899] ? find_next_bit+0x67/0x130 [ 991.164477][T14899] pcpu_alloc+0xd5b/0x1380 [ 991.168908][T14899] ? pcpu_alloc_area+0x820/0x820 [ 991.168923][T14899] ? bpf_map_area_alloc+0x20/0x30 [ 991.168944][T14899] __alloc_percpu_gfp+0x28/0x30 [ 991.168958][T14899] htab_map_alloc+0xdb9/0x11c0 [ 991.168984][T14899] ? htab_map_update_elem+0xca0/0xca0 [ 991.194008][T14899] __do_sys_bpf+0x478/0x37b0 [ 991.198620][T14899] ? bpf_prog_load+0x18a0/0x18a0 [ 991.203580][T14899] ? __kasan_check_write+0x14/0x20 [ 991.208707][T14899] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 991.214271][T14899] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 991.219580][T14899] ? wait_for_completion+0x440/0x440 [ 991.224890][T14899] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 991.231161][T14899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 991.236639][T14899] ? do_syscall_64+0x26/0x790 [ 991.241336][T14899] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.247420][T14899] ? do_syscall_64+0x26/0x790 [ 991.252120][T14899] __x64_sys_bpf+0x73/0xb0 [ 991.256565][T14899] do_syscall_64+0xfa/0x790 [ 991.261091][T14899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.266990][T14899] RIP: 0033:0x45a679 [ 991.270894][T14899] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 991.290498][T14899] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 991.298892][T14899] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 991.306842][T14899] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 991.314793][T14899] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 991.322774][T14899] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 991.330769][T14899] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:28 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r0, 0x0, 0x1, &(0x7f0000000100)='\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x7, 0x4}, 0x0, 0x0, &(0x7f0000000080)={0x4, 0x1, 0x12a, 0x2}, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x200}}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7, 0x40, 0x0, 0x80, 0x0, 0x800, 0x8219, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000005c0)}, 0x2608, 0x7fffffff, 0x101, 0x8, 0xffffffffffffff01, 0x3, 0x3c}, 0x0, 0xffffffffffffffff, r3, 0xa) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x3, 0x3f, 0x3f, 0x6, 0x0, 0x8, 0x20, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340)}, 0x80, 0x8, 0x80000000, 0x0, 0x40, 0x1000, 0x5}, r3, 0x0, r4, 0x3) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)='\x00') 06:27:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000e8, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000001a800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:28 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020011000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:28 executing program 2 (fault-call:8 fault-nth:50): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 992.983774][T14926] FAULT_INJECTION: forcing a failure. [ 992.983774][T14926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 992.999707][T14926] CPU: 0 PID: 14926 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 993.008068][T14926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.018138][T14926] Call Trace: [ 993.021445][T14926] dump_stack+0x197/0x210 [ 993.025804][T14926] should_fail.cold+0xa/0x15 [ 993.030428][T14926] ? fault_create_debugfs_attr+0x180/0x180 [ 993.036255][T14926] ? ___might_sleep+0x163/0x2c0 [ 993.041134][T14926] should_fail_alloc_page+0x50/0x60 [ 993.046360][T14926] __alloc_pages_nodemask+0x1a1/0x910 [ 993.051770][T14926] ? __alloc_pages_slowpath+0x2920/0x2920 [ 993.057521][T14926] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 993.063780][T14926] ? find_next_bit+0x107/0x130 [ 993.068570][T14926] pcpu_populate_chunk+0xf8/0x940 [ 993.073617][T14926] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 993.079356][T14926] ? find_next_bit+0x67/0x130 [ 993.084054][T14926] pcpu_alloc+0xd5b/0x1380 [ 993.088490][T14926] ? pcpu_alloc_area+0x820/0x820 [ 993.093438][T14926] ? bpf_map_area_alloc+0x20/0x30 [ 993.098485][T14926] __alloc_percpu_gfp+0x28/0x30 [ 993.103345][T14926] htab_map_alloc+0xdb9/0x11c0 [ 993.108129][T14926] ? htab_map_update_elem+0xca0/0xca0 [ 993.113510][T14926] __do_sys_bpf+0x478/0x37b0 [ 993.118119][T14926] ? bpf_prog_load+0x18a0/0x18a0 [ 993.123060][T14926] ? __kasan_check_write+0x14/0x20 [ 993.128185][T14926] ? __mutex_unlock_slowpath+0xf0/0x6a0 06:27:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200000000f0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000001b000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 993.133736][T14926] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 993.139015][T14926] ? wait_for_completion+0x440/0x440 [ 993.139037][T14926] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 993.139062][T14926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 993.139076][T14926] ? do_syscall_64+0x26/0x790 [ 993.139090][T14926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.139103][T14926] ? do_syscall_64+0x26/0x790 [ 993.139124][T14926] __x64_sys_bpf+0x73/0xb0 [ 993.139139][T14926] do_syscall_64+0xfa/0x790 [ 993.139156][T14926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.139171][T14926] RIP: 0033:0x45a679 [ 993.171500][T14926] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 993.171508][T14926] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 993.171521][T14926] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 993.171530][T14926] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:27:28 executing program 2 (fault-call:8 fault-nth:51): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 993.171537][T14926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 993.171546][T14926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 993.171555][T14926] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 993.286231][T14947] FAULT_INJECTION: forcing a failure. [ 993.286231][T14947] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 993.309769][T14947] CPU: 0 PID: 14947 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 993.318137][T14947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.328198][T14947] Call Trace: [ 993.331504][T14947] dump_stack+0x197/0x210 [ 993.335861][T14947] should_fail.cold+0xa/0x15 [ 993.340488][T14947] ? fault_create_debugfs_attr+0x180/0x180 [ 993.346303][T14947] ? ___might_sleep+0x163/0x2c0 [ 993.346329][T14947] should_fail_alloc_page+0x50/0x60 [ 993.356370][T14947] __alloc_pages_nodemask+0x1a1/0x910 [ 993.361773][T14947] ? __alloc_pages_slowpath+0x2920/0x2920 [ 993.367531][T14947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 993.373803][T14947] ? find_next_bit+0x107/0x130 [ 993.378574][T14947] pcpu_populate_chunk+0xf8/0x940 [ 993.378589][T14947] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 993.378601][T14947] ? find_next_bit+0x67/0x130 [ 993.378619][T14947] pcpu_alloc+0xd5b/0x1380 [ 993.378639][T14947] ? pcpu_alloc_area+0x820/0x820 [ 993.378653][T14947] ? bpf_map_area_alloc+0x20/0x30 [ 993.378675][T14947] __alloc_percpu_gfp+0x28/0x30 [ 993.378693][T14947] htab_map_alloc+0xdb9/0x11c0 [ 993.394091][T14947] ? htab_map_update_elem+0xca0/0xca0 [ 993.423375][T14947] __do_sys_bpf+0x478/0x37b0 [ 993.427986][T14947] ? bpf_prog_load+0x18a0/0x18a0 [ 993.432939][T14947] ? __kasan_check_write+0x14/0x20 [ 993.438071][T14947] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 993.443635][T14947] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 993.448933][T14947] ? wait_for_completion+0x440/0x440 [ 993.454239][T14947] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 993.460607][T14947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 993.466069][T14947] ? do_syscall_64+0x26/0x790 [ 993.470733][T14947] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.476780][T14947] ? do_syscall_64+0x26/0x790 [ 993.481442][T14947] __x64_sys_bpf+0x73/0xb0 [ 993.485880][T14947] do_syscall_64+0xfa/0x790 [ 993.490374][T14947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.496242][T14947] RIP: 0033:0x45a679 [ 993.500119][T14947] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 993.519751][T14947] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 993.528156][T14947] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 993.536108][T14947] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 993.544059][T14947] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 993.552014][T14947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 993.560016][T14947] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:27:39 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000180, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000001c000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:39 executing program 2 (fault-call:8 fault-nth:52): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1004.497909][T14971] FAULT_INJECTION: forcing a failure. [ 1004.497909][T14971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1004.518546][T14971] CPU: 0 PID: 14971 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1004.526922][T14971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.536990][T14971] Call Trace: [ 1004.540299][T14971] dump_stack+0x197/0x210 [ 1004.544652][T14971] should_fail.cold+0xa/0x15 [ 1004.549263][T14971] ? fault_create_debugfs_attr+0x180/0x180 [ 1004.555077][T14971] ? ___might_sleep+0x163/0x2c0 [ 1004.559952][T14971] should_fail_alloc_page+0x50/0x60 [ 1004.565179][T14971] __alloc_pages_nodemask+0x1a1/0x910 [ 1004.570582][T14971] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1004.576358][T14971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1004.582657][T14971] ? find_next_bit+0x107/0x130 [ 1004.587451][T14971] pcpu_populate_chunk+0xf8/0x940 [ 1004.592498][T14971] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1004.598236][T14971] ? find_next_bit+0x67/0x130 [ 1004.602938][T14971] pcpu_alloc+0xd5b/0x1380 [ 1004.607386][T14971] ? pcpu_alloc_area+0x820/0x820 [ 1004.612335][T14971] ? bpf_map_area_alloc+0x20/0x30 [ 1004.617395][T14971] __alloc_percpu_gfp+0x28/0x30 [ 1004.622273][T14971] htab_map_alloc+0xdb9/0x11c0 [ 1004.627056][T14971] ? htab_map_update_elem+0xca0/0xca0 [ 1004.632431][T14971] __do_sys_bpf+0x478/0x37b0 [ 1004.637025][T14971] ? bpf_prog_load+0x18a0/0x18a0 [ 1004.641980][T14971] ? __kasan_check_write+0x14/0x20 [ 1004.647114][T14971] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1004.652656][T14971] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1004.657939][T14971] ? wait_for_completion+0x440/0x440 [ 1004.663230][T14971] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1004.669504][T14971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1004.674957][T14971] ? do_syscall_64+0x26/0x790 [ 1004.679652][T14971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.685731][T14971] ? do_syscall_64+0x26/0x790 [ 1004.690439][T14971] __x64_sys_bpf+0x73/0xb0 [ 1004.694869][T14971] do_syscall_64+0xfa/0x790 [ 1004.699387][T14971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.705288][T14971] RIP: 0033:0x45a679 [ 1004.709186][T14971] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1004.728803][T14971] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1004.737315][T14971] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1004.745279][T14971] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1004.753382][T14971] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1004.761356][T14971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1004.769339][T14971] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:48 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000300, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:48 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020012000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000001c800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r4 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x9, 0x20004, 0x5}, &(0x7f0000000380)=0x100000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r4, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, r2, 0x0, 0x18, &(0x7f0000000440)='vboxnet0md5sum+*trusted\x00', r5}, 0x30) r7 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xfffffffffffffcb8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x20004, 0x5}, &(0x7f0000000380)=0x100000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r7, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r0, 0x0, 0x4, &(0x7f00000004c0)='GPL\x00', r8}, 0x30) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xfc, 0x3, 0x0, 0x2, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1bfeb760, 0x2, @perf_bp={&(0x7f0000000380), 0x4}, 0x800, 0x8, 0xc34, 0x0, 0x7f, 0x0, 0x5}, r6, 0xe, r9, 0x8) r10 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r12 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f00000002c0)=r11, 0x161) openat$cgroup_ro(r11, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0xff0000}, [@jmp={0x5, 0x0, 0xb, 0x5, 0x4, 0x30}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x60}, @map={0x18, 0x1dc06035ca1576fe}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000000200)=""/134, 0x40f00, 0x1, [], 0x0, 0x9, r11, 0x8, &(0x7f0000000100)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xa, 0xffffffff, 0x1}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000340)={r10, r13}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:27:48 executing program 2 (fault-call:8 fault-nth:53): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1012.652275][T14989] FAULT_INJECTION: forcing a failure. [ 1012.652275][T14989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1012.678559][T14989] CPU: 1 PID: 14989 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1012.686939][T14989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.697023][T14989] Call Trace: [ 1012.700324][T14989] dump_stack+0x197/0x210 [ 1012.704693][T14989] should_fail.cold+0xa/0x15 [ 1012.709315][T14989] ? fault_create_debugfs_attr+0x180/0x180 [ 1012.715147][T14989] ? ___might_sleep+0x163/0x2c0 [ 1012.720037][T14989] should_fail_alloc_page+0x50/0x60 [ 1012.725263][T14989] __alloc_pages_nodemask+0x1a1/0x910 [ 1012.730674][T14989] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1012.736438][T14989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1012.742813][T14989] ? find_next_bit+0x107/0x130 [ 1012.747606][T14989] pcpu_populate_chunk+0xf8/0x940 [ 1012.752648][T14989] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1012.758383][T14989] ? find_next_bit+0x67/0x130 [ 1012.763080][T14989] pcpu_alloc+0xd5b/0x1380 [ 1012.767524][T14989] ? pcpu_alloc_area+0x820/0x820 [ 1012.772478][T14989] ? bpf_map_area_alloc+0x20/0x30 [ 1012.777525][T14989] __alloc_percpu_gfp+0x28/0x30 [ 1012.782388][T14989] htab_map_alloc+0xdb9/0x11c0 [ 1012.787177][T14989] ? htab_map_update_elem+0xca0/0xca0 [ 1012.792563][T14989] __do_sys_bpf+0x478/0x37b0 [ 1012.797156][T14989] ? bpf_prog_load+0x18a0/0x18a0 06:27:48 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020013000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000001d800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1012.802104][T14989] ? __kasan_check_write+0x14/0x20 [ 1012.807234][T14989] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1012.812794][T14989] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1012.818098][T14989] ? wait_for_completion+0x440/0x440 [ 1012.823407][T14989] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1012.829676][T14989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1012.835156][T14989] ? do_syscall_64+0x26/0x790 [ 1012.839850][T14989] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1012.845951][T14989] ? do_syscall_64+0x26/0x790 06:27:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000001e000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1012.850653][T14989] __x64_sys_bpf+0x73/0xb0 [ 1012.855081][T14989] do_syscall_64+0xfa/0x790 [ 1012.859603][T14989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1012.865500][T14989] RIP: 0033:0x45a679 [ 1012.869405][T14989] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1012.889011][T14989] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1012.889025][T14989] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1012.889033][T14989] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1012.889041][T14989] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1012.889048][T14989] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1012.889055][T14989] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:27:57 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000001f000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:57 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000500, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:57 executing program 2 (fault-call:8 fault-nth:54): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:57 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020014000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, r1, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="0ef10331bed80d1e65d97b3a7753ca0ccf53aeca1e3e199c13c4d90d5ea64082a61b966ceb484f18cbb2c7edc776625d8c647c96439333a7074abb7365e047e260fd6d98c0a60c85a3f322daa3bfc71ec397aedd727814433e7fc203712ebec96014574edd805a4bb8ae9b081306926de9d88947441464a496484b12063d800602c8c7a3dac5798efe6595855d0260f914d7cd37deee17fbed7b43a01ad0e04b784cf83cb9b78d6c71faf01358c1b28d3369f5d40d5971364e9bb89a2d1e454afc15d657daf948a343cbc9aa0e90899129e705fadc0e629c07202bc00ea391cdaf403241fc8d993c4f", 0xe9}], 0x1, &(0x7f0000000140)=[{0x30, 0xfa28ad0c3a44be27, 0xfffffff9, "ffc5f64a1380b70cbde33956f4cc69f4123183700e49e9377d"}], 0x30}, 0x800) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x81, 0x0, 0x60, 0x2, 0x0, 0x8, 0x86001, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x483, 0x2, 0x6b8f, 0x11, 0x401, 0x9, 0x100}, r0, 0x1, r2, 0x1) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1022.171945][T15043] FAULT_INJECTION: forcing a failure. [ 1022.171945][T15043] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1022.186926][T15043] CPU: 1 PID: 15043 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1022.195287][T15043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1022.205355][T15043] Call Trace: [ 1022.208660][T15043] dump_stack+0x197/0x210 [ 1022.213017][T15043] should_fail.cold+0xa/0x15 [ 1022.217628][T15043] ? fault_create_debugfs_attr+0x180/0x180 [ 1022.223445][T15043] ? ___might_sleep+0x163/0x2c0 [ 1022.228318][T15043] should_fail_alloc_page+0x50/0x60 [ 1022.233534][T15043] __alloc_pages_nodemask+0x1a1/0x910 [ 1022.238930][T15043] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1022.244670][T15043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1022.250924][T15043] ? find_next_bit+0x107/0x130 [ 1022.255707][T15043] pcpu_populate_chunk+0xf8/0x940 [ 1022.260745][T15043] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1022.266479][T15043] ? find_next_bit+0x67/0x130 [ 1022.271172][T15043] pcpu_alloc+0xd5b/0x1380 [ 1022.275614][T15043] ? pcpu_alloc_area+0x820/0x820 [ 1022.280569][T15043] ? bpf_map_area_alloc+0x20/0x30 [ 1022.285619][T15043] __alloc_percpu_gfp+0x28/0x30 [ 1022.290478][T15043] htab_map_alloc+0xdb9/0x11c0 [ 1022.295265][T15043] ? htab_map_update_elem+0xca0/0xca0 [ 1022.300677][T15043] __do_sys_bpf+0x478/0x37b0 [ 1022.305289][T15043] ? bpf_prog_load+0x18a0/0x18a0 [ 1022.310235][T15043] ? __kasan_check_write+0x14/0x20 [ 1022.315361][T15043] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1022.320917][T15043] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1022.326221][T15043] ? wait_for_completion+0x440/0x440 [ 1022.331525][T15043] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1022.337788][T15043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1022.343252][T15043] ? do_syscall_64+0x26/0x790 [ 1022.347934][T15043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.347954][T15043] ? do_syscall_64+0x26/0x790 [ 1022.358672][T15043] __x64_sys_bpf+0x73/0xb0 [ 1022.358690][T15043] do_syscall_64+0xfa/0x790 [ 1022.358711][T15043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.358726][T15043] RIP: 0033:0x45a679 [ 1022.367637][T15043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1022.396993][T15043] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1022.405425][T15043] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1022.413407][T15043] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:27:57 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020015000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:57 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000001f800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:57 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000020800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1022.421395][T15043] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1022.429380][T15043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1022.437362][T15043] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:27:57 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000600, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:58 executing program 2 (fault-call:8 fault-nth:55): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:27:58 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020016000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1022.726175][T15095] FAULT_INJECTION: forcing a failure. [ 1022.726175][T15095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1022.762199][T15095] CPU: 0 PID: 15095 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1022.770575][T15095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1022.780639][T15095] Call Trace: [ 1022.783943][T15095] dump_stack+0x197/0x210 [ 1022.788297][T15095] should_fail.cold+0xa/0x15 [ 1022.792914][T15095] ? fault_create_debugfs_attr+0x180/0x180 [ 1022.798744][T15095] ? ___might_sleep+0x163/0x2c0 [ 1022.803728][T15095] should_fail_alloc_page+0x50/0x60 [ 1022.808941][T15095] __alloc_pages_nodemask+0x1a1/0x910 [ 1022.814337][T15095] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1022.820080][T15095] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1022.826334][T15095] ? find_next_bit+0x107/0x130 [ 1022.831116][T15095] pcpu_populate_chunk+0xf8/0x940 [ 1022.836153][T15095] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1022.841879][T15095] ? find_next_bit+0x67/0x130 [ 1022.846577][T15095] pcpu_alloc+0xd5b/0x1380 [ 1022.851016][T15095] ? pcpu_alloc_area+0x820/0x820 [ 1022.855960][T15095] ? bpf_map_area_alloc+0x20/0x30 [ 1022.861017][T15095] __alloc_percpu_gfp+0x28/0x30 [ 1022.865876][T15095] htab_map_alloc+0xdb9/0x11c0 [ 1022.870667][T15095] ? htab_map_update_elem+0xca0/0xca0 [ 1022.876047][T15095] __do_sys_bpf+0x478/0x37b0 [ 1022.880650][T15095] ? bpf_prog_load+0x18a0/0x18a0 [ 1022.885718][T15095] ? __kasan_check_write+0x14/0x20 [ 1022.890852][T15095] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1022.896401][T15095] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1022.901694][T15095] ? wait_for_completion+0x440/0x440 [ 1022.906995][T15095] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1022.913252][T15095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1022.918740][T15095] ? do_syscall_64+0x26/0x790 [ 1022.923512][T15095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.929577][T15095] ? do_syscall_64+0x26/0x790 [ 1022.934245][T15095] __x64_sys_bpf+0x73/0xb0 [ 1022.938670][T15095] do_syscall_64+0xfa/0x790 [ 1022.943170][T15095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.949052][T15095] RIP: 0033:0x45a679 [ 1022.952936][T15095] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1022.972526][T15095] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1022.980921][T15095] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1022.988876][T15095] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1022.996832][T15095] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1023.004786][T15095] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1023.012741][T15095] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:28:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:28:10 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000021000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:10 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020017000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000700, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:10 executing program 2 (fault-call:8 fault-nth:56): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1035.613321][T15124] FAULT_INJECTION: forcing a failure. [ 1035.613321][T15124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1035.641625][T15124] CPU: 0 PID: 15124 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1035.649990][T15124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1035.660077][T15124] Call Trace: [ 1035.663376][T15124] dump_stack+0x197/0x210 [ 1035.667728][T15124] should_fail.cold+0xa/0x15 [ 1035.672347][T15124] ? fault_create_debugfs_attr+0x180/0x180 [ 1035.678167][T15124] ? ___might_sleep+0x163/0x2c0 [ 1035.683047][T15124] should_fail_alloc_page+0x50/0x60 [ 1035.688264][T15124] __alloc_pages_nodemask+0x1a1/0x910 [ 1035.693678][T15124] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1035.699414][T15124] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1035.705669][T15124] ? find_next_bit+0x107/0x130 [ 1035.710453][T15124] pcpu_populate_chunk+0xf8/0x940 [ 1035.715474][T15124] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1035.721185][T15124] ? find_next_bit+0x67/0x130 [ 1035.721203][T15124] pcpu_alloc+0xd5b/0x1380 [ 1035.721223][T15124] ? pcpu_alloc_area+0x820/0x820 [ 1035.721236][T15124] ? bpf_map_area_alloc+0x20/0x30 [ 1035.721260][T15124] __alloc_percpu_gfp+0x28/0x30 [ 1035.745105][T15124] htab_map_alloc+0xdb9/0x11c0 [ 1035.749892][T15124] ? htab_map_update_elem+0xca0/0xca0 [ 1035.755278][T15124] __do_sys_bpf+0x478/0x37b0 [ 1035.759889][T15124] ? bpf_prog_load+0x18a0/0x18a0 [ 1035.764838][T15124] ? __kasan_check_write+0x14/0x20 [ 1035.769959][T15124] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1035.775512][T15124] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1035.780815][T15124] ? wait_for_completion+0x440/0x440 [ 1035.786120][T15124] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1035.792395][T15124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1035.797865][T15124] ? do_syscall_64+0x26/0x790 [ 1035.802559][T15124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1035.808634][T15124] ? do_syscall_64+0x26/0x790 [ 1035.813328][T15124] __x64_sys_bpf+0x73/0xb0 [ 1035.817762][T15124] do_syscall_64+0xfa/0x790 [ 1035.822281][T15124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1035.828178][T15124] RIP: 0033:0x45a679 [ 1035.832077][T15124] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1035.851661][T15124] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1035.860051][T15124] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1035.868006][T15124] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1035.875961][T15124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1035.883921][T15124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1035.891880][T15124] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:28:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x10001, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1ff, 0x40400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) openat$cgroup_ro(r4, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r6, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r8) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000180)={r3}) 06:28:12 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000900, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:12 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000022000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:12 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020018000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:12 executing program 2 (fault-call:8 fault-nth:57): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1037.300628][T15154] FAULT_INJECTION: forcing a failure. [ 1037.300628][T15154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1037.330399][T15154] CPU: 0 PID: 15154 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1037.338773][T15154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:28:12 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000a00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1037.348840][T15154] Call Trace: [ 1037.352152][T15154] dump_stack+0x197/0x210 [ 1037.356593][T15154] should_fail.cold+0xa/0x15 [ 1037.361207][T15154] ? fault_create_debugfs_attr+0x180/0x180 [ 1037.367022][T15154] ? ___might_sleep+0x163/0x2c0 [ 1037.371889][T15154] should_fail_alloc_page+0x50/0x60 [ 1037.377098][T15154] __alloc_pages_nodemask+0x1a1/0x910 [ 1037.382486][T15154] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1037.388219][T15154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1037.394466][T15154] ? find_next_bit+0x107/0x130 [ 1037.399231][T15154] pcpu_populate_chunk+0xf8/0x940 [ 1037.399246][T15154] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1037.399258][T15154] ? find_next_bit+0x67/0x130 [ 1037.399288][T15154] pcpu_alloc+0xd5b/0x1380 [ 1037.399310][T15154] ? pcpu_alloc_area+0x820/0x820 [ 1037.399326][T15154] ? bpf_map_area_alloc+0x20/0x30 [ 1037.399347][T15154] __alloc_percpu_gfp+0x28/0x30 [ 1037.399362][T15154] htab_map_alloc+0xdb9/0x11c0 [ 1037.399385][T15154] ? htab_map_update_elem+0xca0/0xca0 [ 1037.410097][T15154] __do_sys_bpf+0x478/0x37b0 [ 1037.448600][T15154] ? bpf_prog_load+0x18a0/0x18a0 [ 1037.453552][T15154] ? __kasan_check_write+0x14/0x20 [ 1037.458675][T15154] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1037.464228][T15154] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1037.469533][T15154] ? wait_for_completion+0x440/0x440 [ 1037.474840][T15154] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1037.481102][T15154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1037.486573][T15154] ? do_syscall_64+0x26/0x790 [ 1037.491261][T15154] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 06:28:12 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000b00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1037.497336][T15154] ? do_syscall_64+0x26/0x790 [ 1037.502025][T15154] __x64_sys_bpf+0x73/0xb0 [ 1037.506449][T15154] do_syscall_64+0xfa/0x790 [ 1037.510976][T15154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1037.516877][T15154] RIP: 0033:0x45a679 [ 1037.520789][T15154] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1037.540435][T15154] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1037.540449][T15154] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1037.540470][T15154] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1037.540477][T15154] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1037.540484][T15154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1037.540491][T15154] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:28:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:28:29 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000022800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:29 executing program 2 (fault-call:8 fault-nth:58): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:29 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020040000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:29 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000c00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x80, 0x3f, 0x2, 0x8, 0x0, 0xbaf, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3f, 0x1, @perf_bp, 0x3e3, 0xf32e, 0x4, 0x6, 0x4, 0x3, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000100)={0x6, 0x70, 0x21, 0x81, 0x40, 0x8, 0x0, 0x7, 0x1001, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x7fff, 0x6}, 0xdb1b1a8a9935f420, 0xffffffffffff79ad, 0x800, 0x2, 0x8001, 0x1f, 0x1}, r1, 0xa, 0xffffffffffffffff, 0x14) r4 = gettid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000380)={'irlan0\x00', @dev={[], 0x25}}) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r5, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f00000002c0)=r8, 0x161) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x42, 0xff, 0x7, 0x4, 0x0, 0x4, 0x20000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000280), 0x4}, 0x1000, 0x5, 0x9, 0x3, 0x100000001, 0x1, 0x4}, r4, 0x4000000, r8, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) socket$kcm(0x29, 0x5, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:28:29 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000023800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1054.564361][T15212] FAULT_INJECTION: forcing a failure. [ 1054.564361][T15212] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1054.601145][T15212] CPU: 1 PID: 15212 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1054.609517][T15212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1054.619584][T15212] Call Trace: [ 1054.622880][T15212] dump_stack+0x197/0x210 [ 1054.627237][T15212] should_fail.cold+0xa/0x15 [ 1054.631851][T15212] ? fault_create_debugfs_attr+0x180/0x180 [ 1054.637671][T15212] ? ___might_sleep+0x163/0x2c0 [ 1054.642553][T15212] should_fail_alloc_page+0x50/0x60 [ 1054.647771][T15212] __alloc_pages_nodemask+0x1a1/0x910 [ 1054.653167][T15212] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1054.658907][T15212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1054.665151][T15212] ? find_next_bit+0x107/0x130 [ 1054.669937][T15212] pcpu_populate_chunk+0xf8/0x940 [ 1054.674972][T15212] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1054.680701][T15212] ? find_next_bit+0x67/0x130 [ 1054.685396][T15212] pcpu_alloc+0xd5b/0x1380 [ 1054.689833][T15212] ? pcpu_alloc_area+0x820/0x820 [ 1054.694779][T15212] ? bpf_map_area_alloc+0x20/0x30 [ 1054.699821][T15212] __alloc_percpu_gfp+0x28/0x30 [ 1054.704679][T15212] htab_map_alloc+0xdb9/0x11c0 [ 1054.709472][T15212] ? htab_map_update_elem+0xca0/0xca0 [ 1054.714859][T15212] __do_sys_bpf+0x478/0x37b0 [ 1054.719470][T15212] ? bpf_prog_load+0x18a0/0x18a0 [ 1054.724422][T15212] ? __kasan_check_write+0x14/0x20 [ 1054.729684][T15212] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1054.735237][T15212] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1054.740537][T15212] ? wait_for_completion+0x440/0x440 [ 1054.745843][T15212] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1054.752103][T15212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1054.757565][T15212] ? do_syscall_64+0x26/0x790 [ 1054.762240][T15212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1054.762252][T15212] ? do_syscall_64+0x26/0x790 [ 1054.762271][T15212] __x64_sys_bpf+0x73/0xb0 [ 1054.762287][T15212] do_syscall_64+0xfa/0x790 [ 1054.762304][T15212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1054.762330][T15212] RIP: 0033:0x45a679 [ 1054.762345][T15212] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:28:30 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020080010000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1054.762353][T15212] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1054.762365][T15212] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1054.762378][T15212] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1054.835650][T15212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1054.843608][T15212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1054.851573][T15212] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:28:30 executing program 2 (fault-call:8 fault-nth:59): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:30 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000024000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:30 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000d00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1055.021455][T15245] FAULT_INJECTION: forcing a failure. [ 1055.021455][T15245] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:28:30 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x19, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1055.074263][T15245] CPU: 1 PID: 15245 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1055.082641][T15245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.092698][T15245] Call Trace: [ 1055.095992][T15245] dump_stack+0x197/0x210 [ 1055.100340][T15245] should_fail.cold+0xa/0x15 [ 1055.104931][T15245] ? fault_create_debugfs_attr+0x180/0x180 [ 1055.110741][T15245] ? ___might_sleep+0x163/0x2c0 [ 1055.115608][T15245] should_fail_alloc_page+0x50/0x60 [ 1055.120819][T15245] __alloc_pages_nodemask+0x1a1/0x910 [ 1055.126208][T15245] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1055.131938][T15245] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1055.138173][T15245] ? find_next_bit+0x107/0x130 [ 1055.142945][T15245] pcpu_populate_chunk+0xf8/0x940 [ 1055.147978][T15245] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1055.153702][T15245] ? find_next_bit+0x67/0x130 [ 1055.158399][T15245] pcpu_alloc+0xd5b/0x1380 [ 1055.162836][T15245] ? pcpu_alloc_area+0x820/0x820 [ 1055.167787][T15245] ? bpf_map_area_alloc+0x20/0x30 [ 1055.172836][T15245] __alloc_percpu_gfp+0x28/0x30 [ 1055.177698][T15245] htab_map_alloc+0xdb9/0x11c0 [ 1055.182490][T15245] ? htab_map_update_elem+0xca0/0xca0 [ 1055.187879][T15245] __do_sys_bpf+0x478/0x37b0 [ 1055.192489][T15245] ? bpf_prog_load+0x18a0/0x18a0 [ 1055.197445][T15245] ? __kasan_check_write+0x14/0x20 [ 1055.202582][T15245] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1055.208155][T15245] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1055.213464][T15245] ? wait_for_completion+0x440/0x440 [ 1055.218769][T15245] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1055.225040][T15245] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1055.230515][T15245] ? do_syscall_64+0x26/0x790 [ 1055.235211][T15245] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1055.241288][T15245] ? do_syscall_64+0x26/0x790 [ 1055.245982][T15245] __x64_sys_bpf+0x73/0xb0 [ 1055.250425][T15245] do_syscall_64+0xfa/0x790 [ 1055.254944][T15245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1055.260840][T15245] RIP: 0033:0x45a679 [ 1055.264740][T15245] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1055.284338][T15245] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1055.284351][T15245] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1055.284358][T15245] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1055.284366][T15245] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1055.284373][T15245] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1055.284380][T15245] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:28:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:28:39 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6002, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:39 executing program 2 (fault-call:8 fault-nth:60): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000025000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:39 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000e00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0xd, &(0x7f0000000100)='selflo[wlan1\x00'}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x3, 0x6c, 0x6, 0x73, 0x0, 0x81, 0x40, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x8881, 0x7, 0xfff, 0x6, 0x4, 0x6}, r1, 0x3, r2, 0x0) [ 1063.845179][T15289] FAULT_INJECTION: forcing a failure. [ 1063.845179][T15289] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1063.859051][T15289] CPU: 1 PID: 15289 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1063.867528][T15289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1063.877593][T15289] Call Trace: [ 1063.880899][T15289] dump_stack+0x197/0x210 [ 1063.885254][T15289] should_fail.cold+0xa/0x15 [ 1063.889870][T15289] ? fault_create_debugfs_attr+0x180/0x180 [ 1063.895721][T15289] ? ___might_sleep+0x163/0x2c0 [ 1063.900602][T15289] should_fail_alloc_page+0x50/0x60 [ 1063.905827][T15289] __alloc_pages_nodemask+0x1a1/0x910 [ 1063.911337][T15289] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1063.917073][T15289] ? __sched_text_start+0x8/0x8 [ 1063.921946][T15289] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1063.928206][T15289] ? find_next_bit+0x107/0x130 [ 1063.932992][T15289] pcpu_populate_chunk+0xf8/0x940 [ 1063.938027][T15289] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1063.943756][T15289] ? find_next_bit+0x67/0x130 [ 1063.948453][T15289] pcpu_alloc+0xd5b/0x1380 [ 1063.952893][T15289] ? pcpu_alloc_area+0x820/0x820 [ 1063.957840][T15289] ? bpf_map_area_alloc+0x20/0x30 [ 1063.962881][T15289] __alloc_percpu_gfp+0x28/0x30 [ 1063.967744][T15289] htab_map_alloc+0xdb9/0x11c0 [ 1063.972529][T15289] ? htab_map_update_elem+0xca0/0xca0 [ 1063.977905][T15289] __do_sys_bpf+0x478/0x37b0 [ 1063.982502][T15289] ? bpf_prog_load+0x18a0/0x18a0 [ 1063.987439][T15289] ? __kasan_check_write+0x14/0x20 [ 1063.987454][T15289] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1063.987473][T15289] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1063.998102][T15289] ? wait_for_completion+0x440/0x440 [ 1064.008654][T15289] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1064.014919][T15289] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1064.020386][T15289] ? do_syscall_64+0x26/0x790 [ 1064.025072][T15289] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1064.031256][T15289] ? do_syscall_64+0x26/0x790 [ 1064.035949][T15289] __x64_sys_bpf+0x73/0xb0 [ 1064.040382][T15289] do_syscall_64+0xfa/0x790 06:28:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000025800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000026800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000027000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1064.044903][T15289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1064.050803][T15289] RIP: 0033:0x45a679 [ 1064.054707][T15289] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1064.074317][T15289] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1064.082741][T15289] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 06:28:39 executing program 2 (fault-call:8 fault-nth:61): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1064.082751][T15289] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1064.082758][T15289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1064.082766][T15289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1064.082772][T15289] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:28:39 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6003, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:39 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000028000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1064.301602][T15330] FAULT_INJECTION: forcing a failure. [ 1064.301602][T15330] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1064.344453][T15330] CPU: 0 PID: 15330 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1064.352826][T15330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1064.362894][T15330] Call Trace: [ 1064.366213][T15330] dump_stack+0x197/0x210 [ 1064.370571][T15330] should_fail.cold+0xa/0x15 [ 1064.375196][T15330] ? fault_create_debugfs_attr+0x180/0x180 [ 1064.381027][T15330] ? ___might_sleep+0x163/0x2c0 [ 1064.385996][T15330] should_fail_alloc_page+0x50/0x60 [ 1064.391219][T15330] __alloc_pages_nodemask+0x1a1/0x910 [ 1064.396610][T15330] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1064.402329][T15330] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1064.402342][T15330] ? find_next_bit+0x107/0x130 [ 1064.402361][T15330] pcpu_populate_chunk+0xf8/0x940 [ 1064.402374][T15330] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1064.402387][T15330] ? find_next_bit+0x67/0x130 [ 1064.402406][T15330] pcpu_alloc+0xd5b/0x1380 [ 1064.402427][T15330] ? pcpu_alloc_area+0x820/0x820 [ 1064.402443][T15330] ? bpf_map_area_alloc+0x20/0x30 [ 1064.402463][T15330] __alloc_percpu_gfp+0x28/0x30 [ 1064.402481][T15330] htab_map_alloc+0xdb9/0x11c0 [ 1064.452818][T15330] ? htab_map_update_elem+0xca0/0xca0 [ 1064.458208][T15330] __do_sys_bpf+0x478/0x37b0 [ 1064.462824][T15330] ? bpf_prog_load+0x18a0/0x18a0 [ 1064.467771][T15330] ? __kasan_check_write+0x14/0x20 [ 1064.472875][T15330] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1064.478420][T15330] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1064.483722][T15330] ? wait_for_completion+0x440/0x440 [ 1064.489033][T15330] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1064.495297][T15330] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1064.500773][T15330] ? do_syscall_64+0x26/0x790 [ 1064.505463][T15330] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1064.511524][T15330] ? do_syscall_64+0x26/0x790 [ 1064.516194][T15330] __x64_sys_bpf+0x73/0xb0 [ 1064.520603][T15330] do_syscall_64+0xfa/0x790 [ 1064.525095][T15330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1064.530980][T15330] RIP: 0033:0x45a679 [ 1064.534870][T15330] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1064.554532][T15330] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1064.562955][T15330] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1064.571034][T15330] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1064.579014][T15330] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1064.586983][T15330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1064.594953][T15330] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:28:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000028800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:28:50 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000f00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:50 executing program 2 (fault-call:8 fault-nth:62): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6004, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x447) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1075.146367][T15362] FAULT_INJECTION: forcing a failure. [ 1075.146367][T15362] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.161234][T15362] CPU: 0 PID: 15362 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1075.169582][T15362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.179648][T15362] Call Trace: [ 1075.182951][T15362] dump_stack+0x197/0x210 [ 1075.187306][T15362] should_fail.cold+0xa/0x15 [ 1075.191922][T15362] ? fault_create_debugfs_attr+0x180/0x180 [ 1075.197723][T15362] ? ___might_sleep+0x163/0x2c0 [ 1075.202591][T15362] should_fail_alloc_page+0x50/0x60 [ 1075.207809][T15362] __alloc_pages_nodemask+0x1a1/0x910 [ 1075.213209][T15362] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1075.218950][T15362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1075.225205][T15362] ? find_next_bit+0x107/0x130 [ 1075.229990][T15362] pcpu_populate_chunk+0xf8/0x940 [ 1075.235032][T15362] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1075.240767][T15362] ? find_next_bit+0x67/0x130 [ 1075.245465][T15362] pcpu_alloc+0xd5b/0x1380 [ 1075.249909][T15362] ? pcpu_alloc_area+0x820/0x820 [ 1075.254862][T15362] ? bpf_map_area_alloc+0x20/0x30 [ 1075.259910][T15362] __alloc_percpu_gfp+0x28/0x30 [ 1075.264769][T15362] htab_map_alloc+0xdb9/0x11c0 [ 1075.269557][T15362] ? htab_map_update_elem+0xca0/0xca0 [ 1075.274948][T15362] __do_sys_bpf+0x478/0x37b0 [ 1075.279553][T15362] ? bpf_prog_load+0x18a0/0x18a0 [ 1075.284492][T15362] ? __kasan_check_write+0x14/0x20 [ 1075.289612][T15362] ? __mutex_unlock_slowpath+0xf0/0x6a0 06:28:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000029800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000002a000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1075.295172][T15362] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1075.300476][T15362] ? wait_for_completion+0x440/0x440 [ 1075.305779][T15362] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1075.312044][T15362] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1075.317519][T15362] ? do_syscall_64+0x26/0x790 [ 1075.322213][T15362] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.328289][T15362] ? do_syscall_64+0x26/0x790 [ 1075.332970][T15362] __x64_sys_bpf+0x73/0xb0 [ 1075.337392][T15362] do_syscall_64+0xfa/0x790 [ 1075.341901][T15362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.347800][T15362] RIP: 0033:0x45a679 [ 1075.351706][T15362] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.371319][T15362] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1075.379750][T15362] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1075.387733][T15362] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 06:28:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000002b000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:50 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001100, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1075.395718][T15362] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1075.403694][T15362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1075.411678][T15362] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:28:50 executing program 2 (fault-call:8 fault-nth:63): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1075.575892][T15396] FAULT_INJECTION: forcing a failure. [ 1075.575892][T15396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.599510][T15396] CPU: 1 PID: 15396 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1075.607886][T15396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.617958][T15396] Call Trace: [ 1075.621269][T15396] dump_stack+0x197/0x210 [ 1075.625627][T15396] should_fail.cold+0xa/0x15 [ 1075.630250][T15396] ? fault_create_debugfs_attr+0x180/0x180 [ 1075.636075][T15396] ? ___might_sleep+0x163/0x2c0 [ 1075.640963][T15396] should_fail_alloc_page+0x50/0x60 [ 1075.646318][T15396] __alloc_pages_nodemask+0x1a1/0x910 [ 1075.651714][T15396] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1075.651739][T15396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1075.663688][T15396] ? find_next_bit+0x107/0x130 [ 1075.663710][T15396] pcpu_populate_chunk+0xf8/0x940 [ 1075.663724][T15396] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1075.663735][T15396] ? find_next_bit+0x67/0x130 [ 1075.663757][T15396] pcpu_alloc+0xd5b/0x1380 [ 1075.663778][T15396] ? pcpu_alloc_area+0x820/0x820 [ 1075.663796][T15396] ? bpf_map_area_alloc+0x20/0x30 [ 1075.693296][T15396] __alloc_percpu_gfp+0x28/0x30 [ 1075.693314][T15396] htab_map_alloc+0xdb9/0x11c0 [ 1075.693337][T15396] ? htab_map_update_elem+0xca0/0xca0 [ 1075.713305][T15396] __do_sys_bpf+0x478/0x37b0 [ 1075.713326][T15396] ? bpf_prog_load+0x18a0/0x18a0 [ 1075.713342][T15396] ? __kasan_check_write+0x14/0x20 [ 1075.713364][T15396] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1075.733542][T15396] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1075.738850][T15396] ? wait_for_completion+0x440/0x440 [ 1075.744162][T15396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1075.750435][T15396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1075.755913][T15396] ? do_syscall_64+0x26/0x790 [ 1075.760608][T15396] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.766690][T15396] ? do_syscall_64+0x26/0x790 [ 1075.771396][T15396] __x64_sys_bpf+0x73/0xb0 [ 1075.775838][T15396] do_syscall_64+0xfa/0x790 [ 1075.780365][T15396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.786267][T15396] RIP: 0033:0x45a679 [ 1075.790176][T15396] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.809791][T15396] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1075.818221][T15396] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 06:28:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6005, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:28:51 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001200, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1075.826203][T15396] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1075.834184][T15396] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1075.842168][T15396] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1075.850149][T15396] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:29:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000002b800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:04 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6006, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:04 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001300, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:04 executing program 2 (fault-call:8 fault-nth:64): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000440)) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000400)={'veth1_to_bridge\x00'}) r3 = perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x3, 0x4, 0x5, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfff, 0x1, @perf_bp={&(0x7f00000002c0), 0x2}, 0x41080, 0x2, 0x8, 0x8, 0x3, 0x40, 0x101}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000380)=0x1591) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x8, &(0x7f0000000000)=@raw=[@exit, @map={0x18, 0x7, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x52}, @call={0x85, 0x0, 0x0, 0x6a}, @generic={0xff, 0xe, 0x1, 0xffff, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x783}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x6, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xa, 0xfffff8a3, 0x40}, 0xffffff3e, 0xffffffffffffffff, r1}, 0x78) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x8001, 0x5f27}, 0xc) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) 06:29:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000002c800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1088.657924][T15439] FAULT_INJECTION: forcing a failure. [ 1088.657924][T15439] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1088.709745][T15439] CPU: 0 PID: 15439 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1088.718113][T15439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.728172][T15439] Call Trace: [ 1088.731480][T15439] dump_stack+0x197/0x210 [ 1088.735840][T15439] should_fail.cold+0xa/0x15 [ 1088.740460][T15439] ? fault_create_debugfs_attr+0x180/0x180 [ 1088.746289][T15439] ? ___might_sleep+0x163/0x2c0 [ 1088.751171][T15439] should_fail_alloc_page+0x50/0x60 [ 1088.756390][T15439] __alloc_pages_nodemask+0x1a1/0x910 [ 1088.761790][T15439] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1088.767522][T15439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1088.773748][T15439] ? find_next_bit+0x107/0x130 [ 1088.778504][T15439] pcpu_populate_chunk+0xf8/0x940 [ 1088.783521][T15439] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1088.789264][T15439] ? find_next_bit+0x67/0x130 [ 1088.793930][T15439] pcpu_alloc+0xd5b/0x1380 [ 1088.798338][T15439] ? pcpu_alloc_area+0x820/0x820 [ 1088.803269][T15439] ? bpf_map_area_alloc+0x20/0x30 [ 1088.808319][T15439] __alloc_percpu_gfp+0x28/0x30 [ 1088.813171][T15439] htab_map_alloc+0xdb9/0x11c0 [ 1088.817947][T15439] ? htab_map_update_elem+0xca0/0xca0 [ 1088.823315][T15439] __do_sys_bpf+0x478/0x37b0 [ 1088.827897][T15439] ? bpf_prog_load+0x18a0/0x18a0 [ 1088.832820][T15439] ? __kasan_check_write+0x14/0x20 [ 1088.837909][T15439] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1088.843438][T15439] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1088.848721][T15439] ? wait_for_completion+0x440/0x440 [ 1088.854017][T15439] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1088.860264][T15439] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1088.865709][T15439] ? do_syscall_64+0x26/0x790 [ 1088.870374][T15439] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.876436][T15439] ? do_syscall_64+0x26/0x790 [ 1088.881112][T15439] __x64_sys_bpf+0x73/0xb0 [ 1088.885668][T15439] do_syscall_64+0xfa/0x790 [ 1088.890164][T15439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.896042][T15439] RIP: 0033:0x45a679 [ 1088.899931][T15439] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1088.919526][T15439] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1088.927921][T15439] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1088.935874][T15439] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1088.943826][T15439] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1088.951779][T15439] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 06:29:04 executing program 2 (fault-call:8 fault-nth:65): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1088.959733][T15439] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:04 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001400, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000002d000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1089.100855][T15463] FAULT_INJECTION: forcing a failure. [ 1089.100855][T15463] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1089.132020][T15463] CPU: 1 PID: 15463 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1089.140394][T15463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:29:04 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6007, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1089.150461][T15463] Call Trace: [ 1089.153772][T15463] dump_stack+0x197/0x210 [ 1089.158132][T15463] should_fail.cold+0xa/0x15 [ 1089.162763][T15463] ? fault_create_debugfs_attr+0x180/0x180 [ 1089.168587][T15463] ? ___might_sleep+0x163/0x2c0 [ 1089.173464][T15463] should_fail_alloc_page+0x50/0x60 [ 1089.178685][T15463] __alloc_pages_nodemask+0x1a1/0x910 [ 1089.184080][T15463] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1089.189820][T15463] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1089.196071][T15463] ? find_next_bit+0x107/0x130 06:29:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000002e000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1089.200853][T15463] pcpu_populate_chunk+0xf8/0x940 [ 1089.205881][T15463] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1089.211602][T15463] ? find_next_bit+0x67/0x130 [ 1089.216291][T15463] pcpu_alloc+0xd5b/0x1380 [ 1089.220719][T15463] ? pcpu_alloc_area+0x820/0x820 [ 1089.220735][T15463] ? bpf_map_area_alloc+0x20/0x30 [ 1089.220761][T15463] __alloc_percpu_gfp+0x28/0x30 [ 1089.220776][T15463] htab_map_alloc+0xdb9/0x11c0 [ 1089.220800][T15463] ? htab_map_update_elem+0xca0/0xca0 [ 1089.220814][T15463] __do_sys_bpf+0x478/0x37b0 [ 1089.220830][T15463] ? bpf_prog_load+0x18a0/0x18a0 [ 1089.220847][T15463] ? __kasan_check_write+0x14/0x20 [ 1089.235656][T15463] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1089.265887][T15463] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1089.271194][T15463] ? wait_for_completion+0x440/0x440 [ 1089.276510][T15463] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1089.282777][T15463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1089.288265][T15463] ? do_syscall_64+0x26/0x790 [ 1089.292960][T15463] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.299048][T15463] ? do_syscall_64+0x26/0x790 [ 1089.303749][T15463] __x64_sys_bpf+0x73/0xb0 [ 1089.308356][T15463] do_syscall_64+0xfa/0x790 [ 1089.312879][T15463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.318773][T15463] RIP: 0033:0x45a679 [ 1089.322672][T15463] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1089.342276][T15463] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1089.342289][T15463] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1089.342297][T15463] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1089.342305][T15463] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1089.342312][T15463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1089.342320][T15463] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r4, 0x30, 0x1}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 06:29:15 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000002e800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:15 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001500, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6008, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0xfffffe65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:29:15 executing program 2 (fault-call:8 fault-nth:66): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1100.014249][T15504] FAULT_INJECTION: forcing a failure. [ 1100.014249][T15504] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1100.042062][T15504] CPU: 1 PID: 15504 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1100.050433][T15504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.060496][T15504] Call Trace: [ 1100.063806][T15504] dump_stack+0x197/0x210 [ 1100.068164][T15504] should_fail.cold+0xa/0x15 [ 1100.072778][T15504] ? fault_create_debugfs_attr+0x180/0x180 [ 1100.078598][T15504] ? ___might_sleep+0x163/0x2c0 [ 1100.083471][T15504] should_fail_alloc_page+0x50/0x60 [ 1100.088684][T15504] __alloc_pages_nodemask+0x1a1/0x910 [ 1100.094073][T15504] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1100.099639][T15504] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1100.105376][T15504] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1100.111685][T15504] alloc_pages_current+0x107/0x210 [ 1100.116791][T15504] ? ___might_sleep+0x163/0x2c0 [ 1100.121651][T15504] __vmalloc_node_range+0x4f8/0x810 [ 1100.126853][T15504] __vmalloc+0x44/0x50 [ 1100.130915][T15504] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1100.135674][T15504] pcpu_mem_zalloc+0x8a/0xf0 [ 1100.140253][T15504] pcpu_create_chunk+0x12d/0x7f0 [ 1100.145222][T15504] pcpu_alloc+0x10f3/0x1380 [ 1100.149710][T15504] ? pcpu_alloc_area+0x820/0x820 [ 1100.154639][T15504] ? bpf_map_area_alloc+0x20/0x30 [ 1100.159665][T15504] __alloc_percpu_gfp+0x28/0x30 [ 1100.164503][T15504] htab_map_alloc+0xdb9/0x11c0 [ 1100.169275][T15504] ? htab_map_update_elem+0xca0/0xca0 [ 1100.174629][T15504] __do_sys_bpf+0x478/0x37b0 [ 1100.179200][T15504] ? bpf_prog_load+0x18a0/0x18a0 [ 1100.184136][T15504] ? __kasan_check_write+0x14/0x20 [ 1100.189229][T15504] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1100.194751][T15504] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1100.200014][T15504] ? wait_for_completion+0x440/0x440 [ 1100.205283][T15504] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1100.211512][T15504] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1100.216964][T15504] ? do_syscall_64+0x26/0x790 [ 1100.221625][T15504] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.227672][T15504] ? do_syscall_64+0x26/0x790 [ 1100.232349][T15504] __x64_sys_bpf+0x73/0xb0 [ 1100.236748][T15504] do_syscall_64+0xfa/0x790 [ 1100.241234][T15504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.247106][T15504] RIP: 0033:0x45a679 [ 1100.250981][T15504] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1100.270564][T15504] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1100.278970][T15504] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1100.286934][T15504] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1100.294886][T15504] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1100.302872][T15504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1100.310821][T15504] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:15 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001600, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:15 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000002f800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:15 executing program 2 (fault-call:8 fault-nth:67): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:15 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000030000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6009, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1100.516541][T15533] FAULT_INJECTION: forcing a failure. [ 1100.516541][T15533] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1100.568698][T15533] CPU: 0 PID: 15533 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1100.577072][T15533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.587143][T15533] Call Trace: [ 1100.590451][T15533] dump_stack+0x197/0x210 [ 1100.594806][T15533] should_fail.cold+0xa/0x15 [ 1100.599422][T15533] ? fault_create_debugfs_attr+0x180/0x180 [ 1100.605251][T15533] ? ___might_sleep+0x163/0x2c0 [ 1100.610127][T15533] should_fail_alloc_page+0x50/0x60 [ 1100.615336][T15533] __alloc_pages_nodemask+0x1a1/0x910 [ 1100.620718][T15533] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1100.626273][T15533] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1100.632010][T15533] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1100.638268][T15533] alloc_pages_current+0x107/0x210 [ 1100.643392][T15533] ? ___might_sleep+0x163/0x2c0 [ 1100.648265][T15533] __vmalloc_node_range+0x4f8/0x810 [ 1100.653486][T15533] __vmalloc+0x44/0x50 [ 1100.657571][T15533] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1100.662344][T15533] pcpu_mem_zalloc+0x8a/0xf0 [ 1100.666956][T15533] pcpu_create_chunk+0x12d/0x7f0 [ 1100.671908][T15533] pcpu_alloc+0x10f3/0x1380 [ 1100.676436][T15533] ? pcpu_alloc_area+0x820/0x820 [ 1100.681385][T15533] ? bpf_map_area_alloc+0x20/0x30 [ 1100.686434][T15533] __alloc_percpu_gfp+0x28/0x30 [ 1100.691295][T15533] htab_map_alloc+0xdb9/0x11c0 [ 1100.696085][T15533] ? htab_map_update_elem+0xca0/0xca0 [ 1100.701458][T15533] __do_sys_bpf+0x478/0x37b0 [ 1100.706033][T15533] ? bpf_prog_load+0x18a0/0x18a0 [ 1100.710963][T15533] ? __kasan_check_write+0x14/0x20 [ 1100.716065][T15533] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1100.721598][T15533] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1100.726877][T15533] ? wait_for_completion+0x440/0x440 [ 1100.732155][T15533] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1100.738395][T15533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1100.743848][T15533] ? do_syscall_64+0x26/0x790 [ 1100.748512][T15533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.754558][T15533] ? do_syscall_64+0x26/0x790 [ 1100.759221][T15533] __x64_sys_bpf+0x73/0xb0 [ 1100.763622][T15533] do_syscall_64+0xfa/0x790 [ 1100.768114][T15533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.774010][T15533] RIP: 0033:0x45a679 [ 1100.777888][T15533] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1100.797475][T15533] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1100.805876][T15533] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 06:29:16 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000031000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1100.813886][T15533] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1100.821861][T15533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1100.829874][T15533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1100.837829][T15533] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r4, 0x30, 0x1}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 06:29:24 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001700, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:24 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000031800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:24 executing program 2 (fault-call:8 fault-nth:68): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:24 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x600a, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x159, 0x159, 0x7, [@enum={0x0, 0x7, 0x0, 0x6, 0x4, [{0x8, 0x4}, {0xb, 0x8c92}, {0x7, 0x6}, {0x8, 0x5}, {0x2}, {0x10, 0x8}, {0x2, 0x1}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2}, {0x9, 0x1}, {0x0, 0x3}]}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x2, 0x1}, {0x4, 0x3}, {0x7, 0x1}, {}, {0x1, 0x4}, {0x7}, {0x6, 0x3}, {0x4, 0x3}, {0xf, 0x3}]}, @enum={0xb, 0x2, 0x0, 0x6, 0x4, [{0x8, 0x3}, {0xe, 0x4}]}, @var={0xf, 0x0, 0x0, 0xe, 0x5}, @datasec={0xe, 0x1, 0x0, 0xf, 0x1, [{0x4, 0x66, 0x80000000}], "a2"}, @func={0x10, 0x0, 0x0, 0xc, 0x2}, @struct={0x8, 0x2, 0x0, 0x4, 0x0, 0x2, [{0x3, 0x5, 0x20}, {0x5, 0x1, 0x81}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb}]}, @typedef={0xe}]}, {0x0, [0x61, 0x0, 0x30, 0x5f, 0x61]}}, &(0x7f0000000000)=""/25, 0x17b, 0x19}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r0, 0x10, &(0x7f0000000080)={&(0x7f0000000380)=""/192, 0xc0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) r3 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000440)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000140)=0x5d17) 06:29:24 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000032800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1109.215763][T15575] FAULT_INJECTION: forcing a failure. [ 1109.215763][T15575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1109.243565][T15575] CPU: 1 PID: 15575 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1109.251941][T15575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.262005][T15575] Call Trace: [ 1109.265316][T15575] dump_stack+0x197/0x210 [ 1109.269671][T15575] should_fail.cold+0xa/0x15 [ 1109.274286][T15575] ? fault_create_debugfs_attr+0x180/0x180 [ 1109.280104][T15575] ? ___might_sleep+0x163/0x2c0 [ 1109.284976][T15575] should_fail_alloc_page+0x50/0x60 [ 1109.290187][T15575] __alloc_pages_nodemask+0x1a1/0x910 [ 1109.295576][T15575] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1109.301142][T15575] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1109.306892][T15575] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 06:29:24 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000033000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1109.313151][T15575] alloc_pages_current+0x107/0x210 [ 1109.318275][T15575] ? ___might_sleep+0x163/0x2c0 [ 1109.323139][T15575] __vmalloc_node_range+0x4f8/0x810 [ 1109.328359][T15575] __vmalloc+0x44/0x50 [ 1109.332437][T15575] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1109.337210][T15575] pcpu_mem_zalloc+0x8a/0xf0 [ 1109.341812][T15575] pcpu_create_chunk+0x12d/0x7f0 [ 1109.346763][T15575] pcpu_alloc+0x10f3/0x1380 [ 1109.351287][T15575] ? pcpu_alloc_area+0x820/0x820 [ 1109.356232][T15575] ? bpf_map_area_alloc+0x20/0x30 [ 1109.361276][T15575] __alloc_percpu_gfp+0x28/0x30 [ 1109.366142][T15575] htab_map_alloc+0xdb9/0x11c0 [ 1109.370931][T15575] ? htab_map_update_elem+0xca0/0xca0 [ 1109.376315][T15575] __do_sys_bpf+0x478/0x37b0 [ 1109.380929][T15575] ? bpf_prog_load+0x18a0/0x18a0 [ 1109.385889][T15575] ? __kasan_check_write+0x14/0x20 [ 1109.391018][T15575] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1109.396578][T15575] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1109.401873][T15575] ? wait_for_completion+0x440/0x440 [ 1109.407176][T15575] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 06:29:24 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000034000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1109.413426][T15575] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1109.413441][T15575] ? do_syscall_64+0x26/0x790 [ 1109.413457][T15575] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1109.413469][T15575] ? do_syscall_64+0x26/0x790 [ 1109.413490][T15575] __x64_sys_bpf+0x73/0xb0 [ 1109.413505][T15575] do_syscall_64+0xfa/0x790 [ 1109.413524][T15575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1109.413535][T15575] RIP: 0033:0x45a679 [ 1109.413550][T15575] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1109.413557][T15575] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1109.413571][T15575] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1109.413584][T15575] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1109.429750][T15575] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1109.429760][T15575] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 06:29:24 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:24 executing program 2 (fault-call:8 fault-nth:69): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1109.429769][T15575] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:25 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000034800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1109.590515][T15610] FAULT_INJECTION: forcing a failure. [ 1109.590515][T15610] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1109.624525][T15610] CPU: 1 PID: 15610 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1109.632894][T15610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.642962][T15610] Call Trace: [ 1109.642989][T15610] dump_stack+0x197/0x210 [ 1109.643011][T15610] should_fail.cold+0xa/0x15 [ 1109.643028][T15610] ? fault_create_debugfs_attr+0x180/0x180 [ 1109.643048][T15610] ? ___might_sleep+0x163/0x2c0 [ 1109.661035][T15610] should_fail_alloc_page+0x50/0x60 [ 1109.671049][T15610] __alloc_pages_nodemask+0x1a1/0x910 [ 1109.671068][T15610] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1109.671087][T15610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1109.671103][T15610] ? find_next_bit+0x107/0x130 [ 1109.688451][T15610] pcpu_populate_chunk+0xf8/0x940 [ 1109.688467][T15610] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1109.688478][T15610] ? find_next_bit+0x67/0x130 [ 1109.688497][T15610] pcpu_alloc+0xd5b/0x1380 [ 1109.713152][T15610] ? pcpu_alloc_area+0x820/0x820 [ 1109.718102][T15610] ? bpf_map_area_alloc+0x20/0x30 [ 1109.723150][T15610] __alloc_percpu_gfp+0x28/0x30 [ 1109.728017][T15610] htab_map_alloc+0xdb9/0x11c0 [ 1109.732807][T15610] ? htab_map_update_elem+0xca0/0xca0 [ 1109.738192][T15610] __do_sys_bpf+0x478/0x37b0 [ 1109.742799][T15610] ? bpf_prog_load+0x18a0/0x18a0 [ 1109.747739][T15610] ? __kasan_check_write+0x14/0x20 [ 1109.752864][T15610] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1109.758426][T15610] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1109.763723][T15610] ? wait_for_completion+0x440/0x440 [ 1109.769031][T15610] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1109.775294][T15610] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1109.780767][T15610] ? do_syscall_64+0x26/0x790 [ 1109.785454][T15610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1109.791534][T15610] ? do_syscall_64+0x26/0x790 [ 1109.796224][T15610] __x64_sys_bpf+0x73/0xb0 [ 1109.800648][T15610] do_syscall_64+0xfa/0x790 [ 1109.805166][T15610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1109.811062][T15610] RIP: 0033:0x45a679 [ 1109.814953][T15610] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1109.834545][T15610] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1109.834558][T15610] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1109.834565][T15610] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1109.834572][T15610] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1109.834579][T15610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1109.834586][T15610] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r4, 0x30, 0x1}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 06:29:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x600b, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:35 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000035800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:35 executing program 2 (fault-call:8 fault-nth:70): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:35 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000001c00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) [ 1120.610569][T15634] FAULT_INJECTION: forcing a failure. [ 1120.610569][T15634] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:29:36 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000036000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1120.670916][T15634] CPU: 1 PID: 15634 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1120.679300][T15634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.689370][T15634] Call Trace: [ 1120.692686][T15634] dump_stack+0x197/0x210 [ 1120.697057][T15634] should_fail.cold+0xa/0x15 [ 1120.701679][T15634] ? fault_create_debugfs_attr+0x180/0x180 [ 1120.707515][T15634] ? ___might_sleep+0x163/0x2c0 [ 1120.712397][T15634] should_fail_alloc_page+0x50/0x60 06:29:36 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000002800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1120.717622][T15634] __alloc_pages_nodemask+0x1a1/0x910 [ 1120.723017][T15634] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1120.728593][T15634] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1120.734368][T15634] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1120.740631][T15634] alloc_pages_current+0x107/0x210 [ 1120.745760][T15634] ? ___might_sleep+0x163/0x2c0 [ 1120.750639][T15634] __vmalloc_node_range+0x4f8/0x810 [ 1120.755887][T15634] __vmalloc+0x44/0x50 [ 1120.759989][T15634] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1120.764778][T15634] pcpu_mem_zalloc+0x8a/0xf0 06:29:36 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000003000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1120.769389][T15634] pcpu_create_chunk+0x12d/0x7f0 [ 1120.774353][T15634] pcpu_alloc+0x10f3/0x1380 [ 1120.778891][T15634] ? pcpu_alloc_area+0x820/0x820 [ 1120.783852][T15634] ? bpf_map_area_alloc+0x20/0x30 [ 1120.788905][T15634] __alloc_percpu_gfp+0x28/0x30 [ 1120.793774][T15634] htab_map_alloc+0xdb9/0x11c0 [ 1120.798567][T15634] ? htab_map_update_elem+0xca0/0xca0 [ 1120.803960][T15634] __do_sys_bpf+0x478/0x37b0 [ 1120.808572][T15634] ? bpf_prog_load+0x18a0/0x18a0 [ 1120.813519][T15634] ? __kasan_check_write+0x14/0x20 [ 1120.818646][T15634] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1120.824210][T15634] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1120.829518][T15634] ? wait_for_completion+0x440/0x440 [ 1120.834830][T15634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1120.841104][T15634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1120.846591][T15634] ? do_syscall_64+0x26/0x790 [ 1120.851293][T15634] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1120.857377][T15634] ? do_syscall_64+0x26/0x790 [ 1120.862075][T15634] __x64_sys_bpf+0x73/0xb0 [ 1120.866515][T15634] do_syscall_64+0xfa/0x790 06:29:36 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000003f00, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1120.871048][T15634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1120.876970][T15634] RIP: 0033:0x45a679 [ 1120.880880][T15634] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1120.900501][T15634] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1120.908929][T15634] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 06:29:36 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000037000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1120.916915][T15634] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1120.924900][T15634] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1120.932982][T15634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1120.941057][T15634] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:36 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000004000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r2, 0x0, 0x0) 06:29:43 executing program 2 (fault-call:8 fault-nth:71): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x600c, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000037800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:43 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000004800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x70, 0x3, 0x3f, 0x80, 0x40, 0x0, 0x6, 0x108, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0xe20, 0x8, 0x1, 0xd795d6f1804a7933, 0x8, 0x314, 0x8001}, r2, 0x5, 0xffffffffffffffff, 0xa) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) openat$cgroup_ro(r0, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x1f, 0x4, 0xc7, 0x2e, 0x0, 0x2, 0x20002, 0x10, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xee3, 0x5, @perf_config_ext={0x7fffffff, 0x5f}, 0xb530, 0x3, 0x5, 0x6, 0xa3, 0xc43f, 0x6}, 0x0, 0xa, r0, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}}, 0x0, 0x0, r3, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) socketpair(0x3, 0x73083c2f43b9bdc3, 0x2, &(0x7f0000000080)) [ 1127.868071][T15710] FAULT_INJECTION: forcing a failure. [ 1127.868071][T15710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1127.893931][T15710] CPU: 0 PID: 15710 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1127.902307][T15710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.912380][T15710] Call Trace: [ 1127.915701][T15710] dump_stack+0x197/0x210 [ 1127.920059][T15710] should_fail.cold+0xa/0x15 [ 1127.924669][T15710] ? fault_create_debugfs_attr+0x180/0x180 [ 1127.930490][T15710] ? ___might_sleep+0x163/0x2c0 [ 1127.935373][T15710] should_fail_alloc_page+0x50/0x60 [ 1127.940595][T15710] __alloc_pages_nodemask+0x1a1/0x910 [ 1127.945989][T15710] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1127.951736][T15710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1127.957995][T15710] ? find_next_bit+0x107/0x130 [ 1127.962780][T15710] pcpu_populate_chunk+0xf8/0x940 [ 1127.967822][T15710] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1127.973557][T15710] ? find_next_bit+0x67/0x130 [ 1127.978267][T15710] pcpu_alloc+0xd5b/0x1380 [ 1127.982715][T15710] ? pcpu_alloc_area+0x820/0x820 [ 1127.987657][T15710] ? bpf_map_area_alloc+0x20/0x30 [ 1127.992697][T15710] __alloc_percpu_gfp+0x28/0x30 [ 1127.997559][T15710] htab_map_alloc+0xdb9/0x11c0 [ 1128.002341][T15710] ? htab_map_update_elem+0xca0/0xca0 [ 1128.007722][T15710] __do_sys_bpf+0x478/0x37b0 [ 1128.012320][T15710] ? bpf_prog_load+0x18a0/0x18a0 [ 1128.017267][T15710] ? __kasan_check_write+0x14/0x20 [ 1128.022397][T15710] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1128.027958][T15710] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1128.033252][T15710] ? wait_for_completion+0x440/0x440 [ 1128.038542][T15710] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1128.044806][T15710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1128.050282][T15710] ? do_syscall_64+0x26/0x790 [ 1128.054974][T15710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.061053][T15710] ? do_syscall_64+0x26/0x790 06:29:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000038800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:43 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000005800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1128.065753][T15710] __x64_sys_bpf+0x73/0xb0 [ 1128.070176][T15710] do_syscall_64+0xfa/0x790 [ 1128.070198][T15710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.070214][T15710] RIP: 0033:0x45a679 [ 1128.070228][T15710] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1128.070235][T15710] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 06:29:43 executing program 2 (fault-call:8 fault-nth:72): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000039000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1128.070248][T15710] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1128.070256][T15710] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1128.070264][T15710] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1128.070272][T15710] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1128.070280][T15710] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 1128.207771][T15729] FAULT_INJECTION: forcing a failure. [ 1128.207771][T15729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:29:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000003a000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1128.323709][T15729] CPU: 0 PID: 15729 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1128.332091][T15729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.342155][T15729] Call Trace: [ 1128.345464][T15729] dump_stack+0x197/0x210 [ 1128.349822][T15729] should_fail.cold+0xa/0x15 [ 1128.354441][T15729] ? fault_create_debugfs_attr+0x180/0x180 [ 1128.360265][T15729] ? ___might_sleep+0x163/0x2c0 [ 1128.365146][T15729] should_fail_alloc_page+0x50/0x60 [ 1128.370372][T15729] __alloc_pages_nodemask+0x1a1/0x910 [ 1128.375773][T15729] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1128.381517][T15729] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1128.387859][T15729] ? find_next_bit+0x107/0x130 [ 1128.392642][T15729] pcpu_populate_chunk+0xf8/0x940 [ 1128.397682][T15729] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1128.403411][T15729] ? find_next_bit+0x67/0x130 [ 1128.408106][T15729] pcpu_alloc+0xd5b/0x1380 [ 1128.412549][T15729] ? pcpu_alloc_area+0x820/0x820 [ 1128.417498][T15729] ? bpf_map_area_alloc+0x20/0x30 [ 1128.422537][T15729] __alloc_percpu_gfp+0x28/0x30 [ 1128.427400][T15729] htab_map_alloc+0xdb9/0x11c0 [ 1128.432186][T15729] ? htab_map_update_elem+0xca0/0xca0 [ 1128.437568][T15729] __do_sys_bpf+0x478/0x37b0 [ 1128.442182][T15729] ? bpf_prog_load+0x18a0/0x18a0 [ 1128.447140][T15729] ? __kasan_check_write+0x14/0x20 [ 1128.452271][T15729] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1128.457832][T15729] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1128.463135][T15729] ? wait_for_completion+0x440/0x440 [ 1128.468440][T15729] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1128.474707][T15729] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1128.480181][T15729] ? do_syscall_64+0x26/0x790 [ 1128.484875][T15729] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.490965][T15729] ? do_syscall_64+0x26/0x790 [ 1128.495666][T15729] __x64_sys_bpf+0x73/0xb0 [ 1128.500109][T15729] do_syscall_64+0xfa/0x790 [ 1128.504635][T15729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.510539][T15729] RIP: 0033:0x45a679 06:29:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x600d, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1128.514447][T15729] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1128.534055][T15729] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1128.542457][T15729] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1128.550413][T15729] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1128.558426][T15729] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1128.566391][T15729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1128.574353][T15729] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:29:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r2, 0x0, 0x0) 06:29:54 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000003a800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:54 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000006000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:54 executing program 2 (fault-call:8 fault-nth:73): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:54 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x600e, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1139.151617][T15782] FAULT_INJECTION: forcing a failure. [ 1139.151617][T15782] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1139.194871][T15782] CPU: 0 PID: 15782 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1139.203242][T15782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.213310][T15782] Call Trace: [ 1139.216617][T15782] dump_stack+0x197/0x210 [ 1139.220968][T15782] should_fail.cold+0xa/0x15 [ 1139.225576][T15782] ? fault_create_debugfs_attr+0x180/0x180 [ 1139.231376][T15782] ? ___might_sleep+0x163/0x2c0 [ 1139.231400][T15782] should_fail_alloc_page+0x50/0x60 [ 1139.231415][T15782] __alloc_pages_nodemask+0x1a1/0x910 [ 1139.231434][T15782] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1139.231460][T15782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1139.241469][T15782] ? find_next_bit+0x107/0x130 [ 1139.241489][T15782] pcpu_populate_chunk+0xf8/0x940 [ 1139.241503][T15782] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1139.241514][T15782] ? find_next_bit+0x67/0x130 [ 1139.241532][T15782] pcpu_alloc+0xd5b/0x1380 [ 1139.241556][T15782] ? pcpu_alloc_area+0x820/0x820 [ 1139.241572][T15782] ? bpf_map_area_alloc+0x20/0x30 06:29:54 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000003b800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1139.241594][T15782] __alloc_percpu_gfp+0x28/0x30 [ 1139.241615][T15782] htab_map_alloc+0xdb9/0x11c0 [ 1139.303033][T15782] ? htab_map_update_elem+0xca0/0xca0 [ 1139.308418][T15782] __do_sys_bpf+0x478/0x37b0 [ 1139.313028][T15782] ? bpf_prog_load+0x18a0/0x18a0 [ 1139.317978][T15782] ? __kasan_check_write+0x14/0x20 [ 1139.323094][T15782] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1139.328656][T15782] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1139.333969][T15782] ? wait_for_completion+0x440/0x440 [ 1139.339269][T15782] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1139.345526][T15782] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1139.350987][T15782] ? do_syscall_64+0x26/0x790 [ 1139.355677][T15782] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.361741][T15782] ? do_syscall_64+0x26/0x790 [ 1139.361761][T15782] __x64_sys_bpf+0x73/0xb0 [ 1139.361776][T15782] do_syscall_64+0xfa/0x790 [ 1139.361796][T15782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.361807][T15782] RIP: 0033:0x45a679 [ 1139.361821][T15782] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1139.361829][T15782] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1139.361849][T15782] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1139.361858][T15782] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1139.361866][T15782] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1139.361873][T15782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 06:29:54 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000003c000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:54 executing program 2 (fault-call:8 fault-nth:74): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:29:54 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000007000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1139.361881][T15782] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 1139.455253][T15800] FAULT_INJECTION: forcing a failure. [ 1139.455253][T15800] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1139.502834][T15800] CPU: 0 PID: 15800 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1139.511212][T15800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.521271][T15800] Call Trace: [ 1139.524566][T15800] dump_stack+0x197/0x210 [ 1139.528904][T15800] should_fail.cold+0xa/0x15 [ 1139.528923][T15800] ? fault_create_debugfs_attr+0x180/0x180 [ 1139.528937][T15800] ? ___might_sleep+0x163/0x2c0 [ 1139.528960][T15800] should_fail_alloc_page+0x50/0x60 [ 1139.528976][T15800] __alloc_pages_nodemask+0x1a1/0x910 [ 1139.528995][T15800] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1139.529018][T15800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1139.549411][T15800] ? find_next_bit+0x107/0x130 [ 1139.549432][T15800] pcpu_populate_chunk+0xf8/0x940 [ 1139.549447][T15800] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1139.549457][T15800] ? find_next_bit+0x67/0x130 [ 1139.549475][T15800] pcpu_alloc+0xd5b/0x1380 [ 1139.549496][T15800] ? pcpu_alloc_area+0x820/0x820 [ 1139.596267][T15800] ? bpf_map_area_alloc+0x20/0x30 06:29:55 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000003d000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1139.601325][T15800] __alloc_percpu_gfp+0x28/0x30 [ 1139.606192][T15800] htab_map_alloc+0xdb9/0x11c0 [ 1139.610979][T15800] ? htab_map_update_elem+0xca0/0xca0 [ 1139.616361][T15800] __do_sys_bpf+0x478/0x37b0 [ 1139.620966][T15800] ? bpf_prog_load+0x18a0/0x18a0 [ 1139.625911][T15800] ? __kasan_check_write+0x14/0x20 [ 1139.631036][T15800] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1139.636596][T15800] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1139.641888][T15800] ? wait_for_completion+0x440/0x440 [ 1139.647188][T15800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 06:29:55 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000003d800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1139.653450][T15800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1139.658919][T15800] ? do_syscall_64+0x26/0x790 [ 1139.663598][T15800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.669655][T15800] ? do_syscall_64+0x26/0x790 [ 1139.669674][T15800] __x64_sys_bpf+0x73/0xb0 [ 1139.669688][T15800] do_syscall_64+0xfa/0x790 [ 1139.669706][T15800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.669717][T15800] RIP: 0033:0x45a679 [ 1139.669731][T15800] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1139.669737][T15800] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1139.669750][T15800] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1139.669765][T15800] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1139.669777][T15800] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1139.744999][T15800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1139.752984][T15800] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:30:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r5, 0x30, 0x1}, 0x10) write$cgroup_int(r2, 0x0, 0x0) 06:30:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000003e800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:05 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000007800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:05 executing program 2 (fault-call:8 fault-nth:75): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:05 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x600f, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x7, 0x1}, 0xc) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1150.497758][T15841] FAULT_INJECTION: forcing a failure. [ 1150.497758][T15841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1150.523216][T15841] CPU: 1 PID: 15841 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1150.531587][T15841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.541663][T15841] Call Trace: [ 1150.544964][T15841] dump_stack+0x197/0x210 [ 1150.549315][T15841] should_fail.cold+0xa/0x15 [ 1150.553930][T15841] ? fault_create_debugfs_attr+0x180/0x180 [ 1150.559746][T15841] ? ___might_sleep+0x163/0x2c0 [ 1150.564622][T15841] should_fail_alloc_page+0x50/0x60 [ 1150.569838][T15841] __alloc_pages_nodemask+0x1a1/0x910 [ 1150.575234][T15841] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1150.580984][T15841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1150.587251][T15841] ? find_next_bit+0x107/0x130 [ 1150.592037][T15841] pcpu_populate_chunk+0xf8/0x940 [ 1150.597075][T15841] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1150.602803][T15841] ? find_next_bit+0x67/0x130 [ 1150.607505][T15841] pcpu_alloc+0xd5b/0x1380 [ 1150.611944][T15841] ? pcpu_alloc_area+0x820/0x820 [ 1150.616896][T15841] ? bpf_map_area_alloc+0x20/0x30 [ 1150.621954][T15841] __alloc_percpu_gfp+0x28/0x30 [ 1150.626819][T15841] htab_map_alloc+0xdb9/0x11c0 [ 1150.631611][T15841] ? htab_map_update_elem+0xca0/0xca0 [ 1150.636996][T15841] __do_sys_bpf+0x478/0x37b0 [ 1150.641608][T15841] ? bpf_prog_load+0x18a0/0x18a0 [ 1150.646558][T15841] ? __kasan_check_write+0x14/0x20 [ 1150.651680][T15841] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1150.657231][T15841] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1150.662528][T15841] ? wait_for_completion+0x440/0x440 [ 1150.667828][T15841] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1150.674092][T15841] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1150.679562][T15841] ? do_syscall_64+0x26/0x790 [ 1150.684249][T15841] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.690325][T15841] ? do_syscall_64+0x26/0x790 06:30:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000008800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1150.695032][T15841] __x64_sys_bpf+0x73/0xb0 [ 1150.699469][T15841] do_syscall_64+0xfa/0x790 [ 1150.703981][T15841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.710007][T15841] RIP: 0033:0x45a679 [ 1150.713917][T15841] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1150.733539][T15841] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 06:30:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000009000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:06 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000003f000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1150.741962][T15841] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1150.749943][T15841] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1150.757926][T15841] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1150.765903][T15841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1150.773892][T15841] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:30:06 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000040000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000a000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:06 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6010, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:30:15 executing program 2 (fault-call:8 fault-nth:76): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:15 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000080100, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:15 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000a800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6011, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1159.702256][T15922] FAULT_INJECTION: forcing a failure. [ 1159.702256][T15922] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1159.745087][T15922] CPU: 0 PID: 15922 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1159.753462][T15922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1159.763514][T15922] Call Trace: [ 1159.763534][T15922] dump_stack+0x197/0x210 [ 1159.763556][T15922] should_fail.cold+0xa/0x15 [ 1159.763576][T15922] ? fault_create_debugfs_attr+0x180/0x180 [ 1159.775780][T15922] ? ___might_sleep+0x163/0x2c0 [ 1159.786434][T15922] should_fail_alloc_page+0x50/0x60 [ 1159.791650][T15922] __alloc_pages_nodemask+0x1a1/0x910 [ 1159.797040][T15922] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1159.802778][T15922] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1159.809045][T15922] ? find_next_bit+0x107/0x130 [ 1159.813827][T15922] pcpu_populate_chunk+0xf8/0x940 [ 1159.818868][T15922] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1159.824603][T15922] ? find_next_bit+0x67/0x130 [ 1159.829287][T15922] pcpu_alloc+0xd5b/0x1380 [ 1159.833694][T15922] ? pcpu_alloc_area+0x820/0x820 [ 1159.838613][T15922] ? bpf_map_area_alloc+0x20/0x30 [ 1159.843643][T15922] __alloc_percpu_gfp+0x28/0x30 [ 1159.848486][T15922] htab_map_alloc+0xdb9/0x11c0 [ 1159.853237][T15922] ? htab_map_update_elem+0xca0/0xca0 [ 1159.858590][T15922] __do_sys_bpf+0x478/0x37b0 [ 1159.863182][T15922] ? bpf_prog_load+0x18a0/0x18a0 [ 1159.868120][T15922] ? __kasan_check_write+0x14/0x20 [ 1159.873222][T15922] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1159.878751][T15922] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1159.884017][T15922] ? wait_for_completion+0x440/0x440 [ 1159.889288][T15922] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1159.895557][T15922] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1159.901010][T15922] ? do_syscall_64+0x26/0x790 [ 1159.905679][T15922] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.911736][T15922] ? do_syscall_64+0x26/0x790 [ 1159.916397][T15922] __x64_sys_bpf+0x73/0xb0 [ 1159.920830][T15922] do_syscall_64+0xfa/0x790 [ 1159.925318][T15922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.931192][T15922] RIP: 0033:0x45a679 [ 1159.935071][T15922] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1159.954702][T15922] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1159.963097][T15922] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1159.971049][T15922] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1159.979053][T15922] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1159.987005][T15922] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1159.994959][T15922] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:30:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r2, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)=']]{/eth1/vmnet0\x00', r2}, 0x10) r3 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x3, 0x8020004, 0x5}, &(0x7f0000000380)=0x100000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000}}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000240)=r0, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r3, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x6, &(0x7f0000000000)='#\x9dppp0', r4}, 0x30) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r5) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) openat$cgroup_ro(r6, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r8 = openat$cgroup(r6, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x63f0863ed704cfce, 0x70, 0x81, 0x3f, 0x3, 0x58, 0x0, 0x7fff, 0x20, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0xedc57d84d2d95e6, @perf_bp={&(0x7f0000000280), 0xf1ca2730981d4f39}, 0x9020, 0x1, 0xe87efdb, 0x6, 0xfffffffffffffffb, 0xa00000, 0x7ff}, r8, 0x8, 0xffffffffffffffff, 0x1) 06:30:23 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000080200, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:23 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000b800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:23 executing program 2 (fault-call:8 fault-nth:77): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:23 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6012, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1168.344555][T15958] FAULT_INJECTION: forcing a failure. [ 1168.344555][T15958] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1168.381024][T15958] CPU: 0 PID: 15958 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 06:30:23 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000100000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1168.389396][T15958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1168.399469][T15958] Call Trace: [ 1168.402780][T15958] dump_stack+0x197/0x210 [ 1168.407132][T15958] should_fail.cold+0xa/0x15 [ 1168.411741][T15958] ? fault_create_debugfs_attr+0x180/0x180 [ 1168.417555][T15958] ? ___might_sleep+0x163/0x2c0 [ 1168.422404][T15958] should_fail_alloc_page+0x50/0x60 [ 1168.422418][T15958] __alloc_pages_nodemask+0x1a1/0x910 [ 1168.422436][T15958] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1168.422457][T15958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1168.422469][T15958] ? find_next_bit+0x107/0x130 [ 1168.422487][T15958] pcpu_populate_chunk+0xf8/0x940 [ 1168.422498][T15958] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1168.422512][T15958] ? find_next_bit+0x67/0x130 [ 1168.465131][T15958] pcpu_alloc+0xd5b/0x1380 [ 1168.469548][T15958] ? pcpu_alloc_area+0x820/0x820 [ 1168.474655][T15958] ? bpf_map_area_alloc+0x20/0x30 [ 1168.479670][T15958] __alloc_percpu_gfp+0x28/0x30 [ 1168.484503][T15958] htab_map_alloc+0xdb9/0x11c0 [ 1168.489256][T15958] ? htab_map_update_elem+0xca0/0xca0 [ 1168.494662][T15958] __do_sys_bpf+0x478/0x37b0 [ 1168.499277][T15958] ? bpf_prog_load+0x18a0/0x18a0 [ 1168.504197][T15958] ? __kasan_check_write+0x14/0x20 [ 1168.509289][T15958] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1168.514817][T15958] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1168.520086][T15958] ? wait_for_completion+0x440/0x440 [ 1168.525379][T15958] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1168.531608][T15958] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1168.537048][T15958] ? do_syscall_64+0x26/0x790 [ 1168.541714][T15958] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1168.547760][T15958] ? do_syscall_64+0x26/0x790 [ 1168.552485][T15958] __x64_sys_bpf+0x73/0xb0 [ 1168.556887][T15958] do_syscall_64+0xfa/0x790 [ 1168.561378][T15958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1168.567258][T15958] RIP: 0033:0x45a679 [ 1168.571149][T15958] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:30:24 executing program 2 (fault-call:8 fault-nth:78): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1168.590738][T15958] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1168.599132][T15958] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1168.607093][T15958] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1168.615057][T15958] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1168.623008][T15958] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1168.630961][T15958] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 1168.791183][T15984] FAULT_INJECTION: forcing a failure. [ 1168.791183][T15984] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1168.824929][T15984] CPU: 1 PID: 15984 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1168.833299][T15984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1168.843365][T15984] Call Trace: [ 1168.846677][T15984] dump_stack+0x197/0x210 [ 1168.851039][T15984] should_fail.cold+0xa/0x15 [ 1168.855736][T15984] ? fault_create_debugfs_attr+0x180/0x180 [ 1168.861560][T15984] ? ___might_sleep+0x163/0x2c0 [ 1168.861585][T15984] should_fail_alloc_page+0x50/0x60 [ 1168.861600][T15984] __alloc_pages_nodemask+0x1a1/0x910 [ 1168.861620][T15984] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1168.861648][T15984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1168.888980][T15984] ? find_next_bit+0x107/0x130 [ 1168.893763][T15984] pcpu_populate_chunk+0xf8/0x940 [ 1168.898795][T15984] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1168.904526][T15984] ? find_next_bit+0x67/0x130 [ 1168.909227][T15984] pcpu_alloc+0xd5b/0x1380 [ 1168.913641][T15984] ? pcpu_alloc_area+0x820/0x820 [ 1168.918580][T15984] ? bpf_map_area_alloc+0x20/0x30 [ 1168.923705][T15984] __alloc_percpu_gfp+0x28/0x30 [ 1168.928560][T15984] htab_map_alloc+0xdb9/0x11c0 [ 1168.933313][T15984] ? htab_map_update_elem+0xca0/0xca0 [ 1168.938665][T15984] __do_sys_bpf+0x478/0x37b0 [ 1168.943237][T15984] ? bpf_prog_load+0x18a0/0x18a0 [ 1168.948167][T15984] ? __kasan_check_write+0x14/0x20 [ 1168.953267][T15984] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1168.958791][T15984] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1168.964057][T15984] ? wait_for_completion+0x440/0x440 [ 1168.969325][T15984] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1168.975555][T15984] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1168.980994][T15984] ? do_syscall_64+0x26/0x790 [ 1168.985653][T15984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1168.991696][T15984] ? do_syscall_64+0x26/0x790 [ 1168.996357][T15984] __x64_sys_bpf+0x73/0xb0 [ 1169.000757][T15984] do_syscall_64+0xfa/0x790 [ 1169.005256][T15984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1169.011139][T15984] RIP: 0033:0x45a679 [ 1169.015017][T15984] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1169.034600][T15984] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1169.042987][T15984] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1169.050939][T15984] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1169.058890][T15984] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1169.066947][T15984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1169.074911][T15984] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:30:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:30:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000c000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:28 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000100200, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:28 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6013, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:28 executing program 2 (fault-call:8 fault-nth:79): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1173.140009][T15996] FAULT_INJECTION: forcing a failure. [ 1173.140009][T15996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1173.171177][T15996] CPU: 1 PID: 15996 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1173.179554][T15996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1173.189616][T15996] Call Trace: [ 1173.192925][T15996] dump_stack+0x197/0x210 [ 1173.197277][T15996] should_fail.cold+0xa/0x15 [ 1173.201883][T15996] ? fault_create_debugfs_attr+0x180/0x180 [ 1173.207697][T15996] ? ___might_sleep+0x163/0x2c0 [ 1173.212554][T15996] should_fail_alloc_page+0x50/0x60 [ 1173.217750][T15996] __alloc_pages_nodemask+0x1a1/0x910 [ 1173.223124][T15996] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1173.228859][T15996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1173.235093][T15996] ? find_next_bit+0x107/0x130 [ 1173.239855][T15996] pcpu_populate_chunk+0xf8/0x940 [ 1173.239869][T15996] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1173.239880][T15996] ? find_next_bit+0x67/0x130 [ 1173.239899][T15996] pcpu_alloc+0xd5b/0x1380 [ 1173.239921][T15996] ? pcpu_alloc_area+0x820/0x820 [ 1173.239935][T15996] ? bpf_map_area_alloc+0x20/0x30 [ 1173.239958][T15996] __alloc_percpu_gfp+0x28/0x30 [ 1173.239973][T15996] htab_map_alloc+0xdb9/0x11c0 [ 1173.239997][T15996] ? htab_map_update_elem+0xca0/0xca0 [ 1173.284669][T15996] __do_sys_bpf+0x478/0x37b0 [ 1173.289281][T15996] ? bpf_prog_load+0x18a0/0x18a0 [ 1173.294364][T15996] ? __kasan_check_write+0x14/0x20 [ 1173.299463][T15996] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1173.304987][T15996] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1173.310273][T15996] ? wait_for_completion+0x440/0x440 [ 1173.315577][T15996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1173.321845][T15996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1173.327318][T15996] ? do_syscall_64+0x26/0x790 [ 1173.332011][T15996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1173.338086][T15996] ? do_syscall_64+0x26/0x790 [ 1173.342784][T15996] __x64_sys_bpf+0x73/0xb0 [ 1173.347251][T15996] do_syscall_64+0xfa/0x790 [ 1173.351757][T15996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1173.357641][T15996] RIP: 0033:0x45a679 [ 1173.361534][T15996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1173.381143][T15996] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1173.389547][T15996] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1173.397528][T15996] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1173.405482][T15996] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1173.413438][T15996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1173.421395][T15996] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:30:34 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000d000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:30:34 executing program 2 (fault-call:8 fault-nth:80): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:34 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000100300, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6014, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1179.630577][T16027] FAULT_INJECTION: forcing a failure. [ 1179.630577][T16027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:30:35 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000180000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1179.681844][T16027] CPU: 1 PID: 16027 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1179.690221][T16027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.700285][T16027] Call Trace: [ 1179.700309][T16027] dump_stack+0x197/0x210 [ 1179.700331][T16027] should_fail.cold+0xa/0x15 [ 1179.700349][T16027] ? fault_create_debugfs_attr+0x180/0x180 [ 1179.700362][T16027] ? ___might_sleep+0x163/0x2c0 [ 1179.700386][T16027] should_fail_alloc_page+0x50/0x60 06:30:35 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000180100, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1179.700402][T16027] __alloc_pages_nodemask+0x1a1/0x910 [ 1179.700423][T16027] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1179.700446][T16027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1179.700460][T16027] ? find_next_bit+0x107/0x130 [ 1179.700479][T16027] pcpu_populate_chunk+0xf8/0x940 [ 1179.700498][T16027] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1179.712672][T16027] ? find_next_bit+0x67/0x130 [ 1179.765944][T16027] pcpu_alloc+0xd5b/0x1380 [ 1179.770385][T16027] ? pcpu_alloc_area+0x820/0x820 [ 1179.775333][T16027] ? bpf_map_area_alloc+0x20/0x30 [ 1179.780378][T16027] __alloc_percpu_gfp+0x28/0x30 [ 1179.785237][T16027] htab_map_alloc+0xdb9/0x11c0 [ 1179.790020][T16027] ? htab_map_update_elem+0xca0/0xca0 [ 1179.795416][T16027] __do_sys_bpf+0x478/0x37b0 [ 1179.800019][T16027] ? bpf_prog_load+0x18a0/0x18a0 [ 1179.804958][T16027] ? __kasan_check_write+0x14/0x20 [ 1179.810081][T16027] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1179.815642][T16027] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1179.820938][T16027] ? wait_for_completion+0x440/0x440 [ 1179.826238][T16027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1179.832505][T16027] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1179.837977][T16027] ? do_syscall_64+0x26/0x790 [ 1179.842669][T16027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1179.848745][T16027] ? do_syscall_64+0x26/0x790 [ 1179.853437][T16027] __x64_sys_bpf+0x73/0xb0 [ 1179.857868][T16027] do_syscall_64+0xfa/0x790 [ 1179.862386][T16027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1179.868284][T16027] RIP: 0033:0x45a679 [ 1179.872188][T16027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1179.891798][T16027] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1179.891813][T16027] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1179.891820][T16027] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1179.891828][T16027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1179.891835][T16027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1179.891843][T16027] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:30:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:30:37 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000180300, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:37 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000d800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:37 executing program 2 (fault-call:8 fault-nth:81): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6015, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1182.352812][T16066] FAULT_INJECTION: forcing a failure. [ 1182.352812][T16066] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1182.387065][T16066] CPU: 0 PID: 16066 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1182.395445][T16066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.405511][T16066] Call Trace: [ 1182.408799][T16066] dump_stack+0x197/0x210 [ 1182.413149][T16066] should_fail.cold+0xa/0x15 [ 1182.417766][T16066] ? fault_create_debugfs_attr+0x180/0x180 [ 1182.423586][T16066] ? ___might_sleep+0x163/0x2c0 [ 1182.428463][T16066] should_fail_alloc_page+0x50/0x60 [ 1182.433672][T16066] __alloc_pages_nodemask+0x1a1/0x910 [ 1182.439064][T16066] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1182.444805][T16066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 06:30:37 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a0200001c0000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1182.451056][T16066] ? find_next_bit+0x107/0x130 [ 1182.455833][T16066] pcpu_populate_chunk+0xf8/0x940 [ 1182.460871][T16066] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1182.466602][T16066] ? find_next_bit+0x67/0x130 [ 1182.471291][T16066] pcpu_alloc+0xd5b/0x1380 [ 1182.475736][T16066] ? pcpu_alloc_area+0x820/0x820 [ 1182.480712][T16066] ? bpf_map_area_alloc+0x20/0x30 [ 1182.485754][T16066] __alloc_percpu_gfp+0x28/0x30 [ 1182.490614][T16066] htab_map_alloc+0xdb9/0x11c0 [ 1182.495404][T16066] ? htab_map_update_elem+0xca0/0xca0 [ 1182.500788][T16066] __do_sys_bpf+0x478/0x37b0 [ 1182.505382][T16066] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1182.510651][T16066] ? bpf_prog_load+0x18a0/0x18a0 [ 1182.515572][T16066] ? _raw_spin_unlock_irq+0x59/0x80 [ 1182.520754][T16066] ? finish_task_switch+0x147/0x750 [ 1182.525936][T16066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1182.532156][T16066] ? debug_smp_processor_id+0x33/0x18a [ 1182.537608][T16066] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1182.543753][T16066] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1182.549208][T16066] ? do_syscall_64+0x26/0x790 [ 1182.553885][T16066] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1182.559940][T16066] ? do_syscall_64+0x26/0x790 [ 1182.564603][T16066] __x64_sys_bpf+0x73/0xb0 [ 1182.569013][T16066] do_syscall_64+0xfa/0x790 [ 1182.573506][T16066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1182.579381][T16066] RIP: 0033:0x45a679 [ 1182.583258][T16066] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1182.602842][T16066] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1182.611242][T16066] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1182.619206][T16066] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1182.627171][T16066] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1182.635166][T16066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1182.643126][T16066] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:30:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000008c0), 0x226390f47c0c0dfb}, 0x8240}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r2, &(0x7f00000020c0)={&(0x7f0000000fc0)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x1}}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001040)="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", 0x1000}], 0x1, &(0x7f0000002080)=[{0x28, 0x103, 0x8, "2ad6c86e0e97bec61554c04c7f7e879b3a089dc1e5a7f8"}], 0x28}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000f80)={&(0x7f0000000900)=@pptp={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000980)="1303a3bc29deee6e58246c83", 0xc}, {&(0x7f00000009c0)="c0838e646a40ebc81ac586d66a2397a5ba0570a89219c828b640af568874ef491e4cf268364089e674bb2ec7bc72e440639ba08ab54bdd1da0c42bd7a8d14d3d435d17e589d93ff5c6ecba77752d8b93a72a8ce5486165f06f17bdb1c70a70a539667ffa8dd5101c39ce00f1368b3fd2d2a2bb76f8f6e252311e5150e2df8582805f54e603280caa9715a1ce0117da8bbadff0e56d0a50b603988f7838fc1f9e39a27ac8a0273f698acabf83a11b5a3fbf85c69b7651667f6133ee501d944f35cc0e4ccf216c17a6f6587252a50bf32c548058c282767be6940199d49cff888dece97cb98e61d140fb5b55", 0xeb}, {&(0x7f0000000ac0)="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", 0xfc}, {&(0x7f0000000bc0)="0c562bd63adf8aa560f171aff5b356e3bf55f003617d3fc25ec02a5ea10ee4f9cc81938b538029d487bb16308fdc3e1006c0057875481e71312c545d6b62d7f67b40dee4e7ce2772721de496af7e33442563f1cc367d5786a3f385e2b3987e6f3dbbe3458ab6f2d73763dbde2dace07a2090d4d5c674e5a002d54c445d14b96a0b48301abe168f125d5ad57eeab03fdee48107eddc8fae2ad4c3f415dfd61ced10e7d0ef949f533c8f21b7707512add08613b43f77b00a77", 0xb8}, {&(0x7f0000000c80)="1da73a2c3676ed99a07854b41a1b5d3caf8c5a78c67e247bf28dc02d03c685b8b4f558", 0x23}, {&(0x7f0000000cc0)="9972f29153e6b5564efd47672932b904bffd59e9b8afaec6dc3fbe673a8f067e176833920b9c661144b2902c196238d8aa8fce500380b1e4ca7c3b6f7954713dfe1576cafcf49029de225e4cf12b7948014da1d723a296eb2eb16ea2e2814a03", 0x60}], 0x6, &(0x7f0000000dc0)=[{0x50, 0x111, 0x0, "ffd77f092dc760a15c8943b31940eb19382fd06e1279444139464625df859dcdfaffbbe3c6c80acee3ce6215def16314e0a3ebc8bbc6dd0a57ac660897df0c25"}, {0x70, 0x10b, 0x80, "5ff884955489ff4b5d2a4e6bf2a393b6fedf56eda9bac4426ee32442f8c8aa152af7cdccbc52e4d84bc4b9d8c718aab877616ceeaecfac8b3a079c70eae73959989666f64eb0af1f0fa26b780c0a832036c71470841133b48c87908206eacc01"}, {0xd8, 0x109, 0x3, "da87b45b0bf6c803767025e9f7f402d8a04ac20832a9135a41e927e27a64b8556e7fb9e92fcac0e270aa991a118dd5f1648970ef5b52f3faad267168f543961f4d5ddcd43e95f41dfc92860df858d53cb42df95842e5b4627f32f80b2dabdf67a7eb46bd7ab5630ef341fdf785c17274f6840398077083809381c6c7804e6f194834a26b8978456ecda224e764f040310efb7b88d9bb650342e41c91c4c24ecef85dda14bb26f60e77b8d97aecf01794a8a5f295961998b278d45de776a788f89a161a2f2c86f357"}], 0x198}, 0x1008c881) socket$kcm(0x29, 0x2, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f00000000c0)) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$inet(r3, &(0x7f0000003240)={&(0x7f0000002100)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f00000031c0)=[{&(0x7f0000002140)="caa967756e0894e69a2bb8044ccc58306cf3a91e68a1a984b23903ad17cd4621397a7ac535d4a00e3ba225600d320f1f502900116718fe330a7767618b651a29d2cb3435d73819b64bdcf3e85d16e42344d22c141db88ba03193dd5fe00f8b5527b5540e34579837ee63f6521b17ce9b27d7f861f8c6950840459b", 0x7b}, {&(0x7f00000021c0)="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", 0x1000}], 0x2, &(0x7f0000003200)=[@ip_retopts={{0x24, 0x0, 0x7, {[@lsrr={0x83, 0x13, 0x0, [@multicast1, @multicast2, @remote, @rand_addr=0xffff]}]}}}], 0x28}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000880)={&(0x7f0000000040)=@ax25={{0x3, @rose}, [@null, @default, @remote, @default, @default, @null, @remote, @netrom]}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000100)=""/110, 0x6e}, {&(0x7f0000000200)=""/213, 0xd5}, {&(0x7f0000003280)=""/223, 0xdf}, {&(0x7f0000003440)=""/189, 0xbd}, {&(0x7f0000003380)=""/129, 0x81}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f0000000640)=""/247, 0xf7}, {&(0x7f0000000740)=""/29, 0x1d}], 0x8, &(0x7f0000000800)=""/125, 0x7d}, 0x100) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r5}, 0x10) 06:30:44 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6016, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:44 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000e800, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:44 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000200100, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:44 executing program 2 (fault-call:8 fault-nth:82): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:44 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000200200, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1188.929748][T16103] FAULT_INJECTION: forcing a failure. [ 1188.929748][T16103] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1188.998679][T16103] CPU: 1 PID: 16103 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1189.007057][T16103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.017121][T16103] Call Trace: [ 1189.020412][T16103] dump_stack+0x197/0x210 [ 1189.024758][T16103] should_fail.cold+0xa/0x15 [ 1189.029378][T16103] ? fault_create_debugfs_attr+0x180/0x180 [ 1189.035200][T16103] ? ___might_sleep+0x163/0x2c0 [ 1189.040075][T16103] should_fail_alloc_page+0x50/0x60 [ 1189.045294][T16103] __alloc_pages_nodemask+0x1a1/0x910 [ 1189.050688][T16103] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1189.056421][T16103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1189.062651][T16103] ? find_next_bit+0x107/0x130 [ 1189.062669][T16103] pcpu_populate_chunk+0xf8/0x940 [ 1189.062681][T16103] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1189.062691][T16103] ? find_next_bit+0x67/0x130 [ 1189.062710][T16103] pcpu_alloc+0xd5b/0x1380 [ 1189.062729][T16103] ? pcpu_alloc_area+0x820/0x820 [ 1189.062746][T16103] ? bpf_map_area_alloc+0x20/0x30 [ 1189.097241][T16103] __alloc_percpu_gfp+0x28/0x30 [ 1189.102112][T16103] htab_map_alloc+0xdb9/0x11c0 [ 1189.106911][T16103] ? htab_map_update_elem+0xca0/0xca0 [ 1189.112308][T16103] __do_sys_bpf+0x478/0x37b0 [ 1189.116929][T16103] ? bpf_prog_load+0x18a0/0x18a0 [ 1189.121879][T16103] ? __kasan_check_write+0x14/0x20 [ 1189.126981][T16103] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1189.132535][T16103] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1189.137820][T16103] ? wait_for_completion+0x440/0x440 [ 1189.143127][T16103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1189.149395][T16103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1189.154875][T16103] ? do_syscall_64+0x26/0x790 [ 1189.159571][T16103] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1189.165645][T16103] ? do_syscall_64+0x26/0x790 [ 1189.170309][T16103] __x64_sys_bpf+0x73/0xb0 [ 1189.174708][T16103] do_syscall_64+0xfa/0x790 [ 1189.179198][T16103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1189.185064][T16103] RIP: 0033:0x45a679 [ 1189.188938][T16103] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1189.208561][T16103] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1189.217014][T16103] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1189.224986][T16103] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1189.232946][T16103] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1189.240897][T16103] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1189.248848][T16103] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 06:30:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage\xaf\xf5_al\xb5s\xd1+H\x9a\xbd2>\x86\x02\x00\x00\x00', 0xf0, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r6, 0x30, 0x1}, 0x10) write$cgroup_int(r3, 0x0, 0x0) 06:30:55 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000340), 0xffffffffffffff82) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a02000000f000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:55 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000280000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:55 executing program 2 (fault-call:8 fault-nth:83): openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:55 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6017, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) 06:30:55 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000280200, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x6000, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000]}, 0x3c) [ 1199.879716][T16137] FAULT_INJECTION: forcing a failure. [ 1199.879716][T16137] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1199.904479][T16137] CPU: 1 PID: 16137 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1199.912852][T16137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.922912][T16137] Call Trace: [ 1199.922933][T16137] dump_stack+0x197/0x210 [ 1199.922955][T16137] should_fail.cold+0xa/0x15 [ 1199.922972][T16137] ? fault_create_debugfs_attr+0x180/0x180 [ 1199.922988][T16137] ? ___might_sleep+0x163/0x2c0 [ 1199.923012][T16137] should_fail_alloc_page+0x50/0x60 [ 1199.923027][T16137] __alloc_pages_nodemask+0x1a1/0x910 [ 1199.923044][T16137] ? find_held_lock+0x35/0x130 [ 1199.923058][T16137] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1199.923077][T16137] ? lock_downgrade+0x920/0x920 [ 1199.941046][T16137] ? rwlock_bug.part.0+0x90/0x90 [ 1199.941064][T16137] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1199.941083][T16137] alloc_pages_current+0x107/0x210 [ 1199.941104][T16137] __get_free_pages+0xc/0x40 [ 1199.941119][T16137] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1199.941137][T16137] apply_to_page_range+0x445/0x700 [ 1199.941153][T16137] ? memset+0x40/0x40 [ 1199.941173][T16137] kasan_populate_vmalloc+0x68/0x90 [ 1200.012531][T16137] pcpu_get_vm_areas+0x3c42/0x3ec0 [ 1200.017659][T16137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1200.023937][T16137] pcpu_create_chunk+0x24e/0x7f0 [ 1200.028892][T16137] pcpu_alloc+0x10f3/0x1380 [ 1200.033411][T16137] ? pcpu_alloc_area+0x820/0x820 [ 1200.038362][T16137] ? bpf_map_area_alloc+0x20/0x30 [ 1200.043401][T16137] __alloc_percpu_gfp+0x28/0x30 [ 1200.048269][T16137] htab_map_alloc+0xdb9/0x11c0 [ 1200.053060][T16137] ? htab_map_update_elem+0xca0/0xca0 [ 1200.058456][T16137] __do_sys_bpf+0x478/0x37b0 [ 1200.063054][T16137] ? bpf_prog_load+0x18a0/0x18a0 [ 1200.068001][T16137] ? __kasan_check_write+0x14/0x20 [ 1200.073131][T16137] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1200.078687][T16137] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1200.083978][T16137] ? wait_for_completion+0x440/0x440 [ 1200.089263][T16137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1200.095519][T16137] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1200.100995][T16137] ? do_syscall_64+0x26/0x790 [ 1200.105685][T16137] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.111770][T16137] ? do_syscall_64+0x26/0x790 [ 1200.116458][T16137] __x64_sys_bpf+0x73/0xb0 [ 1200.120887][T16137] do_syscall_64+0xfa/0x790 [ 1200.125399][T16137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.131291][T16137] RIP: 0033:0x45a679 [ 1200.135195][T16137] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1200.154804][T16137] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1200.163207][T16137] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1200.163215][T16137] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1200.163222][T16137] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1200.163229][T16137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1200.163236][T16137] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 1200.164739][T16137] ================================================================== [ 1200.176797][T16150] BUG: unable to handle page fault for address: fffff91fff960c00 [ 1200.179441][T16137] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 1200.187393][T16150] #PF: supervisor read access in kernel mode [ 1200.195361][T16137] Write of size 24576 at addr ffffe8fffca00000 by task syz-executor.2/16137 [ 1200.203312][T16150] #PF: error_code(0x0000) - not-present page [ 1200.211347][T16137] [ 1200.219053][T16150] PGD 21ffe6067 P4D 21ffe6067 PUD aa56b067 PMD 918cd067 PTE 0 [ 1200.226574][T16137] CPU: 1 PID: 16137 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 1200.232528][T16150] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1200.241168][T16137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.247123][T16150] CPU: 0 PID: 16150 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 1200.249422][T16137] Call Trace: [ 1200.256869][T16150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.265192][T16137] dump_stack+0x197/0x210 [ 1200.270394][T16150] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 1200.280524][T16137] ? pcpu_alloc+0x589/0x1380 [ 1200.288819][T16150] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 1200.292079][T16137] print_address_description.constprop.0.cold+0x5/0x30b [ 1200.302101][T16150] RSP: 0018:ffffc90004777a80 EFLAGS: 00010212 [ 1200.306407][T16137] ? pcpu_alloc+0x589/0x1380 [ 1200.312180][T16150] RAX: fffff91fff960c00 RBX: fffff91fff961803 RCX: ffffffff819dec89 [ 1200.316747][T16137] ? pcpu_alloc+0x589/0x1380 [ 1200.336323][T16150] RDX: 0000000000000001 RSI: 0000000000006018 RDI: ffffe8fffcb06000 [ 1200.343231][T16137] __kasan_report.cold+0x1b/0x41 [ 1200.349272][T16150] RBP: ffffc90004777a98 R08: fffff91fff961800 R09: 0000000000000c03 [ 1200.353838][T16137] ? pcpu_alloc+0x589/0x1380 [ 1200.361780][T16150] R10: fffff91fff961802 R11: ffffe8fffcb0c017 R12: fffff91fff960c00 [ 1200.366346][T16137] kasan_report+0x12/0x20 [ 1200.374291][T16150] R13: 0000000000006018 R14: 0000000000000000 R15: ffff88821fffd108 [ 1200.379209][T16137] check_memory_region+0x134/0x1a0 [ 1200.387175][T16150] FS: 00007ff7cce8f700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1200.391755][T16137] memset+0x24/0x40 [ 1200.399714][T16150] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1200.404030][T16137] pcpu_alloc+0x589/0x1380 [ 1200.411971][T16150] CR2: fffff91fff960c00 CR3: 00000000a215a000 CR4: 00000000001406f0 [ 1200.417057][T16137] ? pcpu_alloc_area+0x820/0x820 [ 1200.425956][T16150] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1200.429750][T16137] ? bpf_map_area_alloc+0x20/0x30 [ 1200.436301][T16150] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1200.440693][T16137] __alloc_percpu_gfp+0x28/0x30 [ 1200.448633][T16150] Call Trace: [ 1200.453549][T16137] htab_map_alloc+0xdb9/0x11c0 [ 1200.461496][T16150] memset+0x24/0x40 [ 1200.466491][T16137] ? htab_map_update_elem+0xca0/0xca0 [ 1200.474439][T16150] pcpu_alloc+0x589/0x1380 [ 1200.479261][T16137] __do_sys_bpf+0x478/0x37b0 [ 1200.482521][T16150] ? pcpu_alloc_area+0x820/0x820 [ 1200.487274][T16137] ? bpf_prog_load+0x18a0/0x18a0 [ 1200.491047][T16150] ? bpf_map_area_alloc+0x20/0x30 [ 1200.496393][T16137] ? __kasan_check_write+0x14/0x20 [ 1200.500784][T16150] ? bpf_map_area_alloc+0x20/0x30 [ 1200.505346][T16137] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1200.510253][T16150] __alloc_percpu_gfp+0x28/0x30 [ 1200.515162][T16137] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1200.520158][T16150] htab_map_alloc+0xdb9/0x11c0 [ 1200.525241][T16137] ? wait_for_completion+0x440/0x440 [ 1200.530240][T16150] ? htab_map_update_elem+0xca0/0xca0 [ 1200.535787][T16137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1200.540618][T16150] __do_sys_bpf+0x478/0x37b0 [ 1200.545879][T16137] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1200.550610][T16150] ? bpf_prog_load+0x18a0/0x18a0 [ 1200.550628][T16150] ? __kasan_check_read+0x11/0x20 [ 1200.555887][T16137] ? do_syscall_64+0x26/0x790 [ 1200.561229][T16150] ? _copy_to_user+0x118/0x160 [ 1200.567445][T16137] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.572003][T16150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1200.577436][T16137] ? do_syscall_64+0x26/0x790 [ 1200.582410][T16150] ? put_timespec64+0xda/0x140 [ 1200.587338][T16137] __x64_sys_bpf+0x73/0xb0 [ 1200.591989][T16150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1200.596726][T16137] do_syscall_64+0xfa/0x790 [ 1200.602769][T16150] ? do_syscall_64+0x26/0x790 [ 1200.608985][T16137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.613631][T16150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.618377][T16137] RIP: 0033:0x45a679 [ 1200.622767][T16150] ? do_syscall_64+0x26/0x790 [ 1200.628199][T16137] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1200.632673][T16150] __x64_sys_bpf+0x73/0xb0 [ 1200.637315][T16137] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1200.643187][T16150] do_syscall_64+0xfa/0x790 [ 1200.649219][T16137] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1200.653100][T16150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.657738][T16137] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1200.677321][T16150] RIP: 0033:0x45a679 [ 1200.681709][T16137] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1200.690099][T16150] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1200.694559][T16137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1200.694571][T16137] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 1200.702519][T16150] RSP: 002b:00007ff7cce8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1200.708404][T16137] [ 1200.716372][T16150] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 1200.720230][T16137] [ 1200.728186][T16150] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1200.747763][T16137] Memory state around the buggy address: [ 1200.755716][T16150] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1200.806151][T16150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff7cce8f6d4 [ 1200.814100][T16150] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 00000000ffffffff [ 1200.822051][T16150] Modules linked in: [ 1200.825965][T16150] CR2: fffff91fff960c00 [ 1200.830112][T16150] ---[ end trace 6406a72ab5d7b183 ]--- [ 1200.830156][T16137] BUG: unable to handle page fault for address: fffff91fff93ffe0 [ 1200.835570][T16150] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 1200.843255][T16137] #PF: supervisor read access in kernel mode [ 1200.849064][T16150] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 1200.855028][T16137] #PF: error_code(0x0000) - not-present page [ 1200.874694][T16150] RSP: 0018:ffffc90004777a80 EFLAGS: 00010212 [ 1200.880644][T16137] PGD 21ffe6067 P4D 21ffe6067 PUD aa56b067 PMD 918cd067 PTE 0 [ 1200.886686][T16150] RAX: fffff91fff960c00 RBX: fffff91fff961803 RCX: ffffffff819dec89 [ 1200.894115][T16137] Oops: 0000 [#2] PREEMPT SMP KASAN [ 1200.902062][T16150] RDX: 0000000000000001 RSI: 0000000000006018 RDI: ffffe8fffcb06000 [ 1200.907238][T16137] CPU: 1 PID: 16137 Comm: syz-executor.2 Tainted: G D 5.4.0-syzkaller #0 [ 1200.915180][T16150] RBP: ffffc90004777a98 R08: fffff91fff961800 R09: 0000000000000c03 [ 1200.924862][T16137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.932809][T16150] R10: fffff91fff961802 R11: ffffe8fffcb0c017 R12: fffff91fff960c00 [ 1200.942851][T16137] RIP: 0010:memcpy_erms+0x6/0x10 [ 1200.950789][T16150] R13: 0000000000006018 R14: 0000000000000000 R15: ffff88821fffd108 [ 1200.955702][T16137] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 1200.963645][T16150] FS: 00007ff7cce8f700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1200.983225][T16137] RSP: 0018:ffffc900047a7990 EFLAGS: 00010082 [ 1200.992128][T16150] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1200.998164][T16137] RAX: ffffc900047a799c RBX: fffff91fff93ffe0 RCX: 0000000000000010 [ 1201.004741][T16150] CR2: fffff91fff960c00 CR3: 00000000a215a000 CR4: 00000000001406f0 [ 1201.012689][T16137] RDX: 0000000000000010 RSI: fffff91fff93ffe0 RDI: ffffc900047a799c [ 1201.020634][T16150] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1201.028583][T16137] RBP: ffffc900047a79f0 R08: ffff88809e514400 R09: fffff520008f4f38 [ 1201.036532][T16150] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1201.044479][T16137] R10: fffff520008f4f37 R11: ffffc900047a79be R12: fffff91fff940000 [ 1201.052424][T16150] Kernel panic - not syncing: Fatal exception [ 1201.060374][T16137] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 1201.074358][T16137] FS: 00007f250db22700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1201.083265][T16137] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1201.089831][T16137] CR2: fffff91fff93ffe0 CR3: 000000009eb2b000 CR4: 00000000001406e0 [ 1201.097784][T16137] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1201.105738][T16137] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1201.113691][T16137] Call Trace: [ 1201.116967][T16137] ? print_shadow_for_address+0x91/0x117 [ 1201.122581][T16137] ? pcpu_alloc+0x589/0x1380 [ 1201.127168][T16137] ? pcpu_alloc+0x589/0x1380 [ 1201.131745][T16137] ? pcpu_alloc+0x589/0x1380 [ 1201.136316][T16137] ? pcpu_alloc+0x589/0x1380 [ 1201.140887][T16137] __kasan_report.cold+0x30/0x41 [ 1201.145805][T16137] ? pcpu_alloc+0x589/0x1380 [ 1201.150497][T16137] kasan_report+0x12/0x20 [ 1201.154822][T16137] check_memory_region+0x134/0x1a0 [ 1201.159915][T16137] memset+0x24/0x40 [ 1201.163730][T16137] pcpu_alloc+0x589/0x1380 [ 1201.168165][T16137] ? pcpu_alloc_area+0x820/0x820 [ 1201.173095][T16137] ? bpf_map_area_alloc+0x20/0x30 [ 1201.178105][T16137] __alloc_percpu_gfp+0x28/0x30 [ 1201.182937][T16137] htab_map_alloc+0xdb9/0x11c0 [ 1201.187690][T16137] ? htab_map_update_elem+0xca0/0xca0 [ 1201.193048][T16137] __do_sys_bpf+0x478/0x37b0 [ 1201.197626][T16137] ? bpf_prog_load+0x18a0/0x18a0 [ 1201.202547][T16137] ? __kasan_check_write+0x14/0x20 [ 1201.207641][T16137] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1201.213169][T16137] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1201.218436][T16137] ? wait_for_completion+0x440/0x440 [ 1201.223706][T16137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1201.229935][T16137] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1201.235385][T16137] ? do_syscall_64+0x26/0x790 [ 1201.240047][T16137] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1201.246098][T16137] ? do_syscall_64+0x26/0x790 [ 1201.250761][T16137] __x64_sys_bpf+0x73/0xb0 [ 1201.255161][T16137] do_syscall_64+0xfa/0x790 [ 1201.259652][T16137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1201.265539][T16137] RIP: 0033:0x45a679 [ 1201.269420][T16137] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1201.289006][T16137] RSP: 002b:00007f250db21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1201.297398][T16137] RAX: ffffffffffffffda RBX: 00007f250db21c90 RCX: 000000000045a679 [ 1201.305352][T16137] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1201.313306][T16137] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1201.321259][T16137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f250db226d4 [ 1201.329229][T16137] R13: 00000000004c0c65 R14: 00000000004d4750 R15: 0000000000000004 [ 1201.337188][T16137] Modules linked in: [ 1201.341081][T16137] CR2: fffff91fff93ffe0 [ 1201.345218][T16137] ---[ end trace 6406a72ab5d7b184 ]--- [ 1201.350668][T16137] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 1201.356456][T16137] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 1201.376040][T16137] RSP: 0018:ffffc90004777a80 EFLAGS: 00010212 [ 1201.382095][T16137] RAX: fffff91fff960c00 RBX: fffff91fff961803 RCX: ffffffff819dec89 [ 1201.390053][T16137] RDX: 0000000000000001 RSI: 0000000000006018 RDI: ffffe8fffcb06000 [ 1201.398008][T16137] RBP: ffffc90004777a98 R08: fffff91fff961800 R09: 0000000000000c03 [ 1201.405978][T16137] R10: fffff91fff961802 R11: ffffe8fffcb0c017 R12: fffff91fff960c00 [ 1201.413930][T16137] R13: 0000000000006018 R14: 0000000000000000 R15: ffff88821fffd108 [ 1201.421888][T16137] FS: 00007f250db22700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1201.430812][T16137] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1201.437377][T16137] CR2: fffff91fff93ffe0 CR3: 000000009eb2b000 CR4: 00000000001406e0 [ 1201.445333][T16137] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1201.453299][T16137] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1202.189659][T16150] Shutting down cpus with NMI [ 1202.195757][T16150] Kernel Offset: disabled [ 1202.200088][T16150] Rebooting in 86400 seconds..