0008000100", @ANYRES32=r3, @ANYBLOB="1c000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300000000006c00018008000300030000001400020062617461647630000000000000000000140002006272696467655f736c6176655f3000000800030002000000140002006d6163766c616e31000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006d6163766c616e300000063d00000000"], 0x160}}, 0x0) [ 979.531200][ T6601] RBP: 00007f3e386ae1d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.539158][ T6601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.547115][ T6601] R13: 00007ffd3f4b4dbf R14: 00007f3e386ae300 R15: 0000000000022000 17:30:46 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:46 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000005480)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{&(0x7f00000000c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000000300)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/197, 0xc5}, {&(0x7f0000000240)=""/103, 0x67}, {&(0x7f00000002c0)}], 0x4, &(0x7f0000000340)=""/168, 0xa8}, 0x1000}, {{&(0x7f0000000440)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000001740)=[{&(0x7f00000015c0)=""/16, 0x10}, {&(0x7f0000001600)=""/127, 0x7f}, {&(0x7f0000001680)=""/177, 0xb1}], 0x3, &(0x7f0000001780)=""/191, 0xbf}, 0x2e}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000001840)=""/44, 0x2c}, {&(0x7f0000001880)=""/77, 0x4d}, {&(0x7f0000001900)=""/198, 0xc6}, {&(0x7f0000001a00)=""/226, 0xe2}, {&(0x7f0000001b00)=""/4096, 0x1000}], 0x5, &(0x7f0000002b80)=""/3, 0x3}, 0x7}, {{&(0x7f0000002bc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/143, 0x8f}, {&(0x7f0000003d00)=""/226, 0xe2}, {&(0x7f0000003e00)=""/163, 0xa3}, {&(0x7f0000003ec0)=""/1, 0x1}], 0x5, &(0x7f0000003f80)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000004f80)=@ax25={{0x3, @null}, [@default, @null, @bcast, @remote, @remote, @null, @rose]}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005000)=""/139, 0x8b}, {&(0x7f00000050c0)=""/125, 0x7d}, {&(0x7f0000005140)=""/242, 0xf2}], 0x3, &(0x7f0000005280)=""/133, 0x85}, 0x100}], 0x5, 0x40010000, &(0x7f00000054c0)={r2, r3+10000000}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000005700), 0x612200, 0x0) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000005cc0)="888b15080ae368f6ae60668b4d485475b7b6fd20631ca5e01bf61c565a86fcc82aa10141c9f58c515abc689b134736c4490c067b33f49daf06e99d50903aae7f1eff064d9a27c4cb8a28ef17160c04e8145de66dd1beceec6a6b2d455329fb7c8dcbb066bb7b0482cad71a9ea383024dace6074a7b9dc4ee12afbec288279cb60191371ef1f92cac87895811ab84e025f204c8cffb3df71f54cb610ec01e6327e9a8993e8a5db181ddd411922b772b16bec37309b40bd4fc62cea6587d650dcd44b3b91436fc27b0b5d809fb467e0db2158c852f45ca3104dbe30ecf0eba3ca7c3bbd5ff92df0ab1cfd4ac334ca37ff504e5b4bfcdad20339884cd4a07a882d9de997dc5a87b0501eca60e8648b72db271a26b2b6aee65547adb8c0a771e12690abb29ae2cfeb5172bb10c4b2f9d1cc200a52d59278b31861b0a754b84d897281a6b030093de6592d9c07f76bdd768f23f8416f2320423a6fd26d564f6f2c7a4d6fd4f9d70f0d80d214d024eff0da44ff403456c6d6c8502166aecac9de335758fbaaa455d799c9e8659f799573504f20b88e5926a57faf3ae072e844510816d1610cd88d6732a006d27bbddb703676e0106dbc8cf60b549925d19bb86aaf29cc89b3906a76bf15e2bdc80813dbd97d2d17487016b1138b955cc150438d56ed1735a9a4d8ec10d335600d5c74e7e1e30c113a52ce4334f1759363dc0d49d4f2653fcfdaa72b468a1d24d45880903b8a2451672675fe71cec2f3804675169d6c9020753ec58576b08cf9547b2d34dcdf5e87ef9be8a7698643b88d250b10901c2486887dab2078ffd6647ec87f392cd9ec72be8b2f5cd4a7b7f759a200a1c4df07d558c20d59afbd10663b123ad4a687f5bd41db3ba16d0f3033ea35cd5fcd5cff0f6450e61f9bddfbe7e0600f3d3a77f819635dd39fb28a28823a987d305b422f211d57fba2f22841c9d1e45914af896cafc7e9f47a460956c9b6c0f07b37ff43ab26d9643d3e28021acfcbd3e89f79e83cfe5b4a46c59030eea9f09a9da749963099378fb97bec043aedec08918fa60d53b2a958a86e062ffb80e95e5b2a607d85a512f8996b52ceb6bc96937ffb40deac605b1b546b1cb6f78a5c3ed16d0fc56fe2ba9648698d2c439344ae55e1beb56883698b68a5b46ecdd65556d10f591b0bd7e8c9d95276738e7bb1ff431ff06a7fd285588d23b27813392f330756cac3744f1912efbcf36218efbe2d837cebf93e981f70f3bee75ac926d2941c0b4723a85824ab16f2efca51089d3faf1bed6751d4f6c99937fd9ea33ca8ad98afbc2ea8496c8bc9f8e0262089a675e3cf7f4a608030883ddd520aaf202153759eecf931a9aef8f1fb181e26ee96c1dab0374f77f1edb03c8d5f8ea0d5899a074fe87592e15432d400ae05c0583f63eadcc7f21489cfdcff58b6dc7723223d10a861071a3c40009b4864e89bb95c6984c21a70eb422218f3fdf478905264f13299c7da823cdad1ca6a5dda7eff9e38185e8a270dd0096bb9d40ed9eda3e6c1f54308f46f0d5c45ac4bdb246c1a4b4d48b41b6a555ea62c0edac819e76a790bd43585202a4a89b09f0730d74c6bc9cf7e818b2c2aaac50794ae7ff6f25f54c4cae01d1c6e6d5d94e7a43be0bf34541770fb59df034430dc04ad3698478603bdcfbb3073ffcf802742890e621d6bbbd1da729c3eed3378c96061a0e77fd28a484ac2c754a3229d9a37faedb835c15af609fd84aa3b1ce54055f13b5bf86cbbe68f37bf36b3c8d7fd5c0a89477f10e4c6d47f3801d8e0c4f3e56e29204068d57fbf3cfbe91f7c8562cf27aa70be6b8c36dc9a0500df0430ba56949f2e9f6ca9d7918405b597c4b66f571bf00f386c265d80bc81f4d8ed8721976aab3c846f9a2bdf51e4cac0456fc2e7a5d839b7c9bc7851ab406cb7185604a3b27bd6b555789667a931910f78474f9751998ec67e0de907151421908555de2bbbbe3851a8aa9b2c8e46eb1ed5311d7111cab38a370dbab689a575afc7f8c63aac1309b7049b3526ca1655b6ec1e1a2e8b20b514097556cdc015a05675280d5af501119b4caeb338a536108df646587653d3b9c72df01dc536bc05ecb2a381592f55a6df185576f151213cf26fb7fc3335bb9c54859c5b027c9f111bba92712559a92c8417ce7d7690add05b357c8eecc59459b9e6eec93f3e776c795004c330112259a0efcf01d5c98346ba8e0d22b57eb2c61d262e7487d8c37da77574e2eca6aaa0e4c1f63d9d792214e62d106b2245606b94b3d37508a754094490126f2b9e825f6ce9f6cd20b2b26aa8f728f14d189b178011cf0d68722a2cd331814b3d8bda39e12b7f3082ceffa66e6b57204879862d37ffd0b2e9b6b554cb1840fae17ffbb85770f902fdcf7e1482fc1da51215d08f140241d3f932246bb45d181ce4f695082f8d05598c52f04fead035c7149bcc5d8d550c1d34c3c160bb52fddb06e65ac6192bf2bafdd2432a633a578b35950004eb332fd6725b202471234bcca969de031268436c1632f08ee0abd1d50a33bbb6883ff998f002cf8b13c40edcf09dbd043c343f299c06931a8f06fa3cbe1dc9682afbe5c8ff5a73ce639fce5323e0cabb22c91cbdac470f77468f72d0fd65fe19c1d988dabcc57afb05ab1105d95b65a0c47a3392a1f4806385da02e196c61f40bae920d35725b3917ed9b17f85ec472a7429e960816e27b1e189a0d8573d9b029617890fed14c3c883e58cfe8ae3b60a9cc22bb014de71859a3adb2890c9b9b37213e95aae4e3c352ce8f0c1578dec85d49ca8a97d2ad333d40b9caf7e7e856b862d760c7ea07480d540be5172c2c42df627f028ab8bbed045fc606efcd1a9e50d16d6b9449357f2f26c008237489eb7098678569088b0d7108f4d7a57ca2ee20c97bf012c3be3470408b92cda1b4556f326f3223e26134d715a2c7530d45774322c51f450580c7fdd2298435c03c4a8708062e71a1087663e2b9c0198ef7d1f40bf241f3a3b582b21e8f0a82a969272218056ff6b5aa5c630723a0ddb6db51f97a33372c1295109c38a9d3302c92fb02079eaf6acea7c6e1f7c0c66ee48a2545092ae713944ebdf37667c8d8ef1ee8fd49c4516791f29a9e5a450bf33fb5f4ace6037245768d7c615bca9f6c72319169d78d10a0d50b8d52c45da4de9f2957c97939a012b9757b6755546da3b48b86697055df8db6e46e2ec3c60f6cb08fffc2dd6eae9ef50e079f886e751eef88a01560619d488b2a7daef000112a807c7a2c94b5a6188c4e4653438ac2260ecd24e7f11e14b541c8bde1739cfcdb8a668c2ac0f4437f60f86de907f35236b8baa60a034e74fc6a3727fba24bdcdd85c18bfeba056d5324a45088979f8357b76e29f87842b3a522aca38d6f3be0adbd65d1aa21b1947023ae5b99a4f4f2a9b8861e153c6dccf796443e010bdb74b50dc214aac0642ea5110b8d00deddf2047a8f3c52d6d504ab838cc325eba3769f37d0ba0595d66f1ebf41a3f5506ba2a1aa9ac13c50202e928e7dc6d90189e30ccd663d40fce4c283fc0f227beedb5602a212d099671041b7f53594940163dae07d65b4e8e10054b0d9f26dad8792aebea81139cce4996ffb850d67ab4d3bf882b98ac0c153f50c812b4e7d4b3efd16890948dac4f61f4d79c6c08c860c0e82aa0f648686be51e6febd8ad511ec58b42907cc45efaac37efb3a4dfdccb00ee32051560a78776ee2be32e9664dbbab6e516671312365406e76de3216597c6f4400f9a58ff27369547763571ce3180209816212d5041a54d576d25886713b6c47ffee30ca41da5bb3d1785e41112a901135f2574a1cb1efd6d0ae876f70b99ef780fc4c84484518c8a861063fe1b5f6261f095ef3d20a05cd25c81ca5aa18f149587dfc933c6f874d40289e1afe82d5ba0f9fc86844dfab4f912ac3f01a3bb44a3a8cc858dac44e23d605b2290afbca3bc9ff6562feac3268e6a37491c8f29386ee749dbd1fcf57dee689016fc375eca76ab34bf4974e6495e28db8a141a8e3dbb5b3601154fd973207ee4127e2db79b2363596cdf6dc9edf9ce22cb999d8fcc564b8078f235d5861740942ed863b262cd3a9f16b6bda15b66ee9af98574ecdd5eecde19dc6d80b59fbc424855ae43f9552ce1e8d8011871e963f21398f8015dd93e7ee3d95f85dd3356f40428d658ea200b9953acd904f581d09a059e35d066d97f67d5605211f42fa75fe10070f3cf5aeef2544fc8af9bdeb550493af1d95a3e485db0914849f76f0d324b5499f0b9b01df9c12d0a93c7ee385669f25daf78bc7d2b37229a80e51619db8c3cff72eb9c5cac91b2eb0c8faa763c9d814ae716a739ab96bf8d41c512827476ae2339534308835d90d3ffeea6d634fdb714d59f974d0f08bf07c11e792f1af34901dfee57ec884fa79643f4e273c82d52845b55a2f9cea7eaff6314fb98f4fd9402c87bb6e75f1d374bccc54e68171ed3ac133a8e65d69b3bf60e697e2bd66fbd7546457de37a8a594e626851fbb51ab916966eaa5b754a54bd2f785dc20153325e8343ee5602ddee75877590d836d0cf39c49aef456c40db23c730d8a076fed158ecb58d40828a0bb459095202c8c588d76533def547e18b865df70214271e8acb1261705f65adf2469591648485996f1b5e70a8932a9ddec2c5d0df741c678cab6eb2d7d1e1dd024187edeffe90c287c6eeeaeb6124e11604678715bada2aa8e0ad59173d28e8c75fea2411944ccf182d47cedb22c1c7248948d3f120c7d4e5d460768983d39356a9ccba31255e2c96f4567397247205fbec7871654da668dd0f3817f5995ffe82be15f17f32e2118ccd3b2752f0b3311a3cb9bb2dde8f0356327699e5c3151000223f6c8249a5ea8a4ba30190a3f48fca32b182d7360e233870b1b9d1f3b854a82eab1946808d9ae0b22ae98f7ecef503b40b9eb634f70f34819c91c58e6c22fe7c7f3e2f73aa0c73be364ba25b5a6ef79c79f8c5a45b1e63ccd0ca60b0ee1ff2a3f8476af427b0168c18fb9fef434efd8813c8f85898be7fc7f58e7c41f6d776e3c847b17979baad5d1238324fb7523f1445a7954fef91338b9639c9edc574b9c5a0463c65f4151c823aeb9174edca311147492153efa15918d6f7ecd4e3eec1c851370c479aca32855d2ce3b4cb063de79ed2d40ca18b1c19dfe2d033b624f0f87c12e791db37a3c425df41a1300f7bd4833873f3a98034b6108e2fd65e44151a1b509162dc36282bc20de6f4cbc427c140a88b9d4ceefc5a3a0afe28f39c161e2794069f6360b783d664b390ab93441b3396a23b7e21adb92dd1c0ee9c0630d08949f6dd43daab47cc2b07ac199818fce5ed59f5e36781b9f3a43f1ce5b3bd59f4cbe47abf14350a3b7b15e5fb32cd122c46197c576a1ea9d0074192cd21c4850da4a13f2957e84452e4c3e882d1fb3e14a0f828684b138a129f88b4c9c306982da7ba5e15687898bf653f01df40fb07bca25a63848ed02ee3bb4b0712d000c6b2bbddb6ed5ebcb7898f8b1762b2b1879930ab18af1765914824fed591cd47b5d57ed164df3941faf4cb53f524dc39688f91cdc1bc8418511d4d0c7a8a076f55f8a4dcc0c2c1bd8c84fba0f19d72dd6dee1c815947b20a88925b91ba98227de48b71ddd9c9e3e342ddc13f602eef889e9f8cd1acf8407fffabcc0e139f3e516a0cb2d9844d0aeee8d070d2841fb632fa9bb72885e09a0d11e1a1ee1cbc19ba486968370fe06da334cb944823acbfe66eeccc01f2adf794f6c40d7ece4aa361782b62c6a717381", 0x1000) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005500)={0x0, @private, @remote}, &(0x7f0000005540)=0xc) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000006cc0)={0x1, 'bridge_slave_1\x00', 0x2}, 0x18) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000005740)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@private1}}, &(0x7f0000005840)=0xe8) (async) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008900)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@private}}, &(0x7f0000008a00)=0xe8) (async, rerun: 64) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)=0x1, 0x4) (async, rerun: 64) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r9, 0x0, 0x0) (async, rerun: 32) syz_genetlink_get_family_id$ethtool(&(0x7f0000006d00), r9) (async, rerun: 32) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008b40)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000008c40)=0xe8) (async, rerun: 64) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008c80)={0x0, @remote, @broadcast}, &(0x7f0000008cc0)=0xc) (rerun: 64) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000008e00)={0x0, @l2={0x1f, 0x4, @any, 0x7, 0x1}, @xdp={0x2c, 0xd, 0x0, 0x3c}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x9, 0x0, 0x0, 0x0, 0x1, &(0x7f0000008dc0)='macvlan0\x00', 0x25, 0x9, 0x9}) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000005c40)={0xf, 0x11, &(0x7f0000005580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x101}, [@call={0x85, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map={0x18, 0x3, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x2, 0x1, 0x0, 0x1}, @exit, @func, @ldst={0x2, 0x3, 0x6, 0x5, 0x0, 0x50, 0xfffffffffffffff0}, @alu={0x4, 0x0, 0x3, 0xb, 0x2, 0xfffffffffffffff4, 0x10}]}, &(0x7f0000005640)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, r0, 0x8, &(0x7f0000005680)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000056c0)={0x5, 0x0, 0x4, 0x7ff}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r13) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000009140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000009100)={&(0x7f0000006d40)=ANY=[@ANYBLOB="7c020000", @ANYRES16=r1, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="1400020076657468305f766972745f776966690008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006272696467655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="28000180140002006261746164765f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="2c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000300033d2380080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="58000180080003000200000014000200766c616e300000000000000000000000140002006d6163736563300000000000000000000800030001000000140002006261746164765f736c6176655f30000008000100", @ANYRES32=r8, @ANYBLOB="3400018008000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="0800010084dafbefb59b2581dd471cd85666fe154a0f6fb42496bd133b1d64b695049866c1d926d421f9786a8a885e759ea5dedc29b1a9cac2fbc70d60d3c6e388bd1f10aa6401a83fa5cca341876bb86621d66ae9ed7e7826eb24c558012506", @ANYRES32=0x0, @ANYBLOB="0c00018008000100", @ANYRES32=r11, @ANYBLOB="40000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="140002000000000000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="a000018014000200726f736530000000000000000000000014000200776731000000000000000000000000001400020067726574617030000000000000000000140002006272696467655f736c6176655f3000001400020076657468305f766c616e000000000000140002006d6163766c616e30000000000000000014000200697036746e6c30000000000000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="340001801400020076657468305f746f5f687372000000000800030001000000140002007465616d5f736c6176655f3100000000"], 0x27c}, 0x1, 0x0, 0x0, 0x4045800}, 0x2004004) 17:30:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:46 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.599177][ T6680] FAULT_INJECTION: forcing a failure. [ 979.599177][ T6680] name failslab, interval 1, probability 0, space 0, times 0 [ 979.614653][ T6680] CPU: 0 PID: 6680 Comm: syz-executor.5 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 979.624843][ T6680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.634888][ T6680] Call Trace: [ 979.638169][ T6680] dump_stack+0x18e/0x1de [ 979.642495][ T6680] should_fail+0x5d8/0x740 17:30:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:46 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.646904][ T6680] ? btf_new_fd+0x272/0x36a0 [ 979.651488][ T6680] should_failslab+0x5/0x20 [ 979.655985][ T6680] kmem_cache_alloc_trace+0x39/0x2b0 [ 979.661259][ T6680] ? btf_new_fd+0x128/0x36a0 [ 979.665841][ T6680] btf_new_fd+0x272/0x36a0 [ 979.670260][ T6680] ? cred_has_capability+0x14f/0x340 [ 979.675534][ T6680] ? cred_has_capability+0x250/0x340 [ 979.680802][ T6680] ? security_capable+0xb1/0xd0 [ 979.685632][ T6680] __do_sys_bpf+0x12ab/0xbd30 [ 979.690297][ T6680] ? refcount_sub_and_test_checked+0x151/0x210 [ 979.696448][ T6680] ? proc_fail_nth_read+0x150/0x150 [ 979.701627][ T6680] ? proc_fail_nth_write+0x157/0x1c0 [ 979.706881][ T6680] ? memset+0x1f/0x40 [ 979.710837][ T6680] ? __sb_end_write+0xb5/0x100 [ 979.715571][ T6680] ? vfs_write+0x422/0x4e0 [ 979.719987][ T6680] ? fput_many+0x42/0x1a0 [ 979.724292][ T6680] ? check_preemption_disabled+0xde/0x2c0 [ 979.730067][ T6680] do_syscall_64+0xcb/0x1e0 [ 979.734550][ T6680] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 979.740417][ T6680] RIP: 0033:0x7f3e39537e99 [ 979.744805][ T6680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 979.764386][ T6680] RSP: 002b:00007f3e386ae168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 979.772800][ T6680] RAX: ffffffffffffffda RBX: 00007f3e3964af60 RCX: 00007f3e39537e99 [ 979.780740][ T6680] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 979.788683][ T6680] RBP: 00007f3e386ae1d0 R08: 0000000000000000 R09: 0000000000000000 17:30:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) (fail_nth: 3) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa001000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000005480)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{&(0x7f00000000c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000000300)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/197, 0xc5}, {&(0x7f0000000240)=""/103, 0x67}, {&(0x7f00000002c0)}], 0x4, &(0x7f0000000340)=""/168, 0xa8}, 0x1000}, {{&(0x7f0000000440)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000001740)=[{&(0x7f00000015c0)=""/16, 0x10}, {&(0x7f0000001600)=""/127, 0x7f}, {&(0x7f0000001680)=""/177, 0xb1}], 0x3, &(0x7f0000001780)=""/191, 0xbf}, 0x2e}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000001840)=""/44, 0x2c}, {&(0x7f0000001880)=""/77, 0x4d}, {&(0x7f0000001900)=""/198, 0xc6}, {&(0x7f0000001a00)=""/226, 0xe2}, {&(0x7f0000001b00)=""/4096, 0x1000}], 0x5, &(0x7f0000002b80)=""/3, 0x3}, 0x7}, {{&(0x7f0000002bc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/143, 0x8f}, {&(0x7f0000003d00)=""/226, 0xe2}, {&(0x7f0000003e00)=""/163, 0xa3}, {&(0x7f0000003ec0)=""/1, 0x1}], 0x5, &(0x7f0000003f80)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000004f80)=@ax25={{0x3, @null}, [@default, @null, @bcast, @remote, @remote, @null, @rose]}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005000)=""/139, 0x8b}, {&(0x7f00000050c0)=""/125, 0x7d}, {&(0x7f0000005140)=""/242, 0xf2}], 0x3, &(0x7f0000005280)=""/133, 0x85}, 0x100}], 0x5, 0x40010000, &(0x7f00000054c0)={r2, r3+10000000}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000005700), 0x612200, 0x0) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000005cc0)="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", 0x1000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005500)={0x0, @private, @remote}, &(0x7f0000005540)=0xc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000006cc0)={0x1, 'bridge_slave_1\x00', 0x2}, 0x18) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000005740)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@private1}}, &(0x7f0000005840)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008900)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@private}}, &(0x7f0000008a00)=0xe8) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)=0x1, 0x4) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r9, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000006d00), r9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008b40)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000008c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008c80)={0x0, @remote, @broadcast}, &(0x7f0000008cc0)=0xc) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000008e00)={0x0, @l2={0x1f, 0x4, @any, 0x7, 0x1}, @xdp={0x2c, 0xd, 0x0, 0x3c}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x9, 0x0, 0x0, 0x0, 0x1, &(0x7f0000008dc0)='macvlan0\x00', 0x25, 0x9, 0x9}) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000005c40)={0xf, 0x11, &(0x7f0000005580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x101}, [@call={0x85, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map={0x18, 0x3, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x2, 0x1, 0x0, 0x1}, @exit, @func, @ldst={0x2, 0x3, 0x6, 0x5, 0x0, 0x50, 0xfffffffffffffff0}, @alu={0x4, 0x0, 0x3, 0xb, 0x2, 0xfffffffffffffff4, 0x10}]}, &(0x7f0000005640)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, r0, 0x8, &(0x7f0000005680)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000056c0)={0x5, 0x0, 0x4, 0x7ff}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r13) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000009140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000009100)={&(0x7f0000006d40)=ANY=[@ANYBLOB="7c020000", @ANYRES16=r1, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="1400020076657468305f766972745f776966690008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006272696467655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="28000180140002006261746164765f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="2c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000300033d2380080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="58000180080003000200000014000200766c616e300000000000000000000000140002006d6163736563300000000000000000000800030001000000140002006261746164765f736c6176655f30000008000100", @ANYRES32=r8, @ANYBLOB="3400018008000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="0800010084dafbefb59b2581dd471cd85666fe154a0f6fb42496bd133b1d64b695049866c1d926d421f9786a8a885e759ea5dedc29b1a9cac2fbc70d60d3c6e388bd1f10aa6401a83fa5cca341876bb86621d66ae9ed7e7826eb24c558012506", @ANYRES32=0x0, @ANYBLOB="0c00018008000100", @ANYRES32=r11, @ANYBLOB="40000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="140002000000000000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="a000018014000200726f736530000000000000000000000014000200776731000000000000000000000000001400020067726574617030000000000000000000140002006272696467655f736c6176655f3000001400020076657468305f766c616e000000000000140002006d6163766c616e30000000000000000014000200697036746e6c30000000000000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="340001801400020076657468305f746f5f687372000000000800030001000000140002007465616d5f736c6176655f3100000000"], 0x27c}, 0x1, 0x0, 0x0, 0x4045800}, 0x2004004) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) clock_gettime(0x0, &(0x7f0000005480)) (async) recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{&(0x7f00000000c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000000300)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/197, 0xc5}, {&(0x7f0000000240)=""/103, 0x67}, {&(0x7f00000002c0)}], 0x4, &(0x7f0000000340)=""/168, 0xa8}, 0x1000}, {{&(0x7f0000000440)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000001740)=[{&(0x7f00000015c0)=""/16, 0x10}, {&(0x7f0000001600)=""/127, 0x7f}, {&(0x7f0000001680)=""/177, 0xb1}], 0x3, &(0x7f0000001780)=""/191, 0xbf}, 0x2e}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000001840)=""/44, 0x2c}, {&(0x7f0000001880)=""/77, 0x4d}, {&(0x7f0000001900)=""/198, 0xc6}, {&(0x7f0000001a00)=""/226, 0xe2}, {&(0x7f0000001b00)=""/4096, 0x1000}], 0x5, &(0x7f0000002b80)=""/3, 0x3}, 0x7}, {{&(0x7f0000002bc0)=@can, 0x80, &(0x7f0000003f00)=[{&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/143, 0x8f}, {&(0x7f0000003d00)=""/226, 0xe2}, {&(0x7f0000003e00)=""/163, 0xa3}, {&(0x7f0000003ec0)=""/1, 0x1}], 0x5, &(0x7f0000003f80)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000004f80)=@ax25={{0x3, @null}, [@default, @null, @bcast, @remote, @remote, @null, @rose]}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005000)=""/139, 0x8b}, {&(0x7f00000050c0)=""/125, 0x7d}, {&(0x7f0000005140)=""/242, 0xf2}], 0x3, &(0x7f0000005280)=""/133, 0x85}, 0x100}], 0x5, 0x40010000, &(0x7f00000054c0)={r2, r3+10000000}) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000005700), 0x612200, 0x0) (async) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000005cc0)="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", 0x1000) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005500)={0x0, @private, @remote}, &(0x7f0000005540)=0xc) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000006cc0)={0x1, 'bridge_slave_1\x00', 0x2}, 0x18) (async) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000005740)={{{@in6=@loopback, @in=@remote}}, {{@in=@initdev}, 0x0, @in6=@private1}}, &(0x7f0000005840)=0xe8) (async) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008900)={{{@in=@dev, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@private}}, &(0x7f0000008a00)=0xe8) (async) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)=0x1, 0x4) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r9, 0x0, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000006d00), r9) (async) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008b40)={{{@in6=@empty, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000008c40)=0xe8) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008c80)={0x0, @remote, @broadcast}, &(0x7f0000008cc0)=0xc) (async) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000008e00)={0x0, @l2={0x1f, 0x4, @any, 0x7, 0x1}, @xdp={0x2c, 0xd, 0x0, 0x3c}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x9, 0x0, 0x0, 0x0, 0x1, &(0x7f0000008dc0)='macvlan0\x00', 0x25, 0x9, 0x9}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000005c40)={0xf, 0x11, &(0x7f0000005580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x101}, [@call={0x85, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map={0x18, 0x3, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x2, 0x1, 0x0, 0x1}, @exit, @func, @ldst={0x2, 0x3, 0x6, 0x5, 0x0, 0x50, 0xfffffffffffffff0}, @alu={0x4, 0x0, 0x3, 0xb, 0x2, 0xfffffffffffffff4, 0x10}]}, &(0x7f0000005640)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, r0, 0x8, &(0x7f0000005680)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000056c0)={0x5, 0x0, 0x4, 0x7ff}, 0x10, 0xffffffffffffffff}, 0x78) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r13) (async) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000009140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000009100)={&(0x7f0000006d40)=ANY=[@ANYBLOB="7c020000", @ANYRES16=r1, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="1400020076657468305f766972745f776966690008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006272696467655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="28000180140002006261746164765f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="2c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000300033d2380080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="58000180080003000200000014000200766c616e300000000000000000000000140002006d6163736563300000000000000000000800030001000000140002006261746164765f736c6176655f30000008000100", @ANYRES32=r8, @ANYBLOB="3400018008000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="0800010084dafbefb59b2581dd471cd85666fe154a0f6fb42496bd133b1d64b695049866c1d926d421f9786a8a885e759ea5dedc29b1a9cac2fbc70d60d3c6e388bd1f10aa6401a83fa5cca341876bb86621d66ae9ed7e7826eb24c558012506", @ANYRES32=0x0, @ANYBLOB="0c00018008000100", @ANYRES32=r11, @ANYBLOB="40000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="140002000000000000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="a000018014000200726f736530000000000000000000000014000200776731000000000000000000000000001400020067726574617030000000000000000000140002006272696467655f736c6176655f3000001400020076657468305f766c616e000000000000140002006d6163766c616e30000000000000000014000200697036746e6c30000000000000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="340001801400020076657468305f746f5f687372000000000800030001000000140002007465616d5f736c6176655f3100000000"], 0x27c}, 0x1, 0x0, 0x0, 0x4045800}, 0x2004004) (async) 17:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000047a60000000c0000000000050074a8bf6c00612e00"], &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1}, 0x20) 17:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000000000030c0000000900000006000000000000050c000000000000000030613000e7e8ae6aad74aac96c57b7404c6424b64b086ace10563b786a7a67ebbe71b58914d4e7894c7194981c0d1eaf00007c859d454465"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = socket$inet(0x2, 0x800, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @loopback, 0x4e22, 0x4, 'rr\x00', 0x70, 0x9, 0x13}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x10000, 0x6, 0xb74, 0x7ae61c62}}, 0x44) 17:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000000000030c0000000900000006000000000000050c000000000000000030613000e7e8ae6aad74aac96c57b7404c6424b64b086ace10563b786a7a67ebbe71b58914d4e7894c7194981c0d1eaf00007c859d454465"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = socket$inet(0x2, 0x800, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @loopback, 0x4e22, 0x4, 'rr\x00', 0x70, 0x9, 0x13}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x10000, 0x6, 0xb74, 0x7ae61c62}}, 0x44) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000000000030c0000000900000006000000000000050c000000000000000030613000e7e8ae6aad74aac96c57b7404c6424b64b086ace10563b786a7a67ebbe71b58914d4e7894c7194981c0d1eaf00007c859d454465"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) socket$inet(0x2, 0x800, 0x0) (async) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @loopback, 0x4e22, 0x4, 'rr\x00', 0x70, 0x9, 0x13}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x10000, 0x6, 0xb74, 0x7ae61c62}}, 0x44) (async) [ 979.796627][ T6680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.804567][ T6680] R13: 00007ffd3f4b4dbf R14: 00007f3e386ae300 R15: 0000000000022000 [ 979.839051][ T6870] FAULT_INJECTION: forcing a failure. 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa002000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000047a60000000c0000000000050074a8bf6c00612e00"], &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000047a60000000c0000000000050074a8bf6c00612e00"], &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1}, 0x20) (async) 17:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000000000030c0000000900000006000000000000050c000000000000000030613000e7e8ae6aad74aac96c57b7404c6424b64b086ace10563b786a7a67ebbe71b58914d4e7894c7194981c0d1eaf00007c859d454465"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = socket$inet(0x2, 0x800, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @loopback, 0x4e22, 0x4, 'rr\x00', 0x70, 0x9, 0x13}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x10000, 0x6, 0xb74, 0x7ae61c62}}, 0x44) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 979.839051][ T6870] name failslab, interval 1, probability 0, space 0, times 0 [ 979.861619][ T6870] CPU: 1 PID: 6870 Comm: syz-executor.5 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 979.871863][ T6870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.881904][ T6870] Call Trace: [ 979.885188][ T6870] dump_stack+0x18e/0x1de [ 979.889511][ T6870] should_fail+0x5d8/0x740 [ 979.893923][ T6870] ? kvmalloc_node+0x7e/0xf0 [ 979.898501][ T6870] should_failslab+0x5/0x20 [ 979.902975][ T6870] __kmalloc+0x5f/0x2f0 [ 979.907098][ T6870] ? btf_new_fd+0x272/0x36a0 [ 979.911657][ T6870] kvmalloc_node+0x7e/0xf0 [ 979.916043][ T6870] btf_new_fd+0x2b3/0x36a0 [ 979.920431][ T6870] ? cred_has_capability+0x14f/0x340 [ 979.925681][ T6870] ? cred_has_capability+0x250/0x340 [ 979.930964][ T6870] ? security_capable+0xb1/0xd0 [ 979.935781][ T6870] __do_sys_bpf+0x12ab/0xbd30 [ 979.940430][ T6870] ? refcount_sub_and_test_checked+0x151/0x210 [ 979.946633][ T6870] ? proc_fail_nth_read+0x150/0x150 [ 979.951798][ T6870] ? proc_fail_nth_write+0x157/0x1c0 [ 979.957049][ T6870] ? memset+0x1f/0x40 [ 979.961003][ T6870] ? __sb_end_write+0xb5/0x100 [ 979.965731][ T6870] ? vfs_write+0x422/0x4e0 [ 979.970115][ T6870] ? fput_many+0x42/0x1a0 [ 979.974416][ T6870] ? check_preemption_disabled+0xde/0x2c0 [ 979.980103][ T6870] do_syscall_64+0xcb/0x1e0 [ 979.984575][ T6870] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 979.990436][ T6870] RIP: 0033:0x7f3e39537e99 [ 979.994821][ T6870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 980.014405][ T6870] RSP: 002b:00007f3e386ae168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 980.022811][ T6870] RAX: ffffffffffffffda RBX: 00007f3e3964af60 RCX: 00007f3e39537e99 [ 980.030784][ T6870] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 980.038737][ T6870] RBP: 00007f3e386ae1d0 R08: 0000000000000000 R09: 0000000000000000 17:30:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) (fail_nth: 4) 17:30:47 executing program 2: ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000000c0)=""/204) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000000)={[{0x6, 0x0, 0x1, 0x20, 0x4, 0x61, 0x7f, 0x1, 0x0, 0xff, 0x9, 0x1, 0x8000}, {0x1, 0x800, 0x1, 0x14, 0x26, 0x0, 0xd0, 0x6, 0x40, 0x5, 0x9, 0x5d, 0xe68}, {0xa3, 0x2, 0xfd, 0x73, 0x80, 0x9, 0x7f, 0x7, 0x40, 0x28, 0x80, 0x3, 0x5}], 0x4}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000001c0)={0xa, 0x0, [{0x7f, 0x1, 0x0, 0x0, @sint={0x3, 0x80000000}}, {0xfff, 0x2, 0x0, 0x0, @msi={0x7, 0x3, 0x7, 0x3}}, {0x8f7, 0x1, 0x0, 0x0, @msi={0x57, 0x200, 0x20, 0x7}}, {0x7ff, 0x2, 0x0, 0x0, @sint={0x9, 0x10001}}, {0xb9bf, 0x2, 0x0, 0x0, @irqchip={0x8, 0x2331}}, {0x2, 0x3, 0x0, 0x0, @msi={0x2, 0x0, 0x8e, 0x2}}, {0x6, 0x1, 0x0, 0x0, @msi={0x0, 0x6, 0x9, 0x3}}, {0x0, 0x3, 0x0, 0x0, @adapter={0xe91f, 0x8, 0x0, 0x9, 0x4}}, {0x1, 0x4, 0x0, 0x0, @sint={0x3, 0x20000000}}, {0xfff, 0x3, 0x0, 0x0, @irqchip={0x1, 0x8}}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01000009000000060000000000000500000000000000000000613000"/45], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:47 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x10, 0x6, 0x39, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x800, 0x810, 0xaa9, 0x3, 0x8000, 0x1, 0x0, 0x0, 0xbf2, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000047a60000000c0000000000050074a8bf6c00612e00"], &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1}, 0x20) 17:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0xffffffffffffffff) 17:30:47 executing program 2: ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000000c0)=""/204) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000000)={[{0x6, 0x0, 0x1, 0x20, 0x4, 0x61, 0x7f, 0x1, 0x0, 0xff, 0x9, 0x1, 0x8000}, {0x1, 0x800, 0x1, 0x14, 0x26, 0x0, 0xd0, 0x6, 0x40, 0x5, 0x9, 0x5d, 0xe68}, {0xa3, 0x2, 0xfd, 0x73, 0x80, 0x9, 0x7f, 0x7, 0x40, 0x28, 0x80, 0x3, 0x5}], 0x4}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000001c0)={0xa, 0x0, [{0x7f, 0x1, 0x0, 0x0, @sint={0x3, 0x80000000}}, {0xfff, 0x2, 0x0, 0x0, @msi={0x7, 0x3, 0x7, 0x3}}, {0x8f7, 0x1, 0x0, 0x0, @msi={0x57, 0x200, 0x20, 0x7}}, {0x7ff, 0x2, 0x0, 0x0, @sint={0x9, 0x10001}}, {0xb9bf, 0x2, 0x0, 0x0, @irqchip={0x8, 0x2331}}, {0x2, 0x3, 0x0, 0x0, @msi={0x2, 0x0, 0x8e, 0x2}}, {0x6, 0x1, 0x0, 0x0, @msi={0x0, 0x6, 0x9, 0x3}}, {0x0, 0x3, 0x0, 0x0, @adapter={0xe91f, 0x8, 0x0, 0x9, 0x4}}, {0x1, 0x4, 0x0, 0x0, @sint={0x3, 0x20000000}}, {0xfff, 0x3, 0x0, 0x0, @irqchip={0x1, 0x8}}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01000009000000060000000000000500000000000000000000613000"/45], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000000c0)=""/204) (async) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000000)={[{0x6, 0x0, 0x1, 0x20, 0x4, 0x61, 0x7f, 0x1, 0x0, 0xff, 0x9, 0x1, 0x8000}, {0x1, 0x800, 0x1, 0x14, 0x26, 0x0, 0xd0, 0x6, 0x40, 0x5, 0x9, 0x5d, 0xe68}, {0xa3, 0x2, 0xfd, 0x73, 0x80, 0x9, 0x7f, 0x7, 0x40, 0x28, 0x80, 0x3, 0x5}], 0x4}) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r0, 0x0, 0x0) (async) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000001c0)={0xa, 0x0, [{0x7f, 0x1, 0x0, 0x0, @sint={0x3, 0x80000000}}, {0xfff, 0x2, 0x0, 0x0, @msi={0x7, 0x3, 0x7, 0x3}}, {0x8f7, 0x1, 0x0, 0x0, @msi={0x57, 0x200, 0x20, 0x7}}, {0x7ff, 0x2, 0x0, 0x0, @sint={0x9, 0x10001}}, {0xb9bf, 0x2, 0x0, 0x0, @irqchip={0x8, 0x2331}}, {0x2, 0x3, 0x0, 0x0, @msi={0x2, 0x0, 0x8e, 0x2}}, {0x6, 0x1, 0x0, 0x0, @msi={0x0, 0x6, 0x9, 0x3}}, {0x0, 0x3, 0x0, 0x0, @adapter={0xe91f, 0x8, 0x0, 0x9, 0x4}}, {0x1, 0x4, 0x0, 0x0, @sint={0x3, 0x20000000}}, {0xfff, 0x3, 0x0, 0x0, @irqchip={0x1, 0x8}}]}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01000009000000060000000000000500000000000000000000613000"/45], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) (async) 17:30:47 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x10, 0x6, 0x39, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x800, 0x810, 0xaa9, 0x3, 0x8000, 0x1, 0x0, 0x0, 0xbf2, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x2) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) (async, rerun: 32) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) (rerun: 32) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 980.046676][ T6870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 980.054621][ T6870] R13: 00007ffd3f4b4dbf R14: 00007f3e386ae300 R15: 0000000000022000 [ 980.087047][ T7019] FAULT_INJECTION: forcing a failure. [ 980.087047][ T7019] name failslab, interval 1, probability 0, space 0, times 0 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa004000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 2: ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000000c0)=""/204) (async) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000000)={[{0x6, 0x0, 0x1, 0x20, 0x4, 0x61, 0x7f, 0x1, 0x0, 0xff, 0x9, 0x1, 0x8000}, {0x1, 0x800, 0x1, 0x14, 0x26, 0x0, 0xd0, 0x6, 0x40, 0x5, 0x9, 0x5d, 0xe68}, {0xa3, 0x2, 0xfd, 0x73, 0x80, 0x9, 0x7f, 0x7, 0x40, 0x28, 0x80, 0x3, 0x5}], 0x4}) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000001c0)={0xa, 0x0, [{0x7f, 0x1, 0x0, 0x0, @sint={0x3, 0x80000000}}, {0xfff, 0x2, 0x0, 0x0, @msi={0x7, 0x3, 0x7, 0x3}}, {0x8f7, 0x1, 0x0, 0x0, @msi={0x57, 0x200, 0x20, 0x7}}, {0x7ff, 0x2, 0x0, 0x0, @sint={0x9, 0x10001}}, {0xb9bf, 0x2, 0x0, 0x0, @irqchip={0x8, 0x2331}}, {0x2, 0x3, 0x0, 0x0, @msi={0x2, 0x0, 0x8e, 0x2}}, {0x6, 0x1, 0x0, 0x0, @msi={0x0, 0x6, 0x9, 0x3}}, {0x0, 0x3, 0x0, 0x0, @adapter={0xe91f, 0x8, 0x0, 0x9, 0x4}}, {0x1, 0x4, 0x0, 0x0, @sint={0x3, 0x20000000}}, {0xfff, 0x3, 0x0, 0x0, @irqchip={0x1, 0x8}}]}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01000009000000060000000000000500000000000000000000613000"/45], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) [ 980.112456][ T7019] CPU: 1 PID: 7019 Comm: syz-executor.5 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 980.122613][ T7019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.132667][ T7019] Call Trace: [ 980.132687][ T7019] dump_stack+0x18e/0x1de [ 980.140267][ T7019] should_fail+0x5d8/0x740 [ 980.144678][ T7019] ? kvmalloc_node+0x7e/0xf0 [ 980.149262][ T7019] should_failslab+0x5/0x20 [ 980.153794][ T7019] __kmalloc+0x5f/0x2f0 [ 980.157947][ T7019] ? btf_struct_check_meta+0x6e5/0x8a0 [ 980.163390][ T7019] kvmalloc_node+0x7e/0xf0 [ 980.167800][ T7019] btf_new_fd+0x163f/0x36a0 [ 980.172277][ T7019] ? cred_has_capability+0x14f/0x340 [ 980.177532][ T7019] ? security_capable+0xb1/0xd0 [ 980.182351][ T7019] __do_sys_bpf+0x12ab/0xbd30 [ 980.187084][ T7019] ? refcount_sub_and_test_checked+0x151/0x210 [ 980.193204][ T7019] ? proc_fail_nth_read+0x150/0x150 [ 980.198371][ T7019] ? proc_fail_nth_write+0x157/0x1c0 [ 980.203623][ T7019] ? memset+0x1f/0x40 [ 980.207574][ T7019] ? __sb_end_write+0xb5/0x100 [ 980.212325][ T7019] ? vfs_write+0x422/0x4e0 [ 980.216709][ T7019] ? fput_many+0x42/0x1a0 [ 980.221007][ T7019] ? check_preemption_disabled+0xde/0x2c0 [ 980.226695][ T7019] do_syscall_64+0xcb/0x1e0 [ 980.231173][ T7019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 980.237153][ T7019] RIP: 0033:0x7f3e39537e99 [ 980.241541][ T7019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:30:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) (fail_nth: 5) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 2: accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000c6d25906fb93eee9910966caf671d54d9922e3c8647b76016060000000000000c0000000c00e2"], &(0x7f00000000c0)=""/233, 0x2d, 0xe9, 0x1}, 0x20) 17:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async, rerun: 64) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (rerun: 64) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0xffffffffffffffff) 17:30:47 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x10, 0x6, 0x39, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x800, 0x810, 0xaa9, 0x3, 0x8000, 0x1, 0x0, 0x0, 0xbf2, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x10, 0x6, 0x39, 0x9, 0x0, 0x2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x800, 0x810, 0xaa9, 0x3, 0x8000, 0x1, 0x0, 0x0, 0xbf2, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x2) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) (async) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 980.261128][ T7019] RSP: 002b:00007f3e386ae168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 980.269509][ T7019] RAX: ffffffffffffffda RBX: 00007f3e3964af60 RCX: 00007f3e39537e99 [ 980.277452][ T7019] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 980.285393][ T7019] RBP: 00007f3e386ae1d0 R08: 0000000000000000 R09: 0000000000000000 [ 980.293331][ T7019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 980.301272][ T7019] R13: 00007ffd3f4b4dbf R14: 00007f3e386ae300 R15: 0000000000022000 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa101000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0xffffffffffffffff) (async) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa102000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 2: accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000c6d25906fb93eee9910966caf671d54d9922e3c8647b76016060000000000000c0000000c00e2"], &(0x7f00000000c0)=""/233, 0x2d, 0xe9, 0x1}, 0x20) [ 980.336106][ T7228] FAULT_INJECTION: forcing a failure. [ 980.336106][ T7228] name failslab, interval 1, probability 0, space 0, times 0 [ 980.366685][ T7228] CPU: 1 PID: 7228 Comm: syz-executor.5 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 980.376844][ T7228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.386885][ T7228] Call Trace: [ 980.390152][ T7228] dump_stack+0x18e/0x1de [ 980.394456][ T7228] should_fail+0x5d8/0x740 [ 980.398845][ T7228] ? kvmalloc_node+0x7e/0xf0 [ 980.403414][ T7228] should_failslab+0x5/0x20 [ 980.407884][ T7228] __kmalloc+0x5f/0x2f0 [ 980.412009][ T7228] ? btf_struct_check_meta+0x6e5/0x8a0 [ 980.417435][ T7228] kvmalloc_node+0x7e/0xf0 [ 980.421822][ T7228] btf_new_fd+0x163f/0x36a0 [ 980.426301][ T7228] ? cred_has_capability+0x14f/0x340 [ 980.431557][ T7228] ? security_capable+0xb1/0xd0 [ 980.436378][ T7228] __do_sys_bpf+0x12ab/0xbd30 [ 980.441024][ T7228] ? refcount_sub_and_test_checked+0x151/0x210 [ 980.447145][ T7228] ? proc_fail_nth_read+0x150/0x150 [ 980.452308][ T7228] ? proc_fail_nth_write+0x157/0x1c0 [ 980.457560][ T7228] ? memset+0x1f/0x40 [ 980.461515][ T7228] ? __sb_end_write+0xb5/0x100 [ 980.466251][ T7228] ? vfs_write+0x422/0x4e0 [ 980.470637][ T7228] ? fput_many+0x42/0x1a0 [ 980.474937][ T7228] ? check_preemption_disabled+0xde/0x2c0 [ 980.480623][ T7228] do_syscall_64+0xcb/0x1e0 [ 980.485100][ T7228] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 980.490960][ T7228] RIP: 0033:0x7f3e39537e99 [ 980.495345][ T7228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 980.514921][ T7228] RSP: 002b:00007f3e386ae168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 980.523322][ T7228] RAX: ffffffffffffffda RBX: 00007f3e3964af60 RCX: 00007f3e39537e99 17:30:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) (fail_nth: 6) 17:30:47 executing program 2: accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000c6d25906fb93eee9910966caf671d54d9922e3c8647b76016060000000000000c0000000c00e2"], &(0x7f00000000c0)=""/233, 0x2d, 0xe9, 0x1}, 0x20) 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa103000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000006000000000061302efb000000000000000000000000eb4b11d21b196a75e2aefb158719d058ed4650c66a95e48788ca4aecfe1fd1a346cb5d7192fe8c5da2143478bfdc503c3b2d776483a6dfca2d1afa5ed298c78510cee2d657b2c9c9d53de0cfa70624b658c6feac49ec7cc77d1fc027e53721c3d8b7a26db003f4d1e8a1d498c6fc4bb357873039fb6b315189e691f0c3c803afd56a096a3417fb4c6209e20fa28aae5d278c7abb10c1fca2252a"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x100000001) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 980.531276][ T7228] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 980.539262][ T7228] RBP: 00007f3e386ae1d0 R08: 0000000000000000 R09: 0000000000000000 [ 980.547209][ T7228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 980.555157][ T7228] R13: 00007ffd3f4b4dbf R14: 00007f3e386ae300 R15: 0000000000022000 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa104000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0xfffffffd, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}}, &(0x7f00000004c0)=""/232, 0x32, 0xe8, 0x1}, 0x20) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0xfffffff7}}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f00000000c0)=""/88, 0x35, 0x58, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x8, 0x2, 0x8, 0x62, 0x500, r0, 0xfff, '\x00', 0x0, r1, 0x5, 0x3, 0x5}, 0x40) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xff23) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000020c0)={0x0, @nfc={0x27, 0x1, 0x2, 0x7}, @can={0x1d, 0x0}, @hci={0x1f, 0x0, 0x3}, 0x5e, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002080)='vlan1\x00', 0x0, 0xee, 0x9}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000002300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000022c0)={&(0x7f0000002140)={0x158, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x8000040}, 0x85) 17:30:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) 17:30:47 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0xfffffffd, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}}, &(0x7f00000004c0)=""/232, 0x32, 0xe8, 0x1}, 0x20) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0xfffffff7}}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f00000000c0)=""/88, 0x35, 0x58, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x8, 0x2, 0x8, 0x62, 0x500, r0, 0xfff, '\x00', 0x0, r1, 0x5, 0x3, 0x5}, 0x40) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xff23) (async) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000020c0)={0x0, @nfc={0x27, 0x1, 0x2, 0x7}, @can={0x1d, 0x0}, @hci={0x1f, 0x0, 0x3}, 0x5e, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002080)='vlan1\x00', 0x0, 0xee, 0x9}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000002300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000022c0)={&(0x7f0000002140)={0x158, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x8000040}, 0x85) 17:30:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 980.607233][ T7352] FAULT_INJECTION: forcing a failure. [ 980.607233][ T7352] name failslab, interval 1, probability 0, space 0, times 0 [ 980.649447][ T7352] CPU: 0 PID: 7352 Comm: syz-executor.5 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 980.659613][ T7352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.659617][ T7352] Call Trace: [ 980.659632][ T7352] dump_stack+0x18e/0x1de [ 980.659644][ T7352] should_fail+0x5d8/0x740 [ 980.659658][ T7352] ? kvmalloc_node+0x7e/0xf0 [ 980.659667][ T7352] should_failslab+0x5/0x20 [ 980.659674][ T7352] __kmalloc+0x5f/0x2f0 [ 980.659681][ T7352] ? kvmalloc_node+0x7e/0xf0 [ 980.659689][ T7352] kvmalloc_node+0x7e/0xf0 [ 980.659697][ T7352] btf_new_fd+0x1aef/0x36a0 [ 980.659708][ T7352] ? cred_has_capability+0x14f/0x340 [ 980.659716][ T7352] ? security_capable+0xb1/0xd0 [ 980.659726][ T7352] __do_sys_bpf+0x12ab/0xbd30 [ 980.659737][ T7352] ? refcount_sub_and_test_checked+0x151/0x210 [ 980.659748][ T7352] ? proc_fail_nth_read+0x150/0x150 [ 980.659757][ T7352] ? proc_fail_nth_write+0x157/0x1c0 [ 980.659765][ T7352] ? memset+0x1f/0x40 [ 980.659778][ T7352] ? __sb_end_write+0xb5/0x100 [ 980.659791][ T7352] ? vfs_write+0x422/0x4e0 [ 980.752746][ T7352] ? fput_many+0x42/0x1a0 [ 980.757053][ T7352] ? check_preemption_disabled+0xde/0x2c0 [ 980.762755][ T7352] do_syscall_64+0xcb/0x1e0 [ 980.767233][ T7352] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 980.773095][ T7352] RIP: 0033:0x7f3e39537e99 [ 980.777479][ T7352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) (fail_nth: 7) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa201000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0xfffffffd, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}}, &(0x7f00000004c0)=""/232, 0x32, 0xe8, 0x1}, 0x20) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0xfffffff7}}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f00000000c0)=""/88, 0x35, 0x58, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x8, 0x2, 0x8, 0x62, 0x500, r0, 0xfff, '\x00', 0x0, r1, 0x5, 0x3, 0x5}, 0x40) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) (async) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xff23) (async) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000020c0)={0x0, @nfc={0x27, 0x1, 0x2, 0x7}, @can={0x1d, 0x0}, @hci={0x1f, 0x0, 0x3}, 0x5e, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002080)='vlan1\x00', 0x0, 0xee, 0x9}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f0000002300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000022c0)={&(0x7f0000002140)={0x158, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x8000040}, 0x85) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000006000000000061302efb000000000000000000000000eb4b11d21b196a75e2aefb158719d058ed4650c66a95e48788ca4aecfe1fd1a346cb5d7192fe8c5da2143478bfdc503c3b2d776483a6dfca2d1afa5ed298c78510cee2d657b2c9c9d53de0cfa70624b658c6feac49ec7cc77d1fc027e53721c3d8b7a26db003f4d1e8a1d498c6fc4bb357873039fb6b315189e691f0c3c803afd56a096a3417fb4c6209e20fa28aae5d278c7abb10c1fca2252a"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async, rerun: 64) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (rerun: 64) write$tun(r0, 0x0, 0x0) (async, rerun: 32) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (rerun: 32) write$tun(r1, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (rerun: 32) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x100000001) 17:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa202000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x101, 0x80000000, 0x9]}, &(0x7f00000000c0)=0x44) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018e80000000000001800000005000000003732000000000000000000000000612e000000000000000000000000000000002c4fb49f6e443c7f530306882fb89bacf9a290875284ba574056b36685fd876c2b62a09d4ce861c9ea19"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x26, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 980.797143][ T7352] RSP: 002b:00007f3e386ae168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 980.805528][ T7352] RAX: ffffffffffffffda RBX: 00007f3e3964af60 RCX: 00007f3e39537e99 [ 980.813471][ T7352] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 980.821413][ T7352] RBP: 00007f3e386ae1d0 R08: 0000000000000000 R09: 0000000000000000 [ 980.829361][ T7352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 980.837402][ T7352] R13: 00007ffd3f4b4dbf R14: 00007f3e386ae300 R15: 0000000000022000 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa203000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 980.887077][ T7499] FAULT_INJECTION: forcing a failure. [ 980.887077][ T7499] name failslab, interval 1, probability 0, space 0, times 0 [ 980.908093][ T7499] CPU: 1 PID: 7499 Comm: syz-executor.5 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 980.918250][ T7499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.928402][ T7499] Call Trace: [ 980.931665][ T7499] dump_stack+0x18e/0x1de [ 980.935971][ T7499] should_fail+0x5d8/0x740 [ 980.940369][ T7499] ? kvmalloc_node+0x7e/0xf0 [ 980.944938][ T7499] should_failslab+0x5/0x20 [ 980.949527][ T7499] __kmalloc+0x5f/0x2f0 [ 980.953651][ T7499] ? kvmalloc_node+0x7e/0xf0 [ 980.958216][ T7499] kvmalloc_node+0x7e/0xf0 [ 980.962603][ T7499] btf_new_fd+0x1b0d/0x36a0 [ 980.967080][ T7499] ? cred_has_capability+0x14f/0x340 [ 980.972333][ T7499] ? security_capable+0xb1/0xd0 [ 980.977256][ T7499] __do_sys_bpf+0x12ab/0xbd30 [ 980.981905][ T7499] ? refcount_sub_and_test_checked+0x151/0x210 [ 980.988025][ T7499] ? proc_fail_nth_read+0x150/0x150 [ 980.993189][ T7499] ? proc_fail_nth_write+0x157/0x1c0 [ 980.998445][ T7499] ? memset+0x1f/0x40 [ 981.002410][ T7499] ? __sb_end_write+0xb5/0x100 [ 981.007146][ T7499] ? vfs_write+0x422/0x4e0 [ 981.011540][ T7499] ? fput_many+0x42/0x1a0 [ 981.015843][ T7499] ? check_preemption_disabled+0xde/0x2c0 [ 981.021533][ T7499] do_syscall_64+0xcb/0x1e0 [ 981.026016][ T7499] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 981.031891][ T7499] RIP: 0033:0x7f3e39537e99 [ 981.036279][ T7499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 981.055859][ T7499] RSP: 002b:00007f3e386ae168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 981.064246][ T7499] RAX: ffffffffffffffda RBX: 00007f3e3964af60 RCX: 00007f3e39537e99 [ 981.072243][ T7499] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 981.080186][ T7499] RBP: 00007f3e386ae1d0 R08: 0000000000000000 R09: 0000000000000000 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) (fail_nth: 8) 17:30:48 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x101, 0x80000000, 0x9]}, &(0x7f00000000c0)=0x44) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018e80000000000001800000005000000003732000000000000000000000000612e000000000000000000000000000000002c4fb49f6e443c7f530306882fb89bacf9a290875284ba574056b36685fd876c2b62a09d4ce861c9ea19"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0xc, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x2e, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, @void, {@generic={0x806, "e5972d9a9a7f39d0ab0c9d23925621adeb168257b3216819803e9f6f"}}}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa204000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000006000000000061302efb000000000000000000000000eb4b11d21b196a75e2aefb158719d058ed4650c66a95e48788ca4aecfe1fd1a346cb5d7192fe8c5da2143478bfdc503c3b2d776483a6dfca2d1afa5ed298c78510cee2d657b2c9c9d53de0cfa70624b658c6feac49ec7cc77d1fc027e53721c3d8b7a26db003f4d1e8a1d498c6fc4bb357873039fb6b315189e691f0c3c803afd56a096a3417fb4c6209e20fa28aae5d278c7abb10c1fca2252a"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x100000001) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0x101, 0x80000000, 0x9]}, &(0x7f00000000c0)=0x44) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018e80000000000001800000005000000003732000000000000000000000000612e000000000000000000000000000000002c4fb49f6e443c7f530306882fb89bacf9a290875284ba574056b36685fd876c2b62a09d4ce861c9ea19"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0xc, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x2e, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, @void, {@generic={0x806, "e5972d9a9a7f39d0ab0c9d23925621adeb168257b3216819803e9f6f"}}}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0xc, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x2e, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, @void, {@generic={0x806, "e5972d9a9a7f39d0ab0c9d23925621adeb168257b3216819803e9f6f"}}}, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) (async) [ 981.088127][ T7499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 981.096155][ T7499] R13: 00007ffd3f4b4dbf R14: 00007f3e386ae300 R15: 0000000000022000 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x6, 0x424, 0x800, 0x4925, 0xc93b]}, &(0x7f00000000c0)=0x54) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffffff, [{0x2, 0x0, 0xffffffff}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa301000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x6, 0x424, 0x800, 0x4925, 0xc93b]}, &(0x7f00000000c0)=0x54) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffffff, [{0x2, 0x0, 0xffffffff}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffffff, [{0x2, 0x0, 0xffffffff}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8}, 0x20) (async) 17:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0xc, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x2e, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, @void, {@generic={0x806, "e5972d9a9a7f39d0ab0c9d23925621adeb168257b3216819803e9f6f"}}}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0xc, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x2e, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, @void, {@generic={0x806, "e5972d9a9a7f39d0ab0c9d23925621adeb168257b3216819803e9f6f"}}}, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) (async) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa302000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffffff, [{0x2, 0x0, 0xffffffff}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffffff, [{0x2, 0x0, 0xffffffff}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8}, 0x20) (async) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa303000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000000)="0f01b41ddf0f01c365660f56a3008064660f380a6700640f356766c7442400004800006766c74424020b0000006766c744240600000000670f01142498660fd7e7baf80c66b898cdfd8f66efbafc0c66b8c75d000066efbaf80c66b8b4b8008a66efbafc0c66b80000000066ef", 0x6d}], 0x1, 0x0, &(0x7f0000000200)=[@efer={0x2, 0x7001}], 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000240)={0x66ff, 0x0, 0x9, 0x102}) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x6, 0x424, 0x800, 0x4925, 0xc93b]}, &(0x7f00000000c0)=0x54) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa304000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xc0, 0x0) 17:30:48 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000000)="0f01b41ddf0f01c365660f56a3008064660f380a6700640f356766c7442400004800006766c74424020b0000006766c744240600000000670f01142498660fd7e7baf80c66b898cdfd8f66efbafc0c66b8c75d000066efbaf80c66b8b4b8008a66efbafc0c66b80000000066ef", 0x6d}], 0x1, 0x0, &(0x7f0000000200)=[@efer={0x2, 0x7001}], 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000240)={0x66ff, 0x0, 0x9, 0x102}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r0, 0x0, 0x0) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000000)="0f01b41ddf0f01c365660f56a3008064660f380a6700640f356766c7442400004800006766c74424020b0000006766c744240600000000670f01142498660fd7e7baf80c66b898cdfd8f66efbafc0c66b8c75d000066efbaf80c66b8b4b8008a66efbafc0c66b80000000066ef", 0x6d}], 0x1, 0x0, &(0x7f0000000200)=[@efer={0x2, 0x7001}], 0x1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000240)={0x66ff, 0x0, 0x9, 0x102}) (async) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0xe7, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xc0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xc0, 0x0) (async) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000000)="0f01b41ddf0f01c365660f56a3008064660f380a6700640f356766c7442400004800006766c74424020b0000006766c744240600000000670f01142498660fd7e7baf80c66b898cdfd8f66efbafc0c66b8c75d000066efbaf80c66b8b4b8008a66efbafc0c66b80000000066ef", 0x6d}], 0x1, 0x0, &(0x7f0000000200)=[@efer={0x2, 0x7001}], 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000240)={0x66ff, 0x0, 0x9, 0x102}) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xc0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xc0, 0x0) (async) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0xc, 0xa, [@union={0x3, 0x0, 0x0, 0x7}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x80}}]}, {0x0, [0x61, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000000)={0x0, r0}) 17:30:48 executing program 2: getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000050500000000000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f00000000c0)=0x80000000, 0x4) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa401000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 2: getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000050500000000000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f00000000c0)=0x80000000, 0x4) getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000050500000000000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f00000000c0)=0x80000000, 0x4) (async) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 2: getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000050500000000000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f00000000c0)=0x80000000, 0x4) getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000050500000000000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f00000000c0)=0x80000000, 0x4) (async) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0xc, 0xa, [@union={0x3, 0x0, 0x0, 0x7}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x80}}]}, {0x0, [0x61, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000000)={0x0, r0}) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x3e, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa402000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa403000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x4, r0, 0x9, 0x80000}) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa404000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0xc, 0xa, [@union={0x3, 0x0, 0x0, 0x7}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x80}}]}, {0x0, [0x61, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000000)={0x0, r0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0xc, 0xa, [@union={0x3, 0x0, 0x0, 0x7}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x80}}]}, {0x0, [0x61, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r0, 0x0, 0x0) (async) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000000)={0x0, r0}) (async) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (async) 17:30:48 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x4, r0, 0x9, 0x80000}) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000000)={[{0x6f43, 0xa4, 0x4, 0x0, 0x5, 0x5, 0x80, 0xd7, 0x5, 0x17, 0x1, 0x40, 0x80000001}, {0x401, 0x4, 0xa1, 0x8, 0x9, 0x32, 0x0, 0x6, 0x8, 0x81, 0x8, 0x81, 0x4}, {0x0, 0x36d, 0xff, 0x2, 0x3, 0x3f, 0x0, 0x1, 0x7b, 0x6, 0x8, 0x5, 0x5}], 0x8aa}) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa501000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x4, r0, 0x9, 0x80000}) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=""/226, 0x30, 0xe2, 0x1}, 0x20) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000000)={[{0x6f43, 0xa4, 0x4, 0x0, 0x5, 0x5, 0x80, 0xd7, 0x5, 0x17, 0x1, 0x40, 0x80000001}, {0x401, 0x4, 0xa1, 0x8, 0x9, 0x32, 0x0, 0x6, 0x8, 0x81, 0x8, 0x81, 0x4}, {0x0, 0x36d, 0xff, 0x2, 0x3, 0x3f, 0x0, 0x1, 0x7b, 0x6, 0x8, 0x5, 0x5}], 0x8aa}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000000)={[{0x6f43, 0xa4, 0x4, 0x0, 0x5, 0x5, 0x80, 0xd7, 0x5, 0x17, 0x1, 0x40, 0x80000001}, {0x401, 0x4, 0xa1, 0x8, 0x9, 0x32, 0x0, 0x6, 0x8, 0x81, 0x8, 0x81, 0x4}, {0x0, 0x36d, 0xff, 0x2, 0x3, 0x3f, 0x0, 0x1, 0x7b, 0x6, 0x8, 0x5, 0x5}], 0x8aa}) (async) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa502000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb3, [@union={0x6}]}, {0x0, [0x51, 0x0, 0x0, 0x0, 0x61, 0x61, 0x30]}}, &(0x7f00000004c0)=""/229, 0x2d, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x41a540, 0x0) write$tun(r0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0x7f, [0x10000, 0x0, 0x1, 0xffff, 0x1, 0x4], 0x1, &(0x7f0000000000)=[{}], &(0x7f00000000c0)=""/127}, &(0x7f0000000040)=0x78) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb3, [@union={0x6}]}, {0x0, [0x51, 0x0, 0x0, 0x0, 0x61, 0x61, 0x30]}}, &(0x7f00000004c0)=""/229, 0x2d, 0xe8, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x41a540, 0x0) write$tun(r0, 0x0, 0x0) (async) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0x7f, [0x10000, 0x0, 0x1, 0xffff, 0x1, 0x4], 0x1, &(0x7f0000000000)=[{}], &(0x7f00000000c0)=""/127}, &(0x7f0000000040)=0x78) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa503000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000000)={[{0x6f43, 0xa4, 0x4, 0x0, 0x5, 0x5, 0x80, 0xd7, 0x5, 0x17, 0x1, 0x40, 0x80000001}, {0x401, 0x4, 0xa1, 0x8, 0x9, 0x32, 0x0, 0x6, 0x8, 0x81, 0x8, 0x81, 0x4}, {0x0, 0x36d, 0xff, 0x2, 0x3, 0x3f, 0x0, 0x1, 0x7b, 0x6, 0x8, 0x5, 0x5}], 0x8aa}) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=""/226, 0x30, 0xe2, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa504000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb3, [@union={0x6}]}, {0x0, [0x51, 0x0, 0x0, 0x0, 0x61, 0x61, 0x30]}}, &(0x7f00000004c0)=""/229, 0x2d, 0xe8, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x41a540, 0x0) write$tun(r0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0x7f, [0x10000, 0x0, 0x1, 0xffff, 0x1, 0x4], 0x1, &(0x7f0000000000)=[{}], &(0x7f00000000c0)=""/127}, &(0x7f0000000040)=0x78) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=""/226, 0x30, 0xe2, 0x1}, 0x20) 17:30:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @private=0xa010102}, 0x10) sendmsg$nfc_llcp(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x27, 0x1, 0x2, 0x0, 0x33, 0xd5, "7e06ef945d2b0fe1d9c7b21d5c041fdcfabf47311ec1da82b8f07355699a1f2bc478056c24bd19d03a4d95f2a37b056450a900531d16161f3f9d956bbf7f85", 0x3a}, 0x60, &(0x7f0000000900)=[{&(0x7f0000000680)="44c38e13802cdba46160fcb49e46de8ce1bbab5e565c7250d3668b9d114532f3968aaa395e411aa35f9af85d8bd5d5c8326f63e997933861f9a96a4dbb5c574def06cb4f2c3349c5426d33640d3792a4470f65d662f86540dbe0b323ea17bd9c3d73be693eed5a9884356de5c4195ac629f15f92f16b90b89574dd937d57fd8a01017064f1cace840b2b97cb7d07918bf7a3feeb83cc3c2716b12382d7b621da4cf0e7229ccffbfafd513a1d7a0c6952fc3867e633eb", 0xb6}, {&(0x7f0000000040)="926e9561dc2a433c58568116c72cb894451da41379590e17efe0ad6e0424b90ba11ebad90e6caa0f3201e1768ed501aa67a34312ec1cb73c97862ae08722", 0x3e}, {&(0x7f0000000440)="f4a0cdd61794920a607b0cbbc658308a1988adfff0f6", 0x16}, {&(0x7f0000000740)="539a2cd19f0d3410f386fddb5aaf56fddfe4f3faeea6fe8c6c436b9ecb53ab6dcce5855fc99b409c6f6d928bc1cf8eed49fa1be24186f189916f68bc6e28a40677f4529e515b4c744031098a5109a3be3d3c6fb53058f08ef5145977cddf2a2b89510aea0f6604db91c0f37568b396bc808958521dcb5211814e344796f2d781ed46b855b2e42d5e5b", 0x89}, {&(0x7f0000000800)="219f8d21242b73e14a15778c6390fd505f631c7d9206e41bc68c7484c70c6732cd1a39de0cdc648737880b97424293d198b2c6ac22e19e39b30c766d7d2f94a6c4b8a93d7e13cbb9863b26225f70a8b2ce4414721a6b245240f63d6f42a4d2b5e81af6ae96c4a84717a926914ef51cb7099cf688676aa118f2681163e03aca5bf41662b1489bcc4a927990ed0167dc667579da1b76e45017b7077638d902350f1ad0b8fb16cc38a375e0bb7f3905d9520a4755058f05ce51754aa9963415851e0131b7b887a4d0f7ffb15700128710956c0db5011499afbf8897e48d9f3b464c0e5789638acb6bae4aa95f61676696bba8d71780", 0xf4}], 0x5, &(0x7f0000000980)={0xa8, 0x119, 0x8, "6b9394ed3c310564831d90b4bc2ac99b777b4e9a8dd32286bb80617ca0fcf95948e1662e5cbf7accd0786d1c1dab659f159a401dd39a232a9dedb02345dfa342eb85c01f9e68b795c04a50f2cf385fa8f9169282febf2c360eea661f4f91305ae94f0d25b12182dde182410585aa17bcf22b205ff461f3789e2e975aad3886b5775994d973e3f7101f4dc0855633974ac610"}, 0xa8, 0x8084}, 0x44080) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000000500000004000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) syz_io_uring_setup(0x7d74, &(0x7f00000000c0)={0x0, 0x35f5, 0x4, 0x3, 0xab, 0x0, r0}, &(0x7f0000fea000/0x13000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f00000003c0), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)="5eced915a7e96ca8594e47032a7f96069bb3ba0f3c028c95a541700768746b63041c24068b", 0x25, 0x20000001}, 0x7fffffff) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000340)=0x8000, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000300)=""/172) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000380)=""/18) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r3, 0x0, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=@getae={0x80, 0x1f, 0x501, 0x70bd2d, 0x25dfdbfb, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x4d6, 0xa, 0x32}, @in=@remote, 0x20, 0x3506}, [@extra_flags={0x8, 0x18, 0x6}, @replay_val={0xfffffffffffffdd0, 0xa, {0x70bd29, 0x70bd2b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@empty, 0x2, 0x5, 0x5}}, @proto={0x0, 0x19, 0x6c}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004084}, 0x44000) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa601000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000060000000000000700ecffffffffffffff0061302e000b5b7e085e2c2388dc6d03d7334870d0de21a00919f2b5b852e6f765365eef77b4bc41039e1b4e040cf92bda7c0f281ff3c81cd1d4c15ba01d7ea777d39ade2a6783a64dc76f231f99d5d946a68f684d4fef5ab9d97dd6748d695f184c294a927f06e4593b222f3ef43daa59545841039105c9c221828e45c30ab55dbdc989cf25ec8d3a4739351d0db9a1b5df7f9a2fda319d640c5f56f40df7cde45c1fd0c108db6954415b525fdf7ac7b9217f14143d4619988b006c9b4b"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000001c0)=0x60) r1 = syz_open_dev$hidraw(&(0x7f0000000840), 0xc6, 0x0) write$hidraw(r1, 0x0, 0x0) ioctl$HIDIOCGRDESC(r1, 0x90044802, &(0x7f00000005c0)={0x4e1, "323c74c937751770141cd0c3f34c91731f3fc4b528e4f4025614bbd5a8467be3ceace6c53ec5233805abbc11412e3afb40120cb7cdeafa2c89e535c8caf948cba938fdbcb3a6ab8291eceee71584e4fa2d2c80bd6109e147d67d456898b6a4f3e614e1b87dd75de44baf080109f0360d5e872dda3df980b1d8d7c094adf9af3c033a170714da69bb4fef9df6a6c42952733700331c7797ee630922464872c65a40207f4920657a6b3abad6b51225be1fcb5b08450ee29d4516486df8b34afd1d039d483255da737ea7c88037934a2240451baa7f088658eeeead70375b785456ac49042074e225fc759f4fd77f46aff9b2336cc37b1f157b256fae6b1ea7108d215320626cf19ede52cad8dc52af873abc33d91df0da50a367aa8bfba152789df2f822f6b6c6f2e4b3c4febaf6f3aca6637a0f6476fa526575fb76ac439b5c5e7e0ae638a753deee8c4180e449ad141410ee9222fc0ee2871d86599e0c6004bfaae1a7996491211b4aa50d55649e3b0a603c8eb9465ea71b888c8013b3b7b88513538378bc29071ae53f5b5174038d785761dd75bb1174ae5405fe3b879aeb462884db523c52cc7ad93c6460852fda9b51947a7354f0f8bc1b0215cea222a86e3681ab26636870051f7f0ffa7250135f9d5f61a7ef67557e358a54e690b4ee0fc24fdd0aeeba6d048d7456ad4f8b864da02f1b6a056ad6b0bb60114a7618e7581c49572af6c81c64fd901d72211cfea425bef5926ff37d30b075c6c146f1b15c973cf616cf24a3cf306747bc9b966d8c83eb39c23af3009eca9aa3f991383b039e0915d2aa7462db116238ee9ac16bce646f5ae7977d31da9b8cd09c1a19cb465184b7c997147ef7a3ee494deb9ed323ff6f96cf7e59937730057ab59cdf820ab64601cd7f6996adc7449ec241eeb2f898200a5062b65690ff1b08264abcce37b1541e911c6693069b43ed14c06b951973a9423d5c1e99a3f81ea4fc162922c1b0324df84bb1d4436c23041fbfd82f06f5645ce91fe31a49dcdf14bdf4228c179ab56776815923a46ed381faaaba076146c382fa8286a8d10dafba9f2016e6c76e1f783ccf7fd6116b9216236f3537b2b3248f650c940e33ad6a89d0bd1e3a01416df14a6ce37224f930ad590c6932f77842bbff9c2813927ca09ea334f0ec19d6880baea45fef753d1a71233f4032ee360acc90f2bff0884bc0cd5795aa4f8d2184d2c6d9355c83a47368234ba253887a2aa2a8a4e8b7e6a12feaeba0643cc61c21654c96713d473c2ebf71a94886e684c5ab78c7d1ce0ca83df1e15d9d4d30037e59b2a441a4e3d280ff51d35fd0df2543761a9ffeeeb18cf4e2fa74c42b40fa1b43a6ce7e39e4480673089a523383fe3eeb9356f2cc5dd0ec37b8d6775e425979dc181326fd0088383089c0819ae379772a2287f60777aa6c0e0895960130e62216bf4c4e01810d710f40cefbb1375ce893cc2cc73cf1138061b84618a36e345f4af2ce7c992eb3bd65fc21d17ed861a215e0b1c261a8ae4d173e0efb78f446554caaba0a2ca006d24eee2ebb3e8c48f1f211187b10abd64f65e83b27994e388e34c3590f24ed196833ee73934e744c161741ba56660cf86b34af14fcfeeac4714172cd47b7e84ee8ec86810df1c0b156e3a040960f08e1e02851aae44b24ef999855ed2aade06fe02c8ba3c96cb1a05d66f030d51b406fa31c1a6a9fa52163dd0d0e2f1ef691a0d642ce9948e72aaf90eac1ff62f569e9c3bc10e81d5ceaca"}) accept$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000280)=0x60) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa602000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @private=0xa010102}, 0x10) sendmsg$nfc_llcp(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x27, 0x1, 0x2, 0x0, 0x33, 0xd5, "7e06ef945d2b0fe1d9c7b21d5c041fdcfabf47311ec1da82b8f07355699a1f2bc478056c24bd19d03a4d95f2a37b056450a900531d16161f3f9d956bbf7f85", 0x3a}, 0x60, &(0x7f0000000900)=[{&(0x7f0000000680)="44c38e13802cdba46160fcb49e46de8ce1bbab5e565c7250d3668b9d114532f3968aaa395e411aa35f9af85d8bd5d5c8326f63e997933861f9a96a4dbb5c574def06cb4f2c3349c5426d33640d3792a4470f65d662f86540dbe0b323ea17bd9c3d73be693eed5a9884356de5c4195ac629f15f92f16b90b89574dd937d57fd8a01017064f1cace840b2b97cb7d07918bf7a3feeb83cc3c2716b12382d7b621da4cf0e7229ccffbfafd513a1d7a0c6952fc3867e633eb", 0xb6}, {&(0x7f0000000040)="926e9561dc2a433c58568116c72cb894451da41379590e17efe0ad6e0424b90ba11ebad90e6caa0f3201e1768ed501aa67a34312ec1cb73c97862ae08722", 0x3e}, {&(0x7f0000000440)="f4a0cdd61794920a607b0cbbc658308a1988adfff0f6", 0x16}, {&(0x7f0000000740)="539a2cd19f0d3410f386fddb5aaf56fddfe4f3faeea6fe8c6c436b9ecb53ab6dcce5855fc99b409c6f6d928bc1cf8eed49fa1be24186f189916f68bc6e28a40677f4529e515b4c744031098a5109a3be3d3c6fb53058f08ef5145977cddf2a2b89510aea0f6604db91c0f37568b396bc808958521dcb5211814e344796f2d781ed46b855b2e42d5e5b", 0x89}, {&(0x7f0000000800)="219f8d21242b73e14a15778c6390fd505f631c7d9206e41bc68c7484c70c6732cd1a39de0cdc648737880b97424293d198b2c6ac22e19e39b30c766d7d2f94a6c4b8a93d7e13cbb9863b26225f70a8b2ce4414721a6b245240f63d6f42a4d2b5e81af6ae96c4a84717a926914ef51cb7099cf688676aa118f2681163e03aca5bf41662b1489bcc4a927990ed0167dc667579da1b76e45017b7077638d902350f1ad0b8fb16cc38a375e0bb7f3905d9520a4755058f05ce51754aa9963415851e0131b7b887a4d0f7ffb15700128710956c0db5011499afbf8897e48d9f3b464c0e5789638acb6bae4aa95f61676696bba8d71780", 0xf4}], 0x5, &(0x7f0000000980)={0xa8, 0x119, 0x8, "6b9394ed3c310564831d90b4bc2ac99b777b4e9a8dd32286bb80617ca0fcf95948e1662e5cbf7accd0786d1c1dab659f159a401dd39a232a9dedb02345dfa342eb85c01f9e68b795c04a50f2cf385fa8f9169282febf2c360eea661f4f91305ae94f0d25b12182dde182410585aa17bcf22b205ff461f3789e2e975aad3886b5775994d973e3f7101f4dc0855633974ac610"}, 0xa8, 0x8084}, 0x44080) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000000500000004000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) syz_io_uring_setup(0x7d74, &(0x7f00000000c0)={0x0, 0x35f5, 0x4, 0x3, 0xab, 0x0, r0}, &(0x7f0000fea000/0x13000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f00000003c0), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)="5eced915a7e96ca8594e47032a7f96069bb3ba0f3c028c95a541700768746b63041c24068b", 0x25, 0x20000001}, 0x7fffffff) (async) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000340)=0x8000, 0x4) (async, rerun: 32) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (rerun: 32) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000300)=""/172) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000380)=""/18) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r3, 0x0, 0x0) (async) sendmsg$nl_xfrm(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=@getae={0x80, 0x1f, 0x501, 0x70bd2d, 0x25dfdbfb, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x4d6, 0xa, 0x32}, @in=@remote, 0x20, 0x3506}, [@extra_flags={0x8, 0x18, 0x6}, @replay_val={0xfffffffffffffdd0, 0xa, {0x70bd29, 0x70bd2b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@empty, 0x2, 0x5, 0x5}}, @proto={0x0, 0x19, 0x6c}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004084}, 0x44000) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 1: syz_emit_ethernet(0x127e, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000092e00c9e9288df14e4a952b38002bde4fba0a0b7f330e530fb52027"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x40200, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0xb, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x2, 0x6, 0x0, 0x110, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x3d}, @jmp={0x5, 0x1, 0x8, 0x6, 0x6, 0x1, 0x10}, @map, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}, @call={0x85, 0x0, 0x0, 0x9e}, @call={0x85, 0x0, 0x0, 0xa1}, @jmp={0x5, 0x1, 0xd, 0x1, 0x1, 0x80, 0x10}], &(0x7f00000000c0)='GPL\x00', 0x2af621d, 0x68, &(0x7f0000000100)=""/104, 0x41100, 0x1e, '\x00', 0x0, 0x16, r0, 0x8, &(0x7f0000000180)={0x5, 0x20000002}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x8, 0x1}, 0x10, 0x0, r1}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x5, 0x686, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000340), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x11, 0x24, 0x8035, 'dummy0\x00', 'team_slave_1\x00', 'netpci0\x00', 'macvtap0\x00', @multicast, [0xff, 0x0, 0xff, 0x7f, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0xff], 0x6e, 0x6e, 0xe6, [], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x1f, 0x2, 0x0, 0x0, "d36faa2f2d4b93f57c034b24b1c5b2fb6b744d8675b797d9615ea88dd59cd1d276839a5b1c3946adf528c3f08ec5ebbdb0a7333fd2f0c879650a67175367c6a2"}}}}, {0x5, 0x2e, 0x4, 'vxcan1\x00', 'xfrm0\x00', 'veth1_to_team\x00', 'veth0_to_team\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x17}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff], 0xce, 0xce, 0x11e, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x3, 0xc39c, 0x1, 0x3}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x7e, 0x7f, 0x1, 0x3}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00', {0x4}}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x5, 0x0, 0x805, 'veth1_virt_wifi\x00', 'veth0_to_team\x00', 'veth0_virt_wifi\x00', 'wg2\x00', @link_local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @random="bfebf6ef5a04", [0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x0, 0x5, 0xb6, 'bond_slave_0\x00', 'ip6gretap0\x00', 'vlan1\x00', 'ipvlan0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0xff, 0x0, 0x0, 0x101, 0xff], 0x6e, 0xce, 0x11e, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@STANDARD={'\x00', 0x8, {0x7ffffffffffffffb}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x6, {0x6}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x9, 0x28, 0x88f8, 'team_slave_0\x00', 'veth0_to_team\x00', 'netdevsim0\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x5fdce00250ce748b, 0xff], @multicast, [0xff, 0xff], 0x10e, 0x186, 0x1d6, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'nr0\x00', {}, 'team_slave_1\x00', {0xff}, 0x0, 0x3}}}, @cpu={{'cpu\x00', 0x0, 0x8}, {{0x2, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x3ff, 0xffff, 0x2, 0x0, 0x0, "54cd722c149c9950fcec64bde2e568cc50e0c3bd8a651f8d6e23db25868217196399ca979ae1b43ed2e67fa7d12d7bd81c67223be8459136266c1b97f5e04ea5"}}}], @common=@log={'log\x00', 0x28, {{0x40, "f5f20e820fc61d80b4e90812deaa28033a7b011a6c44e3821d5500026462", 0x4}}}}]}]}, 0x6fe) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa603000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa604000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @private=0xa010102}, 0x10) sendmsg$nfc_llcp(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x27, 0x1, 0x2, 0x0, 0x33, 0xd5, "7e06ef945d2b0fe1d9c7b21d5c041fdcfabf47311ec1da82b8f07355699a1f2bc478056c24bd19d03a4d95f2a37b056450a900531d16161f3f9d956bbf7f85", 0x3a}, 0x60, &(0x7f0000000900)=[{&(0x7f0000000680)="44c38e13802cdba46160fcb49e46de8ce1bbab5e565c7250d3668b9d114532f3968aaa395e411aa35f9af85d8bd5d5c8326f63e997933861f9a96a4dbb5c574def06cb4f2c3349c5426d33640d3792a4470f65d662f86540dbe0b323ea17bd9c3d73be693eed5a9884356de5c4195ac629f15f92f16b90b89574dd937d57fd8a01017064f1cace840b2b97cb7d07918bf7a3feeb83cc3c2716b12382d7b621da4cf0e7229ccffbfafd513a1d7a0c6952fc3867e633eb", 0xb6}, {&(0x7f0000000040)="926e9561dc2a433c58568116c72cb894451da41379590e17efe0ad6e0424b90ba11ebad90e6caa0f3201e1768ed501aa67a34312ec1cb73c97862ae08722", 0x3e}, {&(0x7f0000000440)="f4a0cdd61794920a607b0cbbc658308a1988adfff0f6", 0x16}, {&(0x7f0000000740)="539a2cd19f0d3410f386fddb5aaf56fddfe4f3faeea6fe8c6c436b9ecb53ab6dcce5855fc99b409c6f6d928bc1cf8eed49fa1be24186f189916f68bc6e28a40677f4529e515b4c744031098a5109a3be3d3c6fb53058f08ef5145977cddf2a2b89510aea0f6604db91c0f37568b396bc808958521dcb5211814e344796f2d781ed46b855b2e42d5e5b", 0x89}, {&(0x7f0000000800)="219f8d21242b73e14a15778c6390fd505f631c7d9206e41bc68c7484c70c6732cd1a39de0cdc648737880b97424293d198b2c6ac22e19e39b30c766d7d2f94a6c4b8a93d7e13cbb9863b26225f70a8b2ce4414721a6b245240f63d6f42a4d2b5e81af6ae96c4a84717a926914ef51cb7099cf688676aa118f2681163e03aca5bf41662b1489bcc4a927990ed0167dc667579da1b76e45017b7077638d902350f1ad0b8fb16cc38a375e0bb7f3905d9520a4755058f05ce51754aa9963415851e0131b7b887a4d0f7ffb15700128710956c0db5011499afbf8897e48d9f3b464c0e5789638acb6bae4aa95f61676696bba8d71780", 0xf4}], 0x5, &(0x7f0000000980)={0xa8, 0x119, 0x8, "6b9394ed3c310564831d90b4bc2ac99b777b4e9a8dd32286bb80617ca0fcf95948e1662e5cbf7accd0786d1c1dab659f159a401dd39a232a9dedb02345dfa342eb85c01f9e68b795c04a50f2cf385fa8f9169282febf2c360eea661f4f91305ae94f0d25b12182dde182410585aa17bcf22b205ff461f3789e2e975aad3886b5775994d973e3f7101f4dc0855633974ac610"}, 0xa8, 0x8084}, 0x44080) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000000500000004000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) syz_io_uring_setup(0x7d74, &(0x7f00000000c0)={0x0, 0x35f5, 0x4, 0x3, 0xab, 0x0, r0}, &(0x7f0000fea000/0x13000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f00000003c0), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)="5eced915a7e96ca8594e47032a7f96069bb3ba0f3c028c95a541700768746b63041c24068b", 0x25, 0x20000001}, 0x7fffffff) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000340)=0x8000, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000300)=""/172) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000380)=""/18) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r3, 0x0, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=@getae={0x80, 0x1f, 0x501, 0x70bd2d, 0x25dfdbfb, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x4d6, 0xa, 0x32}, @in=@remote, 0x20, 0x3506}, [@extra_flags={0x8, 0x18, 0x6}, @replay_val={0xfffffffffffffdd0, 0xa, {0x70bd29, 0x70bd2b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@empty, 0x2, 0x5, 0x5}}, @proto={0x0, 0x19, 0x6c}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004084}, 0x44000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r0, 0x0, 0x0) (async) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @private=0xa010102}, 0x10) (async) sendmsg$nfc_llcp(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x27, 0x1, 0x2, 0x0, 0x33, 0xd5, "7e06ef945d2b0fe1d9c7b21d5c041fdcfabf47311ec1da82b8f07355699a1f2bc478056c24bd19d03a4d95f2a37b056450a900531d16161f3f9d956bbf7f85", 0x3a}, 0x60, &(0x7f0000000900)=[{&(0x7f0000000680)="44c38e13802cdba46160fcb49e46de8ce1bbab5e565c7250d3668b9d114532f3968aaa395e411aa35f9af85d8bd5d5c8326f63e997933861f9a96a4dbb5c574def06cb4f2c3349c5426d33640d3792a4470f65d662f86540dbe0b323ea17bd9c3d73be693eed5a9884356de5c4195ac629f15f92f16b90b89574dd937d57fd8a01017064f1cace840b2b97cb7d07918bf7a3feeb83cc3c2716b12382d7b621da4cf0e7229ccffbfafd513a1d7a0c6952fc3867e633eb", 0xb6}, {&(0x7f0000000040)="926e9561dc2a433c58568116c72cb894451da41379590e17efe0ad6e0424b90ba11ebad90e6caa0f3201e1768ed501aa67a34312ec1cb73c97862ae08722", 0x3e}, {&(0x7f0000000440)="f4a0cdd61794920a607b0cbbc658308a1988adfff0f6", 0x16}, {&(0x7f0000000740)="539a2cd19f0d3410f386fddb5aaf56fddfe4f3faeea6fe8c6c436b9ecb53ab6dcce5855fc99b409c6f6d928bc1cf8eed49fa1be24186f189916f68bc6e28a40677f4529e515b4c744031098a5109a3be3d3c6fb53058f08ef5145977cddf2a2b89510aea0f6604db91c0f37568b396bc808958521dcb5211814e344796f2d781ed46b855b2e42d5e5b", 0x89}, {&(0x7f0000000800)="219f8d21242b73e14a15778c6390fd505f631c7d9206e41bc68c7484c70c6732cd1a39de0cdc648737880b97424293d198b2c6ac22e19e39b30c766d7d2f94a6c4b8a93d7e13cbb9863b26225f70a8b2ce4414721a6b245240f63d6f42a4d2b5e81af6ae96c4a84717a926914ef51cb7099cf688676aa118f2681163e03aca5bf41662b1489bcc4a927990ed0167dc667579da1b76e45017b7077638d902350f1ad0b8fb16cc38a375e0bb7f3905d9520a4755058f05ce51754aa9963415851e0131b7b887a4d0f7ffb15700128710956c0db5011499afbf8897e48d9f3b464c0e5789638acb6bae4aa95f61676696bba8d71780", 0xf4}], 0x5, &(0x7f0000000980)={0xa8, 0x119, 0x8, "6b9394ed3c310564831d90b4bc2ac99b777b4e9a8dd32286bb80617ca0fcf95948e1662e5cbf7accd0786d1c1dab659f159a401dd39a232a9dedb02345dfa342eb85c01f9e68b795c04a50f2cf385fa8f9169282febf2c360eea661f4f91305ae94f0d25b12182dde182410585aa17bcf22b205ff461f3789e2e975aad3886b5775994d973e3f7101f4dc0855633974ac610"}, 0xa8, 0x8084}, 0x44080) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000000500000004000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) syz_io_uring_setup(0x7d74, &(0x7f00000000c0)={0x0, 0x35f5, 0x4, 0x3, 0xab, 0x0, r0}, &(0x7f0000fea000/0x13000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f00000003c0), &(0x7f0000000140)) (async) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)="5eced915a7e96ca8594e47032a7f96069bb3ba0f3c028c95a541700768746b63041c24068b", 0x25, 0x20000001}, 0x7fffffff) (async) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000340)=0x8000, 0x4) (async) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000300)=""/172) (async) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000380)=""/18) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r3, 0x0, 0x0) (async) sendmsg$nl_xfrm(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=@getae={0x80, 0x1f, 0x501, 0x70bd2d, 0x25dfdbfb, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x4d6, 0xa, 0x32}, @in=@remote, 0x20, 0x3506}, [@extra_flags={0x8, 0x18, 0x6}, @replay_val={0xfffffffffffffdd0, 0xa, {0x70bd29, 0x70bd2b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@empty, 0x2, 0x5, 0x5}}, @proto={0x0, 0x19, 0x6c}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004084}, 0x44000) (async) 17:30:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000060000000000000700ecffffffffffffff0061302e000b5b7e085e2c2388dc6d03d7334870d0de21a00919f2b5b852e6f765365eef77b4bc41039e1b4e040cf92bda7c0f281ff3c81cd1d4c15ba01d7ea777d39ade2a6783a64dc76f231f99d5d946a68f684d4fef5ab9d97dd6748d695f184c294a927f06e4593b222f3ef43daa59545841039105c9c221828e45c30ab55dbdc989cf25ec8d3a4739351d0db9a1b5df7f9a2fda319d640c5f56f40df7cde45c1fd0c108db6954415b525fdf7ac7b9217f14143d4619988b006c9b4b"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000001c0)=0x60) r1 = syz_open_dev$hidraw(&(0x7f0000000840), 0xc6, 0x0) write$hidraw(r1, 0x0, 0x0) (async) ioctl$HIDIOCGRDESC(r1, 0x90044802, &(0x7f00000005c0)={0x4e1, "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"}) accept$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000280)=0x60) 17:30:48 executing program 1: syz_emit_ethernet(0x127e, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000092e00c9e9288df14e4a952b38002bde4fba0a0b7f330e530fb52027"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x40200, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0xb, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x2, 0x6, 0x0, 0x110, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x3d}, @jmp={0x5, 0x1, 0x8, 0x6, 0x6, 0x1, 0x10}, @map, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}, @call={0x85, 0x0, 0x0, 0x9e}, @call={0x85, 0x0, 0x0, 0xa1}, @jmp={0x5, 0x1, 0xd, 0x1, 0x1, 0x80, 0x10}], &(0x7f00000000c0)='GPL\x00', 0x2af621d, 0x68, &(0x7f0000000100)=""/104, 0x41100, 0x1e, '\x00', 0x0, 0x16, r0, 0x8, &(0x7f0000000180)={0x5, 0x20000002}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x8, 0x1}, 0x10, 0x0, r1}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x5, 0x686, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000340), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x11, 0x24, 0x8035, 'dummy0\x00', 'team_slave_1\x00', 'netpci0\x00', 'macvtap0\x00', @multicast, [0xff, 0x0, 0xff, 0x7f, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0xff], 0x6e, 0x6e, 0xe6, [], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x1f, 0x2, 0x0, 0x0, "d36faa2f2d4b93f57c034b24b1c5b2fb6b744d8675b797d9615ea88dd59cd1d276839a5b1c3946adf528c3f08ec5ebbdb0a7333fd2f0c879650a67175367c6a2"}}}}, {0x5, 0x2e, 0x4, 'vxcan1\x00', 'xfrm0\x00', 'veth1_to_team\x00', 'veth0_to_team\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x17}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff], 0xce, 0xce, 0x11e, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x3, 0xc39c, 0x1, 0x3}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x7e, 0x7f, 0x1, 0x3}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00', {0x4}}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x5, 0x0, 0x805, 'veth1_virt_wifi\x00', 'veth0_to_team\x00', 'veth0_virt_wifi\x00', 'wg2\x00', @link_local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @random="bfebf6ef5a04", [0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x0, 0x5, 0xb6, 'bond_slave_0\x00', 'ip6gretap0\x00', 'vlan1\x00', 'ipvlan0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0xff, 0x0, 0x0, 0x101, 0xff], 0x6e, 0xce, 0x11e, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@STANDARD={'\x00', 0x8, {0x7ffffffffffffffb}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x6, {0x6}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x9, 0x28, 0x88f8, 'team_slave_0\x00', 'veth0_to_team\x00', 'netdevsim0\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x5fdce00250ce748b, 0xff], @multicast, [0xff, 0xff], 0x10e, 0x186, 0x1d6, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'nr0\x00', {}, 'team_slave_1\x00', {0xff}, 0x0, 0x3}}}, @cpu={{'cpu\x00', 0x0, 0x8}, {{0x2, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x3ff, 0xffff, 0x2, 0x0, 0x0, "54cd722c149c9950fcec64bde2e568cc50e0c3bd8a651f8d6e23db25868217196399ca979ae1b43ed2e67fa7d12d7bd81c67223be8459136266c1b97f5e04ea5"}}}], @common=@log={'log\x00', 0x28, {{0x40, "f5f20e820fc61d80b4e90812deaa28033a7b011a6c44e3821d5500026462", 0x4}}}}]}]}, 0x6fe) syz_emit_ethernet(0x127e, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000092e00c9e9288df14e4a952b38002bde4fba0a0b7f330e530fb52027"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x40200, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0xb, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x2, 0x6, 0x0, 0x110, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x3d}, @jmp={0x5, 0x1, 0x8, 0x6, 0x6, 0x1, 0x10}, @map, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}, @call={0x85, 0x0, 0x0, 0x9e}, @call={0x85, 0x0, 0x0, 0xa1}, @jmp={0x5, 0x1, 0xd, 0x1, 0x1, 0x80, 0x10}], &(0x7f00000000c0)='GPL\x00', 0x2af621d, 0x68, &(0x7f0000000100)=""/104, 0x41100, 0x1e, '\x00', 0x0, 0x16, r0, 0x8, &(0x7f0000000180)={0x5, 0x20000002}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x8, 0x1}, 0x10, 0x0, r1}, 0x78) (async) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x5, 0x686, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000340), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x11, 0x24, 0x8035, 'dummy0\x00', 'team_slave_1\x00', 'netpci0\x00', 'macvtap0\x00', @multicast, [0xff, 0x0, 0xff, 0x7f, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0xff], 0x6e, 0x6e, 0xe6, [], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x1f, 0x2, 0x0, 0x0, "d36faa2f2d4b93f57c034b24b1c5b2fb6b744d8675b797d9615ea88dd59cd1d276839a5b1c3946adf528c3f08ec5ebbdb0a7333fd2f0c879650a67175367c6a2"}}}}, {0x5, 0x2e, 0x4, 'vxcan1\x00', 'xfrm0\x00', 'veth1_to_team\x00', 'veth0_to_team\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x17}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff], 0xce, 0xce, 0x11e, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x3, 0xc39c, 0x1, 0x3}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x7e, 0x7f, 0x1, 0x3}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00', {0x4}}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x5, 0x0, 0x805, 'veth1_virt_wifi\x00', 'veth0_to_team\x00', 'veth0_virt_wifi\x00', 'wg2\x00', @link_local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @random="bfebf6ef5a04", [0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x0, 0x5, 0xb6, 'bond_slave_0\x00', 'ip6gretap0\x00', 'vlan1\x00', 'ipvlan0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0xff, 0x0, 0x0, 0x101, 0xff], 0x6e, 0xce, 0x11e, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@STANDARD={'\x00', 0x8, {0x7ffffffffffffffb}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x6, {0x6}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x9, 0x28, 0x88f8, 'team_slave_0\x00', 'veth0_to_team\x00', 'netdevsim0\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x5fdce00250ce748b, 0xff], @multicast, [0xff, 0xff], 0x10e, 0x186, 0x1d6, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'nr0\x00', {}, 'team_slave_1\x00', {0xff}, 0x0, 0x3}}}, @cpu={{'cpu\x00', 0x0, 0x8}, {{0x2, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x3ff, 0xffff, 0x2, 0x0, 0x0, "54cd722c149c9950fcec64bde2e568cc50e0c3bd8a651f8d6e23db25868217196399ca979ae1b43ed2e67fa7d12d7bd81c67223be8459136266c1b97f5e04ea5"}}}], @common=@log={'log\x00', 0x28, {{0x40, "f5f20e820fc61d80b4e90812deaa28033a7b011a6c44e3821d5500026462", 0x4}}}}]}]}, 0x6fe) (async) 17:30:48 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:48 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa701000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 1: syz_emit_ethernet(0x127e, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000092e00c9e9288df14e4a952b38002bde4fba0a0b7f330e530fb52027"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x40200, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0xb, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x2, 0x6, 0x0, 0x110, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x3d}, @jmp={0x5, 0x1, 0x8, 0x6, 0x6, 0x1, 0x10}, @map, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}, @call={0x85, 0x0, 0x0, 0x9e}, @call={0x85, 0x0, 0x0, 0xa1}, @jmp={0x5, 0x1, 0xd, 0x1, 0x1, 0x80, 0x10}], &(0x7f00000000c0)='GPL\x00', 0x2af621d, 0x68, &(0x7f0000000100)=""/104, 0x41100, 0x1e, '\x00', 0x0, 0x16, r0, 0x8, &(0x7f0000000180)={0x5, 0x20000002}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x8, 0x1}, 0x10, 0x0, r1}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x5, 0x686, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000340), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x11, 0x24, 0x8035, 'dummy0\x00', 'team_slave_1\x00', 'netpci0\x00', 'macvtap0\x00', @multicast, [0xff, 0x0, 0xff, 0x7f, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0xff], 0x6e, 0x6e, 0xe6, [], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x1f, 0x2, 0x0, 0x0, "d36faa2f2d4b93f57c034b24b1c5b2fb6b744d8675b797d9615ea88dd59cd1d276839a5b1c3946adf528c3f08ec5ebbdb0a7333fd2f0c879650a67175367c6a2"}}}}, {0x5, 0x2e, 0x4, 'vxcan1\x00', 'xfrm0\x00', 'veth1_to_team\x00', 'veth0_to_team\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x17}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff], 0xce, 0xce, 0x11e, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x3, 0xc39c, 0x1, 0x3}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x7e, 0x7f, 0x1, 0x3}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00', {0x4}}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x5, 0x0, 0x805, 'veth1_virt_wifi\x00', 'veth0_to_team\x00', 'veth0_virt_wifi\x00', 'wg2\x00', @link_local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @random="bfebf6ef5a04", [0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x0, 0x5, 0xb6, 'bond_slave_0\x00', 'ip6gretap0\x00', 'vlan1\x00', 'ipvlan0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0xff, 0x0, 0x0, 0x101, 0xff], 0x6e, 0xce, 0x11e, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@STANDARD={'\x00', 0x8, {0x7ffffffffffffffb}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x6, {0x6}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x9, 0x28, 0x88f8, 'team_slave_0\x00', 'veth0_to_team\x00', 'netdevsim0\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x5fdce00250ce748b, 0xff], @multicast, [0xff, 0xff], 0x10e, 0x186, 0x1d6, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'nr0\x00', {}, 'team_slave_1\x00', {0xff}, 0x0, 0x3}}}, @cpu={{'cpu\x00', 0x0, 0x8}, {{0x2, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x3ff, 0xffff, 0x2, 0x0, 0x0, "54cd722c149c9950fcec64bde2e568cc50e0c3bd8a651f8d6e23db25868217196399ca979ae1b43ed2e67fa7d12d7bd81c67223be8459136266c1b97f5e04ea5"}}}], @common=@log={'log\x00', 0x28, {{0x40, "f5f20e820fc61d80b4e90812deaa28033a7b011a6c44e3821d5500026462", 0x4}}}}]}]}, 0x6fe) syz_emit_ethernet(0x127e, &(0x7f0000000a80)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaa2486dd64610c25124806ff200100000000000000000000000000010000000000000000000000000000000000070000000000000401800730000000020a09ff7f0100008000000000ff010000000000000500000000000000090000000000000009000000000000000001002b01000000000000040109040109c204000001ffff0037ffd19e01ca87f850d8bdaffa1fc6dcba9ddea2bd6a5658e622211f5279d331d69f070ceab8355d98520188a607b141448c3fa54dc6a8e532806ec72a6e93757652fa2c94dbaad36225593a09d351e8bc5ef22aba45411680e8a505ff7b3c934efff7d138c9bb113f3cc3cde2e4bc337f46882daaf789ab9ceef54b8d4cdbc796c59ab37de6a86dc403ba0d04423b95e3f2469a0663d86adfd81f44d07a1701fd67e153391f8c3fc9fa9fe69672f6f79c568bb523f5452015b215a78952f913e97d16071f5f6d03a0e838ea8d42e850bb9a4a617964323eac10a57fd7132db41938301af891ab88450e56f8cc823203a3435dd6c5bb73b6d97ace405851646a51a46101f5a151dc62cb621f4acfde2e9b3f9b5509a07aa5408f58601124aea1894ce73b7742dcc33883bb7a0a662647b944462ecf46820ea394b3824b5c786ffaf0729c86ca9f9cf3a4c3bf190fd84c5439825d70d806cff3a49636a28945b5f8a453067d4c1e604926cd0b189ec1c7c6ba0123036465688066b6836baef36b1700d5532c3cfc760a988e8b9591e87cac3526e47d506170ff7265ec3156885585bf05aee84e5249ed1d9c1a379d4d3125de89f04959c2d2d15b042638cc789e1ed058edbaa7f567b8dbafe96ddd237c278948a9730ed48d58df6eab24def333b7ec484cce52df61176ece58265016bc62a9929cdc2a916a44cf26b704f2964b0ecd088f79bd6d35162727238ab6b1aa3d2090f6dd630dddd06dafaecbb31ec75109988b689d1751dd8694414361d2856af83c6d8e35fa46b4f53550da9b25815066c11b05ce46e5ae0c9c57d3b733d546a3393a43ec6b24668049d802cf860f4b26d88428f8d157a7b153905669660053d6461071d3a404836b462085ebd09766cec7ebdc39c1fdba82ef5c8a1cf038f856a62319d5222ef77860b8f928065ecfa761bbc02723c39658ad6ebf823f45b378eac0f42965d33192229b9674319c311db0c2b9046b010f9528e70bf4fff8e5a6fe02e543539156ad263d3649a4ba42c13cc58f1b7c989113ed72ee6074d726fe864fb0a7bcbe3937b39ed33e52142343fcccbc686a5b65e3b6bc2afbea32a199822b85bfdd82e72bcfb07683c99a275427af554b66aec609573cf0b403da629b6a12ef9bdbc36282056c547115ebbe9b1234ff3abe40550bee02d30d9fc9c4ad3d87d67985205f7c4cf4a837228479a7a52edb94c8cdf0c89f93a7e0fd224fe77be124a39d11e7001165b5050af04c3a12be524d97dd873ee65087ab3389dcadfc96325e4765926d043bb8038cea296bf22dedb97216d3ba3879c7d2745b985205d293c7f717672c8f4ff8053837e9067e670c1289aff9ff9e3a3a583bf7563340b4261f6ceb68c6189496ff6017f9baf92a3fe1ba5d2ae439bcce1ec651ef68a6b915f08c7b0bf6ff1fc977b5fa962bac6e9d02f0a9dcd652eb3c207077f3ad3346267e3b3bb66a09ee88a3990902fa873dd37a27965e97153c8e9a00f1236ffd9bbe29d8bf8e35b57c1be4e7bbc6abe83964cffcf33230db2cbc6b2d77955037ee5f90a5020f7bc3f3f56958ad96cd3db64444ae9b4786a0d6ab59e25fa4099e8391e972993a9f776b47c6a84e2be872e47e3bf57b987b4155c6888a75e888a8a1f34d934cd2bd8fc0ecad2c84ef9ec901657943f6712fc4d7f2ecd9d38e62a5361958ded8971d923b484de1c08170d62dcb651e9ec8bbbde6b85e058b0e3017f03bb1160d1a3f2023260aefa1c51e1e1cede81c276d5723a3b18638586e9fde1300"], 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000092e00c9e9288df14e4a952b38002bde4fba0a0b7f330e530fb52027"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x40200, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0xb, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x2, 0x6, 0x0, 0x110, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x3d}, @jmp={0x5, 0x1, 0x8, 0x6, 0x6, 0x1, 0x10}, @map, @call={0x85, 0x0, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}, @call={0x85, 0x0, 0x0, 0x9e}, @call={0x85, 0x0, 0x0, 0xa1}, @jmp={0x5, 0x1, 0xd, 0x1, 0x1, 0x80, 0x10}], &(0x7f00000000c0)='GPL\x00', 0x2af621d, 0x68, &(0x7f0000000100)=""/104, 0x41100, 0x1e, '\x00', 0x0, 0x16, r0, 0x8, &(0x7f0000000180)={0x5, 0x20000002}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x6, 0x8, 0x1}, 0x10, 0x0, r1}, 0x78) (async) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x5, 0x686, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000340), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x11, 0x24, 0x8035, 'dummy0\x00', 'team_slave_1\x00', 'netpci0\x00', 'macvtap0\x00', @multicast, [0xff, 0x0, 0xff, 0x7f, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0xff], 0x6e, 0x6e, 0xe6, [], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x1f, 0x2, 0x0, 0x0, "d36faa2f2d4b93f57c034b24b1c5b2fb6b744d8675b797d9615ea88dd59cd1d276839a5b1c3946adf528c3f08ec5ebbdb0a7333fd2f0c879650a67175367c6a2"}}}}, {0x5, 0x2e, 0x4, 'vxcan1\x00', 'xfrm0\x00', 'veth1_to_team\x00', 'veth0_to_team\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x17}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff], 0xce, 0xce, 0x11e, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x3, 0xc39c, 0x1, 0x3}}}, @m802_3={{'802_3\x00', 0x0, 0x8}, {{0x7e, 0x7f, 0x1, 0x3}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00', {0x4}}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x5, 0x0, 0x805, 'veth1_virt_wifi\x00', 'veth0_to_team\x00', 'veth0_virt_wifi\x00', 'wg2\x00', @link_local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @random="bfebf6ef5a04", [0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x0, 0x5, 0xb6, 'bond_slave_0\x00', 'ip6gretap0\x00', 'vlan1\x00', 'ipvlan0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0xff, 0x0, 0x0, 0x101, 0xff], 0x6e, 0xce, 0x11e, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@STANDARD={'\x00', 0x8, {0x7ffffffffffffffb}}], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x6, {0x6}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x9, 0x28, 0x88f8, 'team_slave_0\x00', 'veth0_to_team\x00', 'netdevsim0\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x5fdce00250ce748b, 0xff], @multicast, [0xff, 0xff], 0x10e, 0x186, 0x1d6, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'nr0\x00', {}, 'team_slave_1\x00', {0xff}, 0x0, 0x3}}}, @cpu={{'cpu\x00', 0x0, 0x8}, {{0x2, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x3ff, 0xffff, 0x2, 0x0, 0x0, "54cd722c149c9950fcec64bde2e568cc50e0c3bd8a651f8d6e23db25868217196399ca979ae1b43ed2e67fa7d12d7bd81c67223be8459136266c1b97f5e04ea5"}}}], @common=@log={'log\x00', 0x28, {{0x40, "f5f20e820fc61d80b4e90812deaa28033a7b011a6c44e3821d5500026462", 0x4}}}}]}]}, 0x6fe) (async) 17:30:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x668d, 0x0}, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x3, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x1, 0x6, 0x6, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000005c0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x0, 0x47be127f, 0x2d}, 0x10, r1, r2}, 0x78) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa702000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000060000000000000700ecffffffffffffff0061302e000b5b7e085e2c2388dc6d03d7334870d0de21a00919f2b5b852e6f765365eef77b4bc41039e1b4e040cf92bda7c0f281ff3c81cd1d4c15ba01d7ea777d39ade2a6783a64dc76f231f99d5d946a68f684d4fef5ab9d97dd6748d695f184c294a927f06e4593b222f3ef43daa59545841039105c9c221828e45c30ab55dbdc989cf25ec8d3a4739351d0db9a1b5df7f9a2fda319d640c5f56f40df7cde45c1fd0c108db6954415b525fdf7ac7b9217f14143d4619988b006c9b4b"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000001c0)=0x60) (async) r1 = syz_open_dev$hidraw(&(0x7f0000000840), 0xc6, 0x0) write$hidraw(r1, 0x0, 0x0) (async) ioctl$HIDIOCGRDESC(r1, 0x90044802, &(0x7f00000005c0)={0x4e1, "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"}) (async) accept$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000280)=0x60) 17:30:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x668d, 0x0}, 0x8) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x3, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x1, 0x6, 0x6, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000005c0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x0, 0x47be127f, 0x2d}, 0x10, r1, r2}, 0x78) 17:30:49 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xc, 0x6, 0x3, 0xffff7a49, 0x708, 0x1, 0x81, '\x00', r0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x40) ioctl$HIDIOCGRAWPHYS(0xffffffffffffffff, 0x80404805, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@ipv4={""/10, ""/2, @empty}}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000000000)=0xe8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x20000145, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa703000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xc, 0x6, 0x3, 0xffff7a49, 0x708, 0x1, 0x81, '\x00', r0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x40) (async) ioctl$HIDIOCGRAWPHYS(0xffffffffffffffff, 0x80404805, &(0x7f0000000040)) (async) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@ipv4={""/10, ""/2, @empty}}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000000000)=0xe8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa704000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x20000164, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x668d, 0x0}, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x3, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x1, 0x6, 0x6, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000005c0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x0, 0x47be127f, 0x2d}, 0x10, r1, r2}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x668d}, 0x8) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x3, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x1, 0x6, 0x6, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000005c0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x0, 0x47be127f, 0x2d}, 0x10, r1, r2}, 0x78) (async) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x2000019a, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xc, 0x6, 0x3, 0xffff7a49, 0x708, 0x1, 0x81, '\x00', r0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x40) ioctl$HIDIOCGRAWPHYS(0xffffffffffffffff, 0x80404805, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@ipv4={""/10, ""/2, @empty}}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000000000)=0xe8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xc, 0x6, 0x3, 0xffff7a49, 0x708, 0x1, 0x81, '\x00', r0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x40) (async) ioctl$HIDIOCGRAWPHYS(0xffffffffffffffff, 0x80404805, &(0x7f0000000040)) (async) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@ipv4={""/10, ""/2, @empty}}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000000000)=0xe8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000f1ff000c0000000c0000000900e656c19b7d2ba96ef8f6dff3f4af333b0000060000000000000500000000000000000000613000fb1ced98ef56b1405c264372af8845f3a55dfd0665e745f8acbf354a70665628fb272136296335defc4e7eef5cbe00383da8ef85cca09fce102fb7c7bc5c2ff0a8506489313112673bdd8649862e4c9134e0866cb82953b8aa290c03283c0e5486de6d93327a4fc2e41a59f31c2481d38081038b7149391aefa9d486ba86da61c7e9b5c6a54804c363e3aa1aad277f620a0af05d71ff8e7954b2e28bdca6b102e8b32fbf3d3e0c01c1a966c0efba277aff5f64e8173513c2b7ea688aa6fde79c79d76f726c293fb0086ac90e773bf847bd67e76b16cb12ab6282c854895887f1c7c8a497090c0f44e13d2dd31bb684a1f3e218c3b38900d175cd2677ab2dad6f02b2dfbc06cedeb29be3d085fe55e9a871e52acd07157c17ca96c025c7dc5ff8ab60be050af98294ec4aef873d01662c01b4c058d06a2a33a5785e0a8f81db8a2e56c6c29eb8b3b4c3f50581352ac4cf74e57147ca438e2505e4b4d021a471fb483e9a"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa801000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xb, [@restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @var={0x9, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x2e, 0x2e, 0x2e, 0x0, 0x61, 0x0, 0x61, 0x61, 0x30]}}, &(0x7f00000000c0)=""/171, 0x3f, 0xab}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000f1ff000c0000000c0000000900e656c19b7d2ba96ef8f6dff3f4af333b0000060000000000000500000000000000000000613000fb1ced98ef56b1405c264372af8845f3a55dfd0665e745f8acbf354a70665628fb272136296335defc4e7eef5cbe00383da8ef85cca09fce102fb7c7bc5c2ff0a8506489313112673bdd8649862e4c9134e0866cb82953b8aa290c03283c0e5486de6d93327a4fc2e41a59f31c2481d38081038b7149391aefa9d486ba86da61c7e9b5c6a54804c363e3aa1aad277f620a0af05d71ff8e7954b2e28bdca6b102e8b32fbf3d3e0c01c1a966c0efba277aff5f64e8173513c2b7ea688aa6fde79c79d76f726c293fb0086ac90e773bf847bd67e76b16cb12ab6282c854895887f1c7c8a497090c0f44e13d2dd31bb684a1f3e218c3b38900d175cd2677ab2dad6f02b2dfbc06cedeb29be3d085fe55e9a871e52acd07157c17ca96c025c7dc5ff8ab60be050af98294ec4aef873d01662c01b4c058d06a2a33a5785e0a8f81db8a2e56c6c29eb8b3b4c3f50581352ac4cf74e57147ca438e2505e4b4d021a471fb483e9a"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa802000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xb, [@restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @var={0x9, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x2e, 0x2e, 0x2e, 0x0, 0x61, 0x0, 0x61, 0x61, 0x30]}}, &(0x7f00000000c0)=""/171, 0x3f, 0xab}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x4, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x40) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000240)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r1}, @generic={0xcc, 0x0, 0x8, 0x8, 0x2}, @generic={0x0, 0x7, 0x0, 0x9, 0xffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xa3}, @ldst={0x0, 0x1, 0x3, 0xb, 0x3, 0x1, 0x8}], &(0x7f00000002c0)='syzkaller\x00', 0xffffffcd, 0x1000, &(0x7f00000005c0)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x1, 0x4, 0x1000}, 0x10, 0xffffffffffffffff}, 0x78) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa803000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xb, [@restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @var={0x9, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x2e, 0x2e, 0x2e, 0x0, 0x61, 0x0, 0x61, 0x61, 0x30]}}, &(0x7f00000000c0)=""/171, 0x3f, 0xab}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xb, [@restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @var={0x9, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x2e, 0x2e, 0x2e, 0x0, 0x61, 0x0, 0x61, 0x61, 0x30]}}, &(0x7f00000000c0)=""/171, 0x3f, 0xab}, 0x20) (async) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, &(0x7f00000005c0)={0x491, "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"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0xb, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x0, 0x5f, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa804000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{0x2}, {0x0, 0x5, 0x7fff800}, {0x7, 0x5, 0x2}, {0xf, 0x4, 0x7}, {0x1, 0x1}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x65, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, &(0x7f00000005c0)={0x491, "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"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0xb, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x0, 0x5f, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x4, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x40) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000240)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r1}, @generic={0xcc, 0x0, 0x8, 0x8, 0x2}, @generic={0x0, 0x7, 0x0, 0x9, 0xffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xa3}, @ldst={0x0, 0x1, 0x3, 0xb, 0x3, 0x1, 0x8}], &(0x7f00000002c0)='syzkaller\x00', 0xffffffcd, 0x1000, &(0x7f00000005c0)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x1, 0x4, 0x1000}, 0x10, 0xffffffffffffffff}, 0x78) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x26, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{0x2}, {0x0, 0x5, 0x7fff800}, {0x7, 0x5, 0x2}, {0xf, 0x4, 0x7}, {0x1, 0x1}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x65, 0xe8, 0x1}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x25, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 2: ioctl$HIDIOCGRDESC(0xffffffffffffffff, 0x90044802, &(0x7f00000005c0)={0x491, "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"}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@ptr={0xb, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x0, 0x5f, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{0x2}, {0x0, 0x5, 0x7fff800}, {0x7, 0x5, 0x2}, {0xf, 0x4, 0x7}, {0x1, 0x1}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x65, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{0x2}, {0x0, 0x5, 0x7fff800}, {0x7, 0x5, 0x2}, {0xf, 0x4, 0x7}, {0x1, 0x1}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x65, 0xe8, 0x1}, 0x20) (async) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async, rerun: 32) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101300, 0x0) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x4, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x40) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000240)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r1}, @generic={0xcc, 0x0, 0x8, 0x8, 0x2}, @generic={0x0, 0x7, 0x0, 0x9, 0xffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xa3}, @ldst={0x0, 0x1, 0x3, 0xb, 0x3, 0x1, 0x8}], &(0x7f00000002c0)='syzkaller\x00', 0xffffffcd, 0x1000, &(0x7f00000005c0)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x1, 0x4, 0x1000}, 0x10, 0xffffffffffffffff}, 0x78) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x5b, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa901000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000040)=r0, 0x1) 17:30:49 executing program 1: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x0, [0x3, 0x6, 0xffdf]}, &(0x7f0000000240)=0x44) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000612e0085ab6390714ba8127fd638f3cc585e704d58ce3c87ca384787086df6466f1bff1b8ea39e95e3b22d82d33cc49eccef92d047d8942ab4dde3a19c44d8ebc89c627f04cf8d18b9c94db7cf2a481d9b8d3c98b021ed420c0fa23f570e6f4b87f757add642f8a0712199e25798b572e830aad572896becdbf4fc5279fb7d850c827586ce3ccd477bba8ebc0e62bad3f19aa81fd1f53b2df565e6898aa21784354a236d121328f76f08488f6a942e32141a948d2101337f63832574e0283079adf18014b90f"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000040)=r0, 0x1) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa902000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x0, [0x3, 0x6, 0xffdf]}, &(0x7f0000000240)=0x44) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000612e0085ab6390714ba8127fd638f3cc585e704d58ce3c87ca384787086df6466f1bff1b8ea39e95e3b22d82d33cc49eccef92d047d8942ab4dde3a19c44d8ebc89c627f04cf8d18b9c94db7cf2a481d9b8d3c98b021ed420c0fa23f570e6f4b87f757add642f8a0712199e25798b572e830aad572896becdbf4fc5279fb7d850c827586ce3ccd477bba8ebc0e62bad3f19aa81fd1f53b2df565e6898aa21784354a236d121328f76f08488f6a942e32141a948d2101337f63832574e0283079adf18014b90f"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) (async) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x0, [0x3, 0x6, 0xffdf]}, &(0x7f0000000240)=0x44) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000612e0085ab6390714ba8127fd638f3cc585e704d58ce3c87ca384787086df6466f1bff1b8ea39e95e3b22d82d33cc49eccef92d047d8942ab4dde3a19c44d8ebc89c627f04cf8d18b9c94db7cf2a481d9b8d3c98b021ed420c0fa23f570e6f4b87f757add642f8a0712199e25798b572e830aad572896becdbf4fc5279fb7d850c827586ce3ccd477bba8ebc0e62bad3f19aa81fd1f53b2df565e6898aa21784354a236d121328f76f08488f6a942e32141a948d2101337f63832574e0283079adf18014b90f"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x22602, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @void, @llc={@snap={0x0, 0xaa, 'n', "4dbe69", 0x16, "1b7a2713480842c275c5ea884eda6c594f521f94ecef26de5d70427aa8449ac06ced3d27c7d3e59bfb2c734c0cd3333b95307cd2c8a86545c0f07580355a9d76531af99ba24f6c11664813f565aed6f58a3c19612f488b6bcf4632bbf6c50b0b51689c68c0567157e23fbeb76d214b54655ee0610255f4"}}}, 0x7f) syz_io_uring_setup(0x7a8a, &(0x7f0000000140)={0x0, 0x4351, 0x2, 0x2, 0x1c2}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000040)=r0, 0x1) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x0, [0x3, 0x6, 0xffdf]}, &(0x7f0000000240)=0x44) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000612e0085ab6390714ba8127fd638f3cc585e704d58ce3c87ca384787086df6466f1bff1b8ea39e95e3b22d82d33cc49eccef92d047d8942ab4dde3a19c44d8ebc89c627f04cf8d18b9c94db7cf2a481d9b8d3c98b021ed420c0fa23f570e6f4b87f757add642f8a0712199e25798b572e830aad572896becdbf4fc5279fb7d850c827586ce3ccd477bba8ebc0e62bad3f19aa81fd1f53b2df565e6898aa21784354a236d121328f76f08488f6a942e32141a948d2101337f63832574e0283079adf18014b90f"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) (async) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x0, [0x3, 0x6, 0xffdf]}, &(0x7f0000000240)=0x44) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000000000001000005000000000200000000000000000000000000612e0085ab6390714ba8127fd638f3cc585e704d58ce3c87ca384787086df6466f1bff1b8ea39e95e3b22d82d33cc49eccef92d047d8942ab4dde3a19c44d8ebc89c627f04cf8d18b9c94db7cf2a481d9b8d3c98b021ed420c0fa23f570e6f4b87f757add642f8a0712199e25798b572e830aad572896becdbf4fc5279fb7d850c827586ce3ccd477bba8ebc0e62bad3f19aa81fd1f53b2df565e6898aa21784354a236d121328f76f08488f6a942e32141a948d2101337f63832574e0283079adf18014b90f"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x1b, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x22602, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @void, @llc={@snap={0x0, 0xaa, 'n', "4dbe69", 0x16, "1b7a2713480842c275c5ea884eda6c594f521f94ecef26de5d70427aa8449ac06ced3d27c7d3e59bfb2c734c0cd3333b95307cd2c8a86545c0f07580355a9d76531af99ba24f6c11664813f565aed6f58a3c19612f488b6bcf4632bbf6c50b0b51689c68c0567157e23fbeb76d214b54655ee0610255f4"}}}, 0x7f) (async) syz_io_uring_setup(0x7a8a, &(0x7f0000000140)={0x0, 0x4351, 0x2, 0x2, 0x1c2}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa904000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x1b, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x1b, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) (async) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x22602, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @void, @llc={@snap={0x0, 0xaa, 'n', "4dbe69", 0x16, "1b7a2713480842c275c5ea884eda6c594f521f94ecef26de5d70427aa8449ac06ced3d27c7d3e59bfb2c734c0cd3333b95307cd2c8a86545c0f07580355a9d76531af99ba24f6c11664813f565aed6f58a3c19612f488b6bcf4632bbf6c50b0b51689c68c0567157e23fbeb76d214b54655ee0610255f4"}}}, 0x7f) syz_io_uring_setup(0x7a8a, &(0x7f0000000140)={0x0, 0x4351, 0x2, 0x2, 0x1c2}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x1b, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x1b, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) (async) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6, 0x0, 0x0, 0x5, 0x0, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0xfffffffffffffffc, 0xe8, 0x1}, 0x20) pidfd_open(0x0, 0x0) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0xa, [@union={0x6, 0x0, 0x0, 0x7, 0x0, 0x2}, @typedef={0x2, 0x0, 0x0, 0x8, 0x4}, @struct={0x9, 0x3, 0x0, 0x4, 0x0, 0x7, [{0x1, 0x3, 0x4}, {0xc, 0x4, 0x5fa}, {0xf, 0x2, 0x2}]}, @enum={0x5, 0x1, 0x0, 0x6, 0x4, [{0xb, 0xe1}]}, @typedef={0x9, 0x0, 0x0, 0x8, 0x4}, @const={0xe, 0x0, 0x0, 0xa, 0x2}, @const={0x10}, @volatile={0xd, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x0, 0x0, 0x61, 0x5f, 0x0, 0x61, 0x0, 0x2e]}}, &(0x7f00000004c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f00000000c0)='reno\x00', 0x5) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe7, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6, 0x0, 0x0, 0x5, 0x0, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0xfffffffffffffffc, 0xe8, 0x1}, 0x20) (async, rerun: 32) pidfd_open(0x0, 0x0) (rerun: 32) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0xa, [@union={0x6, 0x0, 0x0, 0x7, 0x0, 0x2}, @typedef={0x2, 0x0, 0x0, 0x8, 0x4}, @struct={0x9, 0x3, 0x0, 0x4, 0x0, 0x7, [{0x1, 0x3, 0x4}, {0xc, 0x4, 0x5fa}, {0xf, 0x2, 0x2}]}, @enum={0x5, 0x1, 0x0, 0x6, 0x4, [{0xb, 0xe1}]}, @typedef={0x9, 0x0, 0x0, 0x8, 0x4}, @const={0xe, 0x0, 0x0, 0xa, 0x2}, @const={0x10}, @volatile={0xd, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x0, 0x0, 0x61, 0x5f, 0x0, 0x61, 0x0, 0x2e]}}, &(0x7f00000004c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f00000000c0)='reno\x00', 0x5) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6, 0x0, 0x0, 0x5, 0x0, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0xfffffffffffffffc, 0xe8, 0x1}, 0x20) (async) pidfd_open(0x0, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x7, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x0, 0xc, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x8, 0x2, 0xa, 0x40}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xfd, &(0x7f00000000c0)=""/253, 0x40e00, 0x10, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000200)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xc, 0x6, 0x2}, 0x10, r1}, 0x78) 17:30:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0xa, [@union={0x6, 0x0, 0x0, 0x7, 0x0, 0x2}, @typedef={0x2, 0x0, 0x0, 0x8, 0x4}, @struct={0x9, 0x3, 0x0, 0x4, 0x0, 0x7, [{0x1, 0x3, 0x4}, {0xc, 0x4, 0x5fa}, {0xf, 0x2, 0x2}]}, @enum={0x5, 0x1, 0x0, 0x6, 0x4, [{0xb, 0xe1}]}, @typedef={0x9, 0x0, 0x0, 0x8, 0x4}, @const={0xe, 0x0, 0x0, 0xa, 0x2}, @const={0x10}, @volatile={0xd, 0x0, 0x0, 0x9, 0x1}]}, {0x0, [0x0, 0x0, 0x61, 0x5f, 0x0, 0x61, 0x0, 0x2e]}}, &(0x7f00000004c0)=""/232, 0xae, 0xe8, 0x1}, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f00000000c0)='reno\x00', 0x5) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9}, 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) (async) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x7, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x0, 0xc, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x8, 0x2, 0xa, 0x40}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xfd, &(0x7f00000000c0)=""/253, 0x40e00, 0x10, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000200)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xc, 0x6, 0x2}, 0x10, r1}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x7}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x0, 0xc, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x8, 0x2, 0xa, 0x40}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xfd, &(0x7f00000000c0)=""/253, 0x40e00, 0x10, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000200)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xc, 0x6, 0x2}, 0x10, r1}, 0x78) (async) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 0: pidfd_send_signal(0xffffffffffffffff, 0x18, &(0x7f0000000380)={0x25, 0x7ff, 0x10000}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000004040)=0xe8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x3, [@volatile={0xd}, @fwd={0x7f88}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0x4, 0x4}, {0xd, 0x5}, {0xa, 0x5}, {0xd, 0x3}, {0xc, 0x5}, {0x1, 0x1}, {0x1, 0x2}, {0x0, 0x5}, {0x7, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f00000001c0)=""/155, 0x8f, 0x9b}, 0x20) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000340), 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x10, 0x6, 0x0, 0x4, 0x1, r1, 0x1, '\x00', r0, r2, 0x3, 0x4, 0x4}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x1e, 0x4, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x3, 0x0, 0x5, 0x2}, @call={0x85, 0x0, 0x0, 0x3f}, @map={0x18, 0x8, 0x1, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x10, '\x00', r0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000004080)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000040c0)={0x5, 0x9, 0x81, 0x8}, 0x10, 0xffffffffffffffff}, 0x78) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x7, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x0, 0xc, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x8, 0x2, 0xa, 0x40}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xfd, &(0x7f00000000c0)=""/253, 0x40e00, 0x10, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000200)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xc, 0x6, 0x2}, 0x10, r1}, 0x78) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 0: pidfd_send_signal(0xffffffffffffffff, 0x18, &(0x7f0000000380)={0x25, 0x7ff, 0x10000}, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x00') (async) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000004040)=0xe8) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x3, [@volatile={0xd}, @fwd={0x7f88}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0x4, 0x4}, {0xd, 0x5}, {0xa, 0x5}, {0xd, 0x3}, {0xc, 0x5}, {0x1, 0x1}, {0x1, 0x2}, {0x0, 0x5}, {0x7, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f00000001c0)=""/155, 0x8f, 0x9b}, 0x20) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000340), 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x10, 0x6, 0x0, 0x4, 0x1, r1, 0x1, '\x00', r0, r2, 0x3, 0x4, 0x4}, 0x40) (async) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x1e, 0x4, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x3, 0x0, 0x5, 0x2}, @call={0x85, 0x0, 0x0, 0x3f}, @map={0x18, 0x8, 0x1, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x10, '\x00', r0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000004080)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000040c0)={0x5, 0x9, 0x81, 0x8}, 0x10, 0xffffffffffffffff}, 0x78) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$HIDIOCGRDESCSIZE(0xffffffffffffffff, 0x80044801, &(0x7f0000000000)) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 1: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x80000, 0x1}, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="cce872ea0ad9de3006000000000000000c0000000500006b52161a46000320000000e0ff08800000000000612e00b03a917a4980cdc185f7acaa35d23d4fd111f0a76f0ed61c6b3f8d3958a100e5779db04d1a24575cdc5d8b000c1e004eeb46561763a70374c2f7b02c2cf1a8b230926a86241e8c64bb30ae660bfad91b91cd4e64ab81ae36f86a9de9fe4340ab4ac29f722bbec55b2c825f570483a42c6ae3"], &(0x7f00000004c0)=""/232, 0x29, 0x10e, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x1bfd80, 0x0) write$tun(r0, 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) epoll_pwait(r0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0xc69, &(0x7f0000000240)={[0x4]}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) 17:30:49 executing program 0: pidfd_send_signal(0xffffffffffffffff, 0x18, &(0x7f0000000380)={0x25, 0x7ff, 0x10000}, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x00') (async) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000004040)=0xe8) (async, rerun: 32) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) (async, rerun: 32) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x3, [@volatile={0xd}, @fwd={0x7f88}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0x4, 0x4}, {0xd, 0x5}, {0xa, 0x5}, {0xd, 0x3}, {0xc, 0x5}, {0x1, 0x1}, {0x1, 0x2}, {0x0, 0x5}, {0x7, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f00000001c0)=""/155, 0x8f, 0x9b}, 0x20) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000340), 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x10, 0x6, 0x0, 0x4, 0x1, r1, 0x1, '\x00', r0, r2, 0x3, 0x4, 0x4}, 0x40) (async) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x1e, 0x4, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x3, 0x0, 0x5, 0x2}, @call={0x85, 0x0, 0x0, 0x3f}, @map={0x18, 0x8, 0x1, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x10, '\x00', r0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000004080)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000040c0)={0x5, 0x9, 0x81, 0x8}, 0x10, 0xffffffffffffffff}, 0x78) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$HIDIOCGRDESCSIZE(0xffffffffffffffff, 0x80044801, &(0x7f0000000000)) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$HIDIOCGRDESCSIZE(0xffffffffffffffff, 0x80044801, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) ioctl$HIDIOCGRDESCSIZE(0xffffffffffffffff, 0x80044801, &(0x7f0000000000)) (async) 17:30:49 executing program 1: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x80000, 0x1}, 0x6) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="cce872ea0ad9de3006000000000000000c0000000500006b52161a46000320000000e0ff08800000000000612e00b03a917a4980cdc185f7acaa35d23d4fd111f0a76f0ed61c6b3f8d3958a100e5779db04d1a24575cdc5d8b000c1e004eeb46561763a70374c2f7b02c2cf1a8b230926a86241e8c64bb30ae660bfad91b91cd4e64ab81ae36f86a9de9fe4340ab4ac29f722bbec55b2c825f570483a42c6ae3"], &(0x7f00000004c0)=""/232, 0x29, 0x10e, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x1bfd80, 0x0) write$tun(r0, 0x0, 0x0) (async) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) epoll_pwait(r0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0xc69, &(0x7f0000000240)={[0x4]}, 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xfffffffffffffe43, 0x2}}, &(0x7f00000004c0)=""/218, 0x1a, 0xda, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8864}, @val={0x1, 0x1, 0x8000, 0x7, 0x9, 0x5}, @eth={@random="92012651bf99", @remote, @val={@val={0x9100, 0x5, 0x1}, {0x8100, 0x0, 0x1, 0x4}}, {@generic={0x80f3, "ebb630657f62f57940848cdbe395fceb26ef54749ca7f169295a6e61c4aae2377ee87979664b7883991719bb4e1601f214974da051b26efbb819ec4041378ae49a597d756de85cb984c76e12073d7cdff551dc260cb6a30b01da7ec4910c6f06cac13d3a2d60c92edd730cb800e94b71642f8d7436cf9a7d9a4406876b3f24c50c"}}}}, 0xa5) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/244, 0x22, 0xf4, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x10}) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xfffffffffffffe43, 0x2}}, &(0x7f00000004c0)=""/218, 0x1a, 0xda, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) (async) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8864}, @val={0x1, 0x1, 0x8000, 0x7, 0x9, 0x5}, @eth={@random="92012651bf99", @remote, @val={@val={0x9100, 0x5, 0x1}, {0x8100, 0x0, 0x1, 0x4}}, {@generic={0x80f3, "ebb630657f62f57940848cdbe395fceb26ef54749ca7f169295a6e61c4aae2377ee87979664b7883991719bb4e1601f214974da051b26efbb819ec4041378ae49a597d756de85cb984c76e12073d7cdff551dc260cb6a30b01da7ec4910c6f06cac13d3a2d60c92edd730cb800e94b71642f8d7436cf9a7d9a4406876b3f24c50c"}}}}, 0xa5) 17:30:49 executing program 1: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x80000, 0x1}, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="cce872ea0ad9de3006000000000000000c0000000500006b52161a46000320000000e0ff08800000000000612e00b03a917a4980cdc185f7acaa35d23d4fd111f0a76f0ed61c6b3f8d3958a100e5779db04d1a24575cdc5d8b000c1e004eeb46561763a70374c2f7b02c2cf1a8b230926a86241e8c64bb30ae660bfad91b91cd4e64ab81ae36f86a9de9fe4340ab4ac29f722bbec55b2c825f570483a42c6ae3"], &(0x7f00000004c0)=""/232, 0x29, 0x10e, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x1bfd80, 0x0) write$tun(r0, 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) epoll_pwait(r0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0xc69, &(0x7f0000000240)={[0x4]}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x80000, 0x1}, 0x6) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="cce872ea0ad9de3006000000000000000c0000000500006b52161a46000320000000e0ff08800000000000612e00b03a917a4980cdc185f7acaa35d23d4fd111f0a76f0ed61c6b3f8d3958a100e5779db04d1a24575cdc5d8b000c1e004eeb46561763a70374c2f7b02c2cf1a8b230926a86241e8c64bb30ae660bfad91b91cd4e64ab81ae36f86a9de9fe4340ab4ac29f722bbec55b2c825f570483a42c6ae3"], &(0x7f00000004c0)=""/232, 0x29, 0x10e, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x1bfd80, 0x0) (async) write$tun(r0, 0x0, 0x0) (async) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) (async) epoll_pwait(r0, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0xc69, &(0x7f0000000240)={[0x4]}, 0x8) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) (async) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) (async) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xfffffffffffffe43, 0x2}}, &(0x7f00000004c0)=""/218, 0x1a, 0xda, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8864}, @val={0x1, 0x1, 0x8000, 0x7, 0x9, 0x5}, @eth={@random="92012651bf99", @remote, @val={@val={0x9100, 0x5, 0x1}, {0x8100, 0x0, 0x1, 0x4}}, {@generic={0x80f3, "ebb630657f62f57940848cdbe395fceb26ef54749ca7f169295a6e61c4aae2377ee87979664b7883991719bb4e1601f214974da051b26efbb819ec4041378ae49a597d756de85cb984c76e12073d7cdff551dc260cb6a30b01da7ec4910c6f06cac13d3a2d60c92edd730cb800e94b71642f8d7436cf9a7d9a4406876b3f24c50c"}}}}, 0xa5) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x9, &(0x7f00000000c0)=""/251, &(0x7f0000000000)=0xfb) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/244, 0x22, 0xf4, 0x1}, 0x20) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x10}) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0x5, 0xc01) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000100)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0x2, 0x3}, {0x6, 0x2}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000140)=""/232, 0x20, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="73656a1240f48e81c765ac3c9e74dc1bfd726375726974790000000000000000000000000000000000000000000000000200"/72], 0x48) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x9, &(0x7f00000000c0)=""/251, &(0x7f0000000000)=0xfb) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0x5, 0xc01) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000100)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0x2, 0x3}, {0x6, 0x2}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000140)=""/232, 0x20, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="73656a1240f48e81c765ac3c9e74dc1bfd726375726974790000000000000000000000000000000000000000000000000200"/72], 0x48) syz_open_dev$hidraw(&(0x7f00000000c0), 0x5, 0xc01) (async) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000100)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0x2, 0x3}, {0x6, 0x2}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000140)=""/232, 0x20, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r1, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="73656a1240f48e81c765ac3c9e74dc1bfd726375726974790000000000000000000000000000000000000000000000000200"/72], 0x48) (async) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/244, 0x22, 0xf4, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x10}) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async, rerun: 64) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x9, &(0x7f00000000c0)=""/251, &(0x7f0000000000)=0xfb) (rerun: 64) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0x5, 0xc01) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000100)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0x2, 0x3}, {0x6, 0x2}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000140)=""/232, 0x20, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="73656a1240f48e81c765ac3c9e74dc1bfd726375726974790000000000000000000000000000000000000000000000000200"/72], 0x48) syz_open_dev$hidraw(&(0x7f00000000c0), 0x5, 0xc01) (async) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000100)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0x2, 0x3}, {0x6, 0x2}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000140)=""/232, 0x20, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r1, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="73656a1240f48e81c765ac3c9e74dc1bfd726375726974790000000000000000000000000000000000000000000000000200"/72], 0x48) (async) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x26, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @alu={0x4, 0x1, 0x0, 0x6, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}, @map={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x3e}, @call={0x85, 0x0, 0x0, 0xad}, @generic={0xad, 0x8, 0x1, 0x0, 0x100}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000140)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x5, 0x80000000, 0x3}, 0x10, 0x0, r1}, 0x78) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2600, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x240100, 0x0) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000040)) connect$nfc_raw(r0, &(0x7f0000000180)={0x27, 0x0, 0x1, 0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000050000000000e7000000000043045e020000"], &(0x7f00000001c0)=""/243, 0xfffffffffffffdfc, 0xe8, 0x1}, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400), 0x800, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0xc0, 0x0) write$hidraw(r1, &(0x7f0000000340)="e43c8b3483d5306110a63aeaa8b5ec329f1b05460c77c4ea9439b95ceafb3f0c194b69a22275569a2fa629d7f1332b751144fcc7e12256c8d5fb6dd0291554c97195a3304267a15ddec939c3ea06783dbb5ff3a1528af1afa216f8a7170c45336308e17f127d2678221118e998217a195ca3be151f8003ec63d9b0dc7f799bba499aaf1cc20016ab6b8263133b3aec4d76acd67146dc4ebcaa651e3b8cae2f4d94dd1760a893c593418be20845f6", 0xae) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x6, {{0x2, 0x4e23, @broadcast}}}, 0x88) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xffffffffffffffff) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xa}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x93, 0xe8, 0x1}, 0x20) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @alu={0x4, 0x1, 0x0, 0x6, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}, @map={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x3e}, @call={0x85, 0x0, 0x0, 0xad}, @generic={0xad, 0x8, 0x1, 0x0, 0x100}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000140)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x5, 0x80000000, 0x3}, 0x10, 0x0, r1}, 0x78) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x240100, 0x0) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000040)) connect$nfc_raw(r0, &(0x7f0000000180)={0x27, 0x0, 0x1, 0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000050000000000e7000000000043045e020000"], &(0x7f00000001c0)=""/243, 0xfffffffffffffdfc, 0xe8, 0x1}, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400), 0x800, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0xc0, 0x0) write$hidraw(r1, &(0x7f0000000340)="e43c8b3483d5306110a63aeaa8b5ec329f1b05460c77c4ea9439b95ceafb3f0c194b69a22275569a2fa629d7f1332b751144fcc7e12256c8d5fb6dd0291554c97195a3304267a15ddec939c3ea06783dbb5ff3a1528af1afa216f8a7170c45336308e17f127d2678221118e998217a195ca3be151f8003ec63d9b0dc7f799bba499aaf1cc20016ab6b8263133b3aec4d76acd67146dc4ebcaa651e3b8cae2f4d94dd1760a893c593418be20845f6", 0xae) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x6, {{0x2, 0x4e23, @broadcast}}}, 0x88) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xffffffffffffffff) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x240100, 0x0) (async) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000040)) (async) connect$nfc_raw(r0, &(0x7f0000000180)={0x27, 0x0, 0x1, 0x1}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000050000000000e7000000000043045e020000"], &(0x7f00000001c0)=""/243, 0xfffffffffffffdfc, 0xe8, 0x1}, 0x20) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400), 0x800, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0xc0, 0x0) (async) write$hidraw(r1, &(0x7f0000000340)="e43c8b3483d5306110a63aeaa8b5ec329f1b05460c77c4ea9439b95ceafb3f0c194b69a22275569a2fa629d7f1332b751144fcc7e12256c8d5fb6dd0291554c97195a3304267a15ddec939c3ea06783dbb5ff3a1528af1afa216f8a7170c45336308e17f127d2678221118e998217a195ca3be151f8003ec63d9b0dc7f799bba499aaf1cc20016ab6b8263133b3aec4d76acd67146dc4ebcaa651e3b8cae2f4d94dd1760a893c593418be20845f6", 0xae) (async) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x6, {{0x2, 0x4e23, @broadcast}}}, 0x88) (async) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xffffffffffffffff) (async) 17:30:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @alu={0x4, 0x1, 0x0, 0x6, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}, @map={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x3e}, @call={0x85, 0x0, 0x0, 0xad}, @generic={0xad, 0x8, 0x1, 0x0, 0x100}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000140)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x5, 0x80000000, 0x3}, 0x10, 0x0, r1}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @alu={0x4, 0x1, 0x0, 0x6, 0x3, 0xfffffffffffffff0, 0xfffffffffffffffc}, @map={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x3e}, @call={0x85, 0x0, 0x0, 0xad}, @generic={0xad, 0x8, 0x1, 0x0, 0x100}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000140)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x5, 0x80000000, 0x3}, 0x10, 0x0, r1}, 0x78) (async) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xa}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x93, 0xe8, 0x1}, 0x20) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x240100, 0x0) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000040)) connect$nfc_raw(r0, &(0x7f0000000180)={0x27, 0x0, 0x1, 0x1}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000050000000000e7000000000043045e020000"], &(0x7f00000001c0)=""/243, 0xfffffffffffffdfc, 0xe8, 0x1}, 0x20) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400), 0x800, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0xc0, 0x0) write$hidraw(r1, &(0x7f0000000340)="e43c8b3483d5306110a63aeaa8b5ec329f1b05460c77c4ea9439b95ceafb3f0c194b69a22275569a2fa629d7f1332b751144fcc7e12256c8d5fb6dd0291554c97195a3304267a15ddec939c3ea06783dbb5ff3a1528af1afa216f8a7170c45336308e17f127d2678221118e998217a195ca3be151f8003ec63d9b0dc7f799bba499aaf1cc20016ab6b8263133b3aec4d76acd67146dc4ebcaa651e3b8cae2f4d94dd1760a893c593418be20845f6", 0xae) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x6, {{0x2, 0x4e23, @broadcast}}}, 0x88) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xffffffffffffffff) 17:30:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xa}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x93, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @local}, 0x10, 0x800) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 0: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000005c0)={0x9, {{0x2, 0x4e20, @multicast2}}, 0x0, 0x7, [{{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3c}}}, {{0x2, 0x4e24, @rand_addr=0x64010101}}, {{0x2, 0x4e20, @private=0xa010100}}, {{0x2, 0x4e22, @rand_addr=0x64010101}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e21, @empty}}]}, 0x410) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @local}, 0x10, 0x800) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10) (async) socket$vsock_stream(0x28, 0x1, 0x0) 17:30:50 executing program 0: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000005c0)={0x9, {{0x2, 0x4e20, @multicast2}}, 0x0, 0x7, [{{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3c}}}, {{0x2, 0x4e24, @rand_addr=0x64010101}}, {{0x2, 0x4e20, @private=0xa010100}}, {{0x2, 0x4e22, @rand_addr=0x64010101}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e21, @empty}}]}, 0x410) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xec, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @local}, 0x10, 0x800) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x9, 0x3, 0x8, 0x0, 0x0, 0x5, 0x30100, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0xf20b, 0x80000000}, 0x7000, 0x3, 0x80000001, 0x7, 0x6, 0x1a0a, 0x7, 0x0, 0x10000, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) 17:30:50 executing program 0: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000005c0)={0x9, {{0x2, 0x4e20, @multicast2}}, 0x0, 0x7, [{{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3c}}}, {{0x2, 0x4e24, @rand_addr=0x64010101}}, {{0x2, 0x4e20, @private=0xa010100}}, {{0x2, 0x4e22, @rand_addr=0x64010101}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e21, @empty}}]}, 0x410) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000005c0)={0x9, {{0x2, 0x4e20, @multicast2}}, 0x0, 0x7, [{{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3c}}}, {{0x2, 0x4e24, @rand_addr=0x64010101}}, {{0x2, 0x4e20, @private=0xa010100}}, {{0x2, 0x4e22, @rand_addr=0x64010101}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e21, @empty}}]}, 0x410) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xc, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x6, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xd670}, [@jmp={0x5, 0x0, 0x4, 0xb, 0x2, 0x6, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x898}, @jmp={0x5, 0x0, 0x5, 0xb, 0x6, 0xffffffffffffffe0, 0xffffffffffffffff}]}, &(0x7f0000000040)='syzkaller\x00', 0x7768, 0x0, &(0x7f00000000c0), 0x41100, 0xd, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x6, 0x2d2}, 0x10, r1}, 0x78) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x9, 0x3, 0x8, 0x0, 0x0, 0x5, 0x30100, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0xf20b, 0x80000000}, 0x7000, 0x3, 0x80000001, 0x7, 0x6, 0x1a0a, 0x7, 0x0, 0x10000, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x6, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xd670}, [@jmp={0x5, 0x0, 0x4, 0xb, 0x2, 0x6, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x898}, @jmp={0x5, 0x0, 0x5, 0xb, 0x6, 0xffffffffffffffe0, 0xffffffffffffffff}]}, &(0x7f0000000040)='syzkaller\x00', 0x7768, 0x0, &(0x7f00000000c0), 0x41100, 0xd, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x6, 0x2d2}, 0x10, r1}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r0, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x6}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xd670}, [@jmp={0x5, 0x0, 0x4, 0xb, 0x2, 0x6, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x898}, @jmp={0x5, 0x0, 0x5, 0xb, 0x6, 0xffffffffffffffe0, 0xffffffffffffffff}]}, &(0x7f0000000040)='syzkaller\x00', 0x7768, 0x0, &(0x7f00000000c0), 0x41100, 0xd, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x6, 0x2d2}, 0x10, r1}, 0x78) (async) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe700, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) (async) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x9, 0x3, 0x8, 0x0, 0x0, 0x5, 0x30100, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0xf20b, 0x80000000}, 0x7000, 0x3, 0x80000001, 0x7, 0x6, 0x1a0a, 0x7, 0x0, 0x10000, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x6, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xd670}, [@jmp={0x5, 0x0, 0x4, 0xb, 0x2, 0x6, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x898}, @jmp={0x5, 0x0, 0x5, 0xb, 0x6, 0xffffffffffffffe0, 0xffffffffffffffff}]}, &(0x7f0000000040)='syzkaller\x00', 0x7768, 0x0, &(0x7f00000000c0), 0x41100, 0xd, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x6, 0x2d2}, 0x10, r1}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r0, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x6}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xd670}, [@jmp={0x5, 0x0, 0x4, 0xb, 0x2, 0x6, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x898}, @jmp={0x5, 0x0, 0x5, 0xb, 0x6, 0xffffffffffffffe0, 0xffffffffffffffff}]}, &(0x7f0000000040)='syzkaller\x00', 0x7768, 0x0, &(0x7f00000000c0), 0x41100, 0xd, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x6, 0x2d2}, 0x10, r1}, 0x78) (async) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x3e, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a0000ff0f000000000000070000000000000007000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) read$eventfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000240)='memory.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r0, &(0x7f0000000280)={'some', 0x20, 0x8, 0x20, 0x6}, 0x2f) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="abeb01001800008000f100000c0000000c000700000000000000050000000f0000000000000c25000000002e30610014782b91ee3b3d1fc36e33294779d94600bfee0e96354b0c"], &(0x7f0000000040)=""/55, 0x29, 0x37}, 0x20) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x101, 0x0, 0x6, 0x502}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000200)={0x1, 0xfffff000, 0x101, 0x6, 0x4}) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x668d, 0x0}, 0x8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x3, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x1, 0x6, 0x6, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000005c0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f00000000c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x0, 0x47be127f, 0x2d}, 0x10, r1, r2}, 0x78) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x31, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a0000ff0f000000000000070000000000000007000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) read$eventfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000240)='memory.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r0, &(0x7f0000000280)={'some', 0x20, 0x8, 0x20, 0x6}, 0x2f) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="abeb01001800008000f100000c0000000c000700000000000000050000000f0000000000000c25000000002e30610014782b91ee3b3d1fc36e33294779d94600bfee0e96354b0c"], &(0x7f0000000040)=""/55, 0x29, 0x37}, 0x20) (async) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x101, 0x0, 0x6, 0x502}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000200)={0x1, 0xfffff000, 0x101, 0x6, 0x4}) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x31, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x31, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x31, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x31, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a0000ff0f000000000000070000000000000007000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) read$eventfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) r0 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000240)='memory.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r0, &(0x7f0000000280)={'some', 0x20, 0x8, 0x20, 0x6}, 0x2f) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="abeb01001800008000f100000c0000000c000700000000000000050000000f0000000000000c25000000002e30610014782b91ee3b3d1fc36e33294779d94600bfee0e96354b0c"], &(0x7f0000000040)=""/55, 0x29, 0x37}, 0x20) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x101, 0x0, 0x6, 0x502}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000200)={0x1, 0xfffff000, 0x101, 0x6, 0x4}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a0000ff0f000000000000070000000000000007000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) read$eventfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000240)='memory.pressure\x00', 0x2, 0x0) (async) write$cgroup_pressure(r0, &(0x7f0000000280)={'some', 0x20, 0x8, 0x20, 0x6}, 0x2f) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="abeb01001800008000f100000c0000000c000700000000000000050000000f0000000000000c25000000002e30610014782b91ee3b3d1fc36e33294779d94600bfee0e96354b0c"], &(0x7f0000000040)=""/55, 0x29, 0x37}, 0x20) (async) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x101, 0x0, 0x6, 0x502}) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) (async) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000200)={0x1, 0xfffff000, 0x101, 0x6, 0x4}) (async) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0xfffffffe, 0x0}, 0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000200)={'raw\x00', 0x0, [0x4, 0x4, 0x2, 0x7d29, 0x80]}, &(0x7f0000000040)=0x54) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="89ef8c5add000e19199234692215040fa410803be4588c26bc72cd6fce7bd5e334fa1b7b6240d8c1b69f00fab15948eedf4e4aeefb77defbddb415cae3c222e9be250500229956a0ab6317a75f09204bce112dc71f856bf34517b4f41ae8049afbda1b479b3f96113fd834878c4c809c198bd3775ec968d3a2", @ANYRES32=r1, @ANYBLOB="00000000ed0000007b500000100000009500000000000000ccb8000101000000"], &(0x7f00000002c0)='syzkaller\x00', 0x40, 0xfffffffffffffe5b, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x6, r0, 0x8, &(0x7f00000000c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x8, 0x7fffffff, 0xfffffffd}, 0x10, r2}, 0x78) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb001000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/225, 0x22, 0xe1, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:30:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0xfffffffe, 0x0}, 0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000200)={'raw\x00', 0x0, [0x4, 0x4, 0x2, 0x7d29, 0x80]}, &(0x7f0000000040)=0x54) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="89ef8c5add000e19199234692215040fa410803be4588c26bc72cd6fce7bd5e334fa1b7b6240d8c1b69f00fab15948eedf4e4aeefb77defbddb415cae3c222e9be250500229956a0ab6317a75f09204bce112dc71f856bf34517b4f41ae8049afbda1b479b3f96113fd834878c4c809c198bd3775ec968d3a2", @ANYRES32=r1, @ANYBLOB="00000000ed0000007b500000100000009500000000000000ccb8000101000000"], &(0x7f00000002c0)='syzkaller\x00', 0x40, 0xfffffffffffffe5b, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x6, r0, 0x8, &(0x7f00000000c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x8, 0x7fffffff, 0xfffffffd}, 0x10, r2}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r1, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0xfffffffe}, 0x8) (async) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000200)={'raw\x00', 0x0, [0x4, 0x4, 0x2, 0x7d29, 0x80]}, &(0x7f0000000040)=0x54) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="89ef8c5add000e19199234692215040fa410803be4588c26bc72cd6fce7bd5e334fa1b7b6240d8c1b69f00fab15948eedf4e4aeefb77defbddb415cae3c222e9be250500229956a0ab6317a75f09204bce112dc71f856bf34517b4f41ae8049afbda1b479b3f96113fd834878c4c809c198bd3775ec968d3a2", @ANYRES32=r1, @ANYBLOB="00000000ed0000007b500000100000009500000000000000ccb8000101000000"], &(0x7f00000002c0)='syzkaller\x00', 0x40, 0xfffffffffffffe5b, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x6, r0, 0x8, &(0x7f00000000c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x8, 0x7fffffff, 0xfffffffd}, 0x10, r2}, 0x78) (async) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb002000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000004c0)=""/232, 0x0, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000004c0)=""/232, 0x0, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/225, 0x22, 0xe1, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/225, 0x22, 0xe1, 0x1}, 0x20) (async) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0xfffffffe, 0x0}, 0x8) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000200)={'raw\x00', 0x0, [0x4, 0x4, 0x2, 0x7d29, 0x80]}, &(0x7f0000000040)=0x54) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="89ef8c5add000e19199234692215040fa410803be4588c26bc72cd6fce7bd5e334fa1b7b6240d8c1b69f00fab15948eedf4e4aeefb77defbddb415cae3c222e9be250500229956a0ab6317a75f09204bce112dc71f856bf34517b4f41ae8049afbda1b479b3f96113fd834878c4c809c198bd3775ec968d3a2", @ANYRES32=r1, @ANYBLOB="00000000ed0000007b500000100000009500000000000000ccb8000101000000"], &(0x7f00000002c0)='syzkaller\x00', 0x40, 0xfffffffffffffe5b, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x6, r0, 0x8, &(0x7f00000000c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x8, 0x7fffffff, 0xfffffffd}, 0x10, r2}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r1, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0xfffffffe}, 0x8) (async) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000200)={'raw\x00', 0x0, [0x4, 0x4, 0x2, 0x7d29, 0x80]}, &(0x7f0000000040)=0x54) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="89ef8c5add000e19199234692215040fa410803be4588c26bc72cd6fce7bd5e334fa1b7b6240d8c1b69f00fab15948eedf4e4aeefb77defbddb415cae3c222e9be250500229956a0ab6317a75f09204bce112dc71f856bf34517b4f41ae8049afbda1b479b3f96113fd834878c4c809c198bd3775ec968d3a2", @ANYRES32=r1, @ANYBLOB="00000000ed0000007b500000100000009500000000000000ccb8000101000000"], &(0x7f00000002c0)='syzkaller\x00', 0x40, 0xfffffffffffffe5b, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x6, r0, 0x8, &(0x7f00000000c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x8, 0x7fffffff, 0xfffffffd}, 0x10, r2}, 0x78) (async) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000004c0)=""/232, 0x0, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x0, 0x61, 0x61]}}, &(0x7f00000000c0)=""/234, 0x29, 0xea, 0x1}, 0x20) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x4, &(0x7f0000000040)=[{0x7, 0x3, 0x8, 0x3}, {0x1642, 0xd5, 0x40, 0x9}, {0x1000, 0x80, 0x7, 0xffffffff}, {0x8, 0x6, 0x2, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb004000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/225, 0x22, 0xe1, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x1e, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x1e, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x0, 0x61, 0x61]}}, &(0x7f00000000c0)=""/234, 0x29, 0xea, 0x1}, 0x20) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x4, &(0x7f0000000040)=[{0x7, 0x3, 0x8, 0x3}, {0x1642, 0xd5, 0x40, 0x9}, {0x1000, 0x80, 0x7, 0xffffffff}, {0x8, 0x6, 0x2, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb101000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000700000000000000000a00000046000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000080)=[{}, {}, {}], 0x3, 0x1f) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x0, 0x61, 0x61]}}, &(0x7f00000000c0)=""/234, 0x29, 0xea, 0x1}, 0x20) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x4, &(0x7f0000000040)=[{0x7, 0x3, 0x8, 0x3}, {0x1642, 0xd5, 0x40, 0x9}, {0x1000, 0x80, 0x7, 0xffffffff}, {0x8, 0x6, 0x2, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x0, 0x61, 0x61]}}, &(0x7f00000000c0)=""/234, 0x29, 0xea, 0x1}, 0x20) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x4, &(0x7f0000000040)=[{0x7, 0x3, 0x8, 0x3}, {0x1642, 0xd5, 0x40, 0x9}, {0x1000, 0x80, 0x7, 0xffffffff}, {0x8, 0x6, 0x2, 0x1}]}) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) (async) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x1e, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 1: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x101) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000500000000000000010000050000612e00"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb102000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000700000000000000000a00000046000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000080)=[{}, {}, {}], 0x3, 0x1f) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000700000000000000000a00000046000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) epoll_create1(0x0) (async) epoll_wait(r0, &(0x7f0000000080)=[{}, {}, {}], 0x3, 0x1f) (async) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 1: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x101) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000500000000000000010000050000612e00"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb103000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 1: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x101) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000500000000000000010000050000612e00"], &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000700000000000000000a00000046000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000080)=[{}, {}, {}], 0x3, 0x1f) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000700000000000000000a00000046000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) epoll_create1(0x0) (async) epoll_wait(r0, &(0x7f0000000080)=[{}, {}, {}], 0x3, 0x1f) (async) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb104000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x2e, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000009, 0x110, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0x141, 0x1}, 0x20) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000700000000000002000000000c0000000000000e0200000000000000000000000700000d000000000b00000004000000030000000000000001000000030000000d000000020000000c000000000000000a000000010000000d000000000000000f000000000000090000000000303000"/136], &(0x7f00000005c0)=""/4096, 0x88, 0x1000, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000700000000000002000000000c0000000000000e0200000000000000000000000700000d000000000b00000004000000030000000000000001000000030000000d000000020000000c000000000000000a000000010000000d000000000000000f000000000000090000000000303000"/136], &(0x7f00000005c0)=""/4096, 0x88, 0x1000, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000700000000000002000000000c0000000000000e0200000000000000000000000700000d000000000b00000004000000030000000000000001000000030000000d000000020000000c000000000000000a000000010000000d000000000000000f000000000000090000000000303000"/136], &(0x7f00000005c0)=""/4096, 0x88, 0x1000, 0x1}, 0x20) (async) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb201000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000700000000000002000000000c0000000000000e0200000000000000000000000700000d000000000b00000004000000030000000000000001000000030000000d000000020000000c000000000000000a000000010000000d000000000000000f000000000000090000000000303000"/136], &(0x7f00000005c0)=""/4096, 0x88, 0x1000, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x35, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000700000000000002000000000c0000000000000e0200000000000000000000000700000d000000000b00000004000000030000000000000001000000030000000d000000020000000c000000000000000a000000010000000d000000000000000f000000000000090000000000303000"/136], &(0x7f00000005c0)=""/4096, 0x88, 0x1000, 0x1}, 0x20) (async) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000009, 0x110, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0x141, 0x1}, 0x20) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000009, 0x110, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0x141, 0x1}, 0x20) (async) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x2e, 0x0]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000100)=0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="001800000000000000300000003000000005000000000000000300a605000000000200000000000000000000000500000005000019000000001000000000000000ff0700000000612e004c7a0815bc8616509d080c966d533cbe0453b575fb2e91ad3bdb9a1163f6170a68796a8a2efee4efb6bbf878deda6dcbc56d74fdb236d9c74666ebe1000000"], &(0x7f00000004c0)=""/232, 0x4d, 0xe8, 0x1}, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000)=0x2, 0x4) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb202000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x2e, 0x0]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb203000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x2e, 0x0]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000100)=0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="001800000000000000300000003000000005000000000000000300a605000000000200000000000000000000000500000005000019000000001000000000000000ff0700000000612e004c7a0815bc8616509d080c966d533cbe0453b575fb2e91ad3bdb9a1163f6170a68796a8a2efee4efb6bbf878deda6dcbc56d74fdb236d9c74666ebe1000000"], &(0x7f00000004c0)=""/232, 0x4d, 0xe8, 0x1}, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000)=0x2, 0x4) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000009, 0x110, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0x141, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000100)=0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="001800000000000000300000003000000005000000000000000300a605000000000200000000000000000000000500000005000019000000001000000000000000ff0700000000612e004c7a0815bc8616509d080c966d533cbe0453b575fb2e91ad3bdb9a1163f6170a68796a8a2efee4efb6bbf878deda6dcbc56d74fdb236d9c74666ebe1000000"], &(0x7f00000004c0)=""/232, 0x4d, 0xe8, 0x1}, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000)=0x2, 0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000100)=0xc) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="001800000000000000300000003000000005000000000000000300a605000000000200000000000000000000000500000005000019000000001000000000000000ff0700000000612e004c7a0815bc8616509d080c966d533cbe0453b575fb2e91ad3bdb9a1163f6170a68796a8a2efee4efb6bbf878deda6dcbc56d74fdb236d9c74666ebe1000000"], &(0x7f00000004c0)=""/232, 0x4d, 0xe8, 0x1}, 0x20) (async) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000)=0x2, 0x4) (async) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb204000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x26, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x5, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) connect$nfc_raw(r0, &(0x7f0000000040)={0x27, 0x5, 0x1, 0x7}, 0x10) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 1: getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000009000000060000000000050500000000000000000000613000"], &(0x7f00000004c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f00000000c0)=0x80000000, 0x4) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb301000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x26000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x61, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x5, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) connect$nfc_raw(r0, &(0x7f0000000040)={0x27, 0x5, 0x1, 0x7}, 0x10) 17:30:50 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000000)="0f01b41ddf0f01c365660f56a3008064660f380a6700640f356766c7442400004800006766c74424020b0000006766c744240600000000670f01142498660fd7e7baf80c66b898cdfd8f66efbafc0c66b8c75d000066efbaf80c66b8b4b8008a66efbafc0c66b80000000066ef", 0x6d}], 0x1, 0x0, &(0x7f0000000200)=[@efer={0x2, 0x7001}], 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000000c0)=""/232, 0x2d, 0xe8, 0x1}, 0x20) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000240)={0x66ff, 0x0, 0x9, 0x102}) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb302000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 1) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb303000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x5, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) connect$nfc_raw(r0, &(0x7f0000000040)={0x27, 0x5, 0x1, 0x7}, 0x10) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb304000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 983.520262][T13417] FAULT_INJECTION: forcing a failure. [ 983.520262][T13417] name failslab, interval 1, probability 0, space 0, times 0 [ 983.541977][T13417] CPU: 0 PID: 13417 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 983.552219][T13417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.562264][T13417] Call Trace: [ 983.565560][T13417] dump_stack+0x18e/0x1de 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 983.569881][T13417] should_fail+0x5d8/0x740 [ 983.574289][T13417] ? loop_add+0x56/0x710 [ 983.578523][T13417] should_failslab+0x5/0x20 [ 983.583017][T13417] kmem_cache_alloc_trace+0x39/0x2b0 [ 983.588298][T13417] loop_add+0x56/0x710 [ 983.592362][T13417] ? radix_tree_lookup+0x1c0/0x1d0 [ 983.597461][T13417] loop_control_ioctl+0x468/0x680 [ 983.602568][T13417] ? xor_init+0x60/0x60 [ 983.606691][T13417] do_vfs_ioctl+0x6fb/0x15b0 [ 983.611254][T13417] __x64_sys_ioctl+0xd4/0x110 [ 983.615900][T13417] do_syscall_64+0xcb/0x1e0 [ 983.620378][T13417] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 983.626241][T13417] RIP: 0033:0x7fddc0dc7e99 [ 983.630628][T13417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 983.650214][T13417] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 983.658598][T13417] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 17:30:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 2) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 983.666741][T13417] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 983.674686][T13417] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 983.682628][T13417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 983.690576][T13417] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 983.712991][T13470] FAULT_INJECTION: forcing a failure. 17:30:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x61, 0x0, 0x5f, 0x2e, 0x0, 0x30]}}, &(0x7f00000004c0)=""/222, 0x2c, 0xde, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb401000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 983.712991][T13470] name failslab, interval 1, probability 0, space 0, times 0 [ 983.725685][T13470] CPU: 0 PID: 13470 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 983.735895][T13470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.745932][T13470] Call Trace: [ 983.749226][T13470] dump_stack+0x18e/0x1de [ 983.753553][T13470] should_fail+0x5d8/0x740 [ 983.757965][T13470] ? radix_tree_node_alloc+0x84/0x370 [ 983.763327][T13470] should_failslab+0x5/0x20 17:30:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x61, 0x0, 0x5f, 0x2e, 0x0, 0x30]}}, &(0x7f00000004c0)=""/222, 0x2c, 0xde, 0x1}, 0x20) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb402000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 983.767825][T13470] kmem_cache_alloc+0x36/0x290 [ 983.772581][T13470] radix_tree_node_alloc+0x84/0x370 [ 983.777768][T13470] idr_get_free+0x2aa/0x900 [ 983.782265][T13470] idr_alloc+0x156/0x280 [ 983.786501][T13470] loop_add+0xa8/0x710 [ 983.790558][T13470] ? radix_tree_lookup+0x1c0/0x1d0 [ 983.795662][T13470] loop_control_ioctl+0x468/0x680 [ 983.800677][T13470] ? xor_init+0x60/0x60 [ 983.804824][T13470] do_vfs_ioctl+0x6fb/0x15b0 [ 983.809408][T13470] __x64_sys_ioctl+0xd4/0x110 [ 983.814067][T13470] do_syscall_64+0xcb/0x1e0 [ 983.818552][T13470] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 983.824429][T13470] RIP: 0033:0x7fddc0dc7e99 [ 983.828835][T13470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 983.848505][T13470] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 983.856889][T13470] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 17:30:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 3) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb403000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x61, 0x0, 0x5f, 0x2e, 0x0, 0x30]}}, &(0x7f00000004c0)=""/222, 0x2c, 0xde, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x61, 0x0, 0x5f, 0x2e, 0x0, 0x30]}}, &(0x7f00000004c0)=""/222, 0x2c, 0xde, 0x1}, 0x20) (async) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x29, 0xe8, 0x1000001}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xec, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xe7000000, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb404000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 983.864831][T13470] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 983.872776][T13470] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 983.880716][T13470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 983.889004][T13470] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 983.921646][T13783] FAULT_INJECTION: forcing a failure. [ 983.921646][T13783] name failslab, interval 1, probability 0, space 0, times 0 [ 983.935052][T13783] CPU: 1 PID: 13783 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 983.945288][T13783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.955411][T13783] Call Trace: [ 983.958675][T13783] dump_stack+0x18e/0x1de [ 983.962979][T13783] should_fail+0x5d8/0x740 [ 983.967365][T13783] ? blk_mq_alloc_tag_set+0x312/0xe60 [ 983.972718][T13783] should_failslab+0x5/0x20 [ 983.977194][T13783] __kmalloc+0x5f/0x2f0 [ 983.981322][T13783] blk_mq_alloc_tag_set+0x312/0xe60 [ 983.986488][T13783] ? idr_alloc+0x1c3/0x280 [ 983.990977][T13783] loop_add+0x22b/0x710 [ 983.995103][T13783] ? radix_tree_lookup+0x1c0/0x1d0 [ 984.000186][T13783] loop_control_ioctl+0x468/0x680 [ 984.005177][T13783] ? xor_init+0x60/0x60 [ 984.009304][T13783] do_vfs_ioctl+0x6fb/0x15b0 [ 984.013871][T13783] __x64_sys_ioctl+0xd4/0x110 [ 984.018517][T13783] do_syscall_64+0xcb/0x1e0 [ 984.022986][T13783] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.028847][T13783] RIP: 0033:0x7fddc0dc7e99 [ 984.033240][T13783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 984.052813][T13783] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 984.061200][T13783] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x2a, 0x0, 0x1000001}, 0x20) 17:30:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 4) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:51 executing program 0: write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x8, 0x35, 0x1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb7f0018000000000000000c0000000c0000000a00000006000000000000070000bb157e26bfc5875d2b7bdec3"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) [ 984.069148][T13783] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 984.077171][T13783] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 984.085110][T13783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 984.093051][T13783] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x2a, 0x0, 0x1000001}, 0x20) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb501000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 984.126683][T13903] FAULT_INJECTION: forcing a failure. [ 984.126683][T13903] name failslab, interval 1, probability 0, space 0, times 0 [ 984.154204][T13903] CPU: 0 PID: 13903 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 984.164448][T13903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 984.174490][T13903] Call Trace: [ 984.177770][T13903] dump_stack+0x18e/0x1de [ 984.182090][T13903] should_fail+0x5d8/0x740 [ 984.186501][T13903] ? blk_mq_alloc_tag_set+0x3ca/0xe60 [ 984.191863][T13903] should_failslab+0x5/0x20 [ 984.196357][T13903] __kmalloc+0x5f/0x2f0 [ 984.200501][T13903] ? blk_mq_alloc_tag_set+0x312/0xe60 [ 984.205949][T13903] blk_mq_alloc_tag_set+0x3ca/0xe60 [ 984.211139][T13903] loop_add+0x22b/0x710 [ 984.215272][T13903] ? radix_tree_lookup+0x1c0/0x1d0 [ 984.220353][T13903] loop_control_ioctl+0x468/0x680 [ 984.225345][T13903] ? xor_init+0x60/0x60 [ 984.229471][T13903] do_vfs_ioctl+0x6fb/0x15b0 [ 984.235083][T13903] __x64_sys_ioctl+0xd4/0x110 [ 984.239904][T13903] do_syscall_64+0xcb/0x1e0 [ 984.244379][T13903] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.250239][T13903] RIP: 0033:0x7fddc0dc7e99 [ 984.254624][T13903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:30:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 5) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb502000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.274224][T13903] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 984.282606][T13903] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 984.290553][T13903] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 984.298493][T13903] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 984.306443][T13903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 984.314389][T13903] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:51 executing program 0: write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x8, 0x35, 0x1}, 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb7f0018000000000000000c0000000c0000000a00000006000000000000070000bb157e26bfc5875d2b7bdec3"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0xa, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x2a, 0x0, 0x1000001}, 0x20) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb503000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8}, 0x20) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8}, 0x20) 17:30:51 executing program 0: write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x8, 0x35, 0x1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb7f0018000000000000000c0000000c0000000a00000006000000000000070000bb157e26bfc5875d2b7bdec3"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) [ 984.338750][T14025] FAULT_INJECTION: forcing a failure. [ 984.338750][T14025] name failslab, interval 1, probability 0, space 0, times 0 [ 984.363392][T14025] CPU: 1 PID: 14025 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 984.373638][T14025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.383682][T14025] Call Trace: 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8}, 0x20) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 984.386962][T14025] dump_stack+0x18e/0x1de [ 984.391292][T14025] should_fail+0x5d8/0x740 [ 984.395702][T14025] ? blk_mq_init_tags+0x74/0x290 [ 984.400633][T14025] should_failslab+0x5/0x20 [ 984.405143][T14025] kmem_cache_alloc_trace+0x39/0x2b0 [ 984.410427][T14025] blk_mq_init_tags+0x74/0x290 [ 984.415191][T14025] ? blk_mq_hw_queue_to_node+0xeb/0x100 [ 984.420727][T14025] blk_mq_alloc_rq_map+0x93/0x1a0 [ 984.425745][T14025] blk_mq_alloc_tag_set+0x6bc/0xe60 [ 984.430936][T14025] loop_add+0x22b/0x710 [ 984.435078][T14025] ? radix_tree_lookup+0x1c0/0x1d0 [ 984.440178][T14025] loop_control_ioctl+0x468/0x680 [ 984.445195][T14025] ? xor_init+0x60/0x60 [ 984.449337][T14025] do_vfs_ioctl+0x6fb/0x15b0 [ 984.453899][T14025] __x64_sys_ioctl+0xd4/0x110 [ 984.458546][T14025] do_syscall_64+0xcb/0x1e0 [ 984.463022][T14025] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.468886][T14025] RIP: 0033:0x7fddc0dc7e99 [ 984.473271][T14025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 984.492894][T14025] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 984.501272][T14025] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 984.509216][T14025] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 984.517161][T14025] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 984.525106][T14025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:30:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 6) 17:30:51 executing program 0: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8809}, @void, @llc={@snap={0x1, 0x0, "3810", "24b164", 0x88e7, "8744ac716605453205bc0914859b0c2b39202b2ec2797bdc8b2c40d0ee39626aefd67de4696e312f7872b13b9e7184556488387f482d78d31c14ee0721be6c4586635fe8877165323911f77f26ece82d1f21b4751cb1af0acd90fb7c5560ce5b8b0fe9b768cf7c6f476a6cae0b34fab4c6c8eef88e030786b2558d3b"}}}, 0x89) 17:30:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 1) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0xc, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb504000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x26, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 984.533048][T14025] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 984.545745][T14025] blk-mq: reduced tag depth (128 -> 64) [ 984.579045][T14255] FAULT_INJECTION: forcing a failure. 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 984.579045][T14255] name failslab, interval 1, probability 0, space 0, times 0 [ 984.594475][T14255] CPU: 0 PID: 14255 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 984.604716][T14255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.614761][T14255] Call Trace: [ 984.618042][T14255] dump_stack+0x18e/0x1de [ 984.622370][T14255] should_fail+0x5d8/0x740 [ 984.626778][T14255] ? __set_page_owner+0x35/0x200 [ 984.631792][T14255] ? btf_new_fd+0x128/0x36a0 [ 984.636404][T14255] should_failslab+0x5/0x20 [ 984.640883][T14255] kmem_cache_alloc_trace+0x39/0x2b0 [ 984.646144][T14255] btf_new_fd+0x128/0x36a0 [ 984.650531][T14255] ? cred_has_capability+0x14f/0x340 [ 984.655783][T14255] ? cred_has_capability+0x250/0x340 [ 984.661195][T14255] ? security_capable+0xb1/0xd0 [ 984.666022][T14255] __do_sys_bpf+0x12ab/0xbd30 [ 984.670672][T14255] ? refcount_sub_and_test_checked+0x151/0x210 [ 984.676796][T14255] ? proc_fail_nth_read+0x150/0x150 [ 984.681969][T14255] ? proc_fail_nth_write+0x157/0x1c0 [ 984.687235][T14255] ? memset+0x1f/0x40 [ 984.691188][T14255] ? __sb_end_write+0xb5/0x100 [ 984.695918][T14255] ? vfs_write+0x422/0x4e0 [ 984.700305][T14255] ? fput_many+0x42/0x1a0 [ 984.704606][T14255] ? check_preemption_disabled+0xde/0x2c0 [ 984.710297][T14255] do_syscall_64+0xcb/0x1e0 [ 984.714772][T14255] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.720688][T14255] RIP: 0033:0x7f218a5e8e99 [ 984.725074][T14255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 984.744645][T14255] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 984.753025][T14255] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 984.760968][T14255] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 984.768910][T14255] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 984.776850][T14255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 984.784797][T14255] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 984.818885][T14344] FAULT_INJECTION: forcing a failure. [ 984.818885][T14344] name failslab, interval 1, probability 0, space 0, times 0 [ 984.832302][T14344] CPU: 0 PID: 14344 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 984.842511][T14344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.852541][T14344] Call Trace: [ 984.855805][T14344] dump_stack+0x18e/0x1de [ 984.860159][T14344] should_fail+0x5d8/0x740 [ 984.864551][T14344] ? sbitmap_init_node+0x145/0x3d0 [ 984.869635][T14344] should_failslab+0x5/0x20 [ 984.874115][T14344] __kmalloc+0x5f/0x2f0 [ 984.878242][T14344] sbitmap_init_node+0x145/0x3d0 [ 984.883155][T14344] sbitmap_queue_init_node+0x2f/0xbe0 [ 984.888499][T14344] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 984.894014][T14344] ? blk_mq_init_tags+0x74/0x290 [ 984.898933][T14344] blk_mq_init_tags+0xef/0x290 [ 984.903666][T14344] blk_mq_alloc_rq_map+0x93/0x1a0 [ 984.908659][T14344] blk_mq_alloc_tag_set+0x6bc/0xe60 [ 984.913830][T14344] loop_add+0x22b/0x710 [ 984.917967][T14344] ? radix_tree_lookup+0x1c0/0x1d0 [ 984.923051][T14344] loop_control_ioctl+0x468/0x680 [ 984.928063][T14344] ? xor_init+0x60/0x60 [ 984.932196][T14344] do_vfs_ioctl+0x6fb/0x15b0 [ 984.936766][T14344] __x64_sys_ioctl+0xd4/0x110 [ 984.941416][T14344] do_syscall_64+0xcb/0x1e0 [ 984.945895][T14344] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.951755][T14344] RIP: 0033:0x7fddc0dc7e99 [ 984.956141][T14344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 984.975715][T14344] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 984.984119][T14344] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 984.992061][T14344] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 985.000006][T14344] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 985.007949][T14344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:30:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 7) 17:30:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x64, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 2) 17:30:52 executing program 0: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8809}, @void, @llc={@snap={0x1, 0x0, "3810", "24b164", 0x88e7, "8744ac716605453205bc0914859b0c2b39202b2ec2797bdc8b2c40d0ee39626aefd67de4696e312f7872b13b9e7184556488387f482d78d31c14ee0721be6c4586635fe8877165323911f77f26ece82d1f21b4751cb1af0acd90fb7c5560ce5b8b0fe9b768cf7c6f476a6cae0b34fab4c6c8eef88e030786b2558d3b"}}}, 0x89) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8809}, @void, @llc={@snap={0x1, 0x0, "3810", "24b164", 0x88e7, "8744ac716605453205bc0914859b0c2b39202b2ec2797bdc8b2c40d0ee39626aefd67de4696e312f7872b13b9e7184556488387f482d78d31c14ee0721be6c4586635fe8877165323911f77f26ece82d1f21b4751cb1af0acd90fb7c5560ce5b8b0fe9b768cf7c6f476a6cae0b34fab4c6c8eef88e030786b2558d3b"}}}, 0x89) (async) 17:30:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x5f5e0ff, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 985.015916][T14344] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 985.024554][T14344] blk-mq: reduced tag depth (128 -> 64) [ 985.050403][T14380] FAULT_INJECTION: forcing a failure. [ 985.050403][T14380] name failslab, interval 1, probability 0, space 0, times 0 17:30:52 executing program 0: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8809}, @void, @llc={@snap={0x1, 0x0, "3810", "24b164", 0x88e7, "8744ac716605453205bc0914859b0c2b39202b2ec2797bdc8b2c40d0ee39626aefd67de4696e312f7872b13b9e7184556488387f482d78d31c14ee0721be6c4586635fe8877165323911f77f26ece82d1f21b4751cb1af0acd90fb7c5560ce5b8b0fe9b768cf7c6f476a6cae0b34fab4c6c8eef88e030786b2558d3b"}}}, 0x89) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8809}, @void, @llc={@snap={0x1, 0x0, "3810", "24b164", 0x88e7, "8744ac716605453205bc0914859b0c2b39202b2ec2797bdc8b2c40d0ee39626aefd67de4696e312f7872b13b9e7184556488387f482d78d31c14ee0721be6c4586635fe8877165323911f77f26ece82d1f21b4751cb1af0acd90fb7c5560ce5b8b0fe9b768cf7c6f476a6cae0b34fab4c6c8eef88e030786b2558d3b"}}}, 0x89) (async) 17:30:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 985.079827][T14380] CPU: 1 PID: 14380 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 985.090070][T14380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.100196][T14380] Call Trace: [ 985.103477][T14380] dump_stack+0x18e/0x1de [ 985.107796][T14380] should_fail+0x5d8/0x740 [ 985.112199][T14380] ? btf_new_fd+0x272/0x36a0 [ 985.116775][T14380] should_failslab+0x5/0x20 [ 985.121261][T14380] kmem_cache_alloc_trace+0x39/0x2b0 [ 985.126610][T14380] ? btf_new_fd+0x128/0x36a0 [ 985.131179][T14380] btf_new_fd+0x272/0x36a0 [ 985.135567][T14380] ? cred_has_capability+0x14f/0x340 [ 985.140829][T14380] ? cred_has_capability+0x250/0x340 [ 985.146093][T14380] ? security_capable+0xb1/0xd0 [ 985.150915][T14380] __do_sys_bpf+0x12ab/0xbd30 [ 985.155566][T14380] ? refcount_sub_and_test_checked+0x151/0x210 [ 985.161704][T14380] ? proc_fail_nth_read+0x150/0x150 [ 985.166886][T14380] ? proc_fail_nth_write+0x157/0x1c0 [ 985.172142][T14380] ? memset+0x1f/0x40 [ 985.176099][T14380] ? __sb_end_write+0xb5/0x100 [ 985.180852][T14380] ? vfs_write+0x422/0x4e0 [ 985.185239][T14380] ? fput_many+0x42/0x1a0 [ 985.189541][T14380] ? check_preemption_disabled+0xde/0x2c0 [ 985.195240][T14380] do_syscall_64+0xcb/0x1e0 [ 985.199719][T14380] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 985.205583][T14380] RIP: 0033:0x7f218a5e8e99 [ 985.209984][T14380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.229561][T14380] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 985.237955][T14380] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 985.245895][T14380] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 985.253835][T14380] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 985.261883][T14380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 985.269919][T14380] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 985.283380][T14593] FAULT_INJECTION: forcing a failure. [ 985.283380][T14593] name failslab, interval 1, probability 0, space 0, times 0 [ 985.296455][T14593] CPU: 1 PID: 14593 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 985.306718][T14593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.316840][T14593] Call Trace: [ 985.320296][T14593] dump_stack+0x18e/0x1de [ 985.324601][T14593] should_fail+0x5d8/0x740 [ 985.328994][T14593] ? sbitmap_queue_init_node+0x3db/0xbe0 [ 985.334607][T14593] should_failslab+0x5/0x20 [ 985.339225][T14593] kmem_cache_alloc_trace+0x39/0x2b0 [ 985.344482][T14593] sbitmap_queue_init_node+0x3db/0xbe0 [ 985.349912][T14593] blk_mq_init_tags+0xef/0x290 [ 985.354647][T14593] blk_mq_alloc_rq_map+0x93/0x1a0 [ 985.359641][T14593] blk_mq_alloc_tag_set+0x6bc/0xe60 [ 985.364820][T14593] loop_add+0x22b/0x710 [ 985.368950][T14593] ? radix_tree_lookup+0x1c0/0x1d0 [ 985.374033][T14593] loop_control_ioctl+0x468/0x680 [ 985.379026][T14593] ? xor_init+0x60/0x60 [ 985.383152][T14593] do_vfs_ioctl+0x6fb/0x15b0 [ 985.387715][T14593] __x64_sys_ioctl+0xd4/0x110 [ 985.392363][T14593] do_syscall_64+0xcb/0x1e0 [ 985.396844][T14593] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 985.402837][T14593] RIP: 0033:0x7fddc0dc7e99 [ 985.407224][T14593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:30:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 8) 17:30:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x18, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000200)={@local}) write$tun(r0, 0x0, 0x0) write$tun(r0, &(0x7f0000000180)={@val={0x0, 0x8914}, @val={0x1, 0x4, 0x8, 0x9, 0x6, 0x20}, @x25={0x0, 0x2, 0x1, "3f257d59e44369d69e52a6a88d0ab8ef18259ce4654a9d745df3fc9312579a5c51eb086ef915c4067f3774c8d5cd1ed2bca58892e514da9a0a41dbccc0a194dcc7fa54eea4f1a1377fb3b9b1fcdb3d6eb3c4156d01baecf517cf9a5c860c1ed2114f7d94"}}, 0x75) io_uring_setup(0xd76, &(0x7f0000000000)={0x0, 0x3ff1, 0x10, 0x3, 0xc0, 0x0, r0}) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x2, 0x18, 0x20, 0xc0, 0x0, 0x63e, 0xd8900, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f00000000c0)}, 0x2112, 0x1, 0x4, 0x8, 0x5, 0xfffffeff, 0x8000, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x4, r0, 0x3) ioperm(0x3, 0x2, 0x3ff) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="02eb8af7e68228a90d0200000000000000b5cac38a02b731ce5583ec8c57801cc93bdedd31963a0000000000000000a0cc629dac65c6a3"], 0x2b) 17:30:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb602000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 3) 17:30:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2600, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb603000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x1c, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 985.427071][T14593] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 985.435451][T14593] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 985.443393][T14593] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 985.451341][T14593] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 985.459287][T14593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 985.467244][T14593] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 985.475806][T14593] blk-mq: reduced tag depth (128 -> 64) 17:30:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x25, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000200)={@local}) write$tun(r0, 0x0, 0x0) (async) write$tun(r0, &(0x7f0000000180)={@val={0x0, 0x8914}, @val={0x1, 0x4, 0x8, 0x9, 0x6, 0x20}, @x25={0x0, 0x2, 0x1, "3f257d59e44369d69e52a6a88d0ab8ef18259ce4654a9d745df3fc9312579a5c51eb086ef915c4067f3774c8d5cd1ed2bca58892e514da9a0a41dbccc0a194dcc7fa54eea4f1a1377fb3b9b1fcdb3d6eb3c4156d01baecf517cf9a5c860c1ed2114f7d94"}}, 0x75) (async) io_uring_setup(0xd76, &(0x7f0000000000)={0x0, 0x3ff1, 0x10, 0x3, 0xc0, 0x0, r0}) (async) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x2, 0x18, 0x20, 0xc0, 0x0, 0x63e, 0xd8900, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f00000000c0)}, 0x2112, 0x1, 0x4, 0x8, 0x5, 0xfffffeff, 0x8000, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x4, r0, 0x3) (async) ioperm(0x3, 0x2, 0x3ff) (async) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="02eb8af7e68228a90d0200000000000000b5cac38a02b731ce5583ec8c57801cc93bdedd31963a0000000000000000a0cc629dac65c6a3"], 0x2b) [ 985.517435][T14608] FAULT_INJECTION: forcing a failure. [ 985.517435][T14608] name failslab, interval 1, probability 0, space 0, times 0 [ 985.537250][T14608] CPU: 0 PID: 14608 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 985.547490][T14608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.557535][T14608] Call Trace: [ 985.560814][T14608] dump_stack+0x18e/0x1de [ 985.565136][T14608] should_fail+0x5d8/0x740 [ 985.569540][T14608] ? kvmalloc_node+0x7e/0xf0 [ 985.574111][T14608] should_failslab+0x5/0x20 [ 985.578587][T14608] __kmalloc+0x5f/0x2f0 [ 985.582712][T14608] ? btf_new_fd+0x272/0x36a0 [ 985.587273][T14608] kvmalloc_node+0x7e/0xf0 [ 985.591763][T14608] btf_new_fd+0x2b3/0x36a0 [ 985.596151][T14608] ? cred_has_capability+0x14f/0x340 [ 985.601407][T14608] ? cred_has_capability+0x250/0x340 [ 985.606665][T14608] ? security_capable+0xb1/0xd0 [ 985.611486][T14608] __do_sys_bpf+0x12ab/0xbd30 [ 985.616135][T14608] ? set_next_entity+0x420/0x7c0 [ 985.621050][T14608] ? finish_task_switch+0x130/0x550 [ 985.626226][T14608] ? __schedule+0x886/0x1020 [ 985.630788][T14608] ? check_preemption_disabled+0xde/0x2c0 [ 985.636479][T14608] ? __fpregs_load_activate+0x15a/0x300 [ 985.642020][T14608] do_syscall_64+0xcb/0x1e0 [ 985.646499][T14608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 985.652363][T14608] RIP: 0033:0x7f218a5e8e99 [ 985.656756][T14608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.676681][T14608] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 985.685106][T14608] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 985.693049][T14608] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 985.700994][T14608] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 985.708934][T14608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 985.716876][T14608] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 985.729670][T14817] FAULT_INJECTION: forcing a failure. [ 985.729670][T14817] name failslab, interval 1, probability 0, space 0, times 0 [ 985.743963][T14817] CPU: 0 PID: 14817 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 985.754186][T14817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.764215][T14817] Call Trace: [ 985.767480][T14817] dump_stack+0x18e/0x1de [ 985.771781][T14817] should_fail+0x5d8/0x740 [ 985.776173][T14817] ? sbitmap_queue_init_node+0x3db/0xbe0 [ 985.781801][T14817] should_failslab+0x5/0x20 [ 985.786278][T14817] kmem_cache_alloc_trace+0x39/0x2b0 [ 985.791532][T14817] sbitmap_queue_init_node+0x3db/0xbe0 [ 985.796960][T14817] blk_mq_init_tags+0x153/0x290 [ 985.801778][T14817] blk_mq_alloc_rq_map+0x93/0x1a0 [ 985.806772][T14817] blk_mq_alloc_tag_set+0x6bc/0xe60 [ 985.811939][T14817] loop_add+0x22b/0x710 [ 985.816069][T14817] ? radix_tree_lookup+0x1c0/0x1d0 [ 985.821150][T14817] loop_control_ioctl+0x468/0x680 [ 985.826143][T14817] ? xor_init+0x60/0x60 [ 985.830267][T14817] do_vfs_ioctl+0x6fb/0x15b0 [ 985.834828][T14817] __x64_sys_ioctl+0xd4/0x110 [ 985.839475][T14817] do_syscall_64+0xcb/0x1e0 [ 985.843948][T14817] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 985.849805][T14817] RIP: 0033:0x7fddc0dc7e99 [ 985.854189][T14817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.873849][T14817] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 985.882228][T14817] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 985.890184][T14817] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 985.898147][T14817] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 985.906115][T14817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:30:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 9) 17:30:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb604000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000200)={@local}) (async) write$tun(r0, 0x0, 0x0) (async) write$tun(r0, &(0x7f0000000180)={@val={0x0, 0x8914}, @val={0x1, 0x4, 0x8, 0x9, 0x6, 0x20}, @x25={0x0, 0x2, 0x1, "3f257d59e44369d69e52a6a88d0ab8ef18259ce4654a9d745df3fc9312579a5c51eb086ef915c4067f3774c8d5cd1ed2bca58892e514da9a0a41dbccc0a194dcc7fa54eea4f1a1377fb3b9b1fcdb3d6eb3c4156d01baecf517cf9a5c860c1ed2114f7d94"}}, 0x75) (async, rerun: 64) io_uring_setup(0xd76, &(0x7f0000000000)={0x0, 0x3ff1, 0x10, 0x3, 0xc0, 0x0, r0}) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x2, 0x18, 0x20, 0xc0, 0x0, 0x63e, 0xd8900, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f00000000c0)}, 0x2112, 0x1, 0x4, 0x8, 0x5, 0xfffffeff, 0x8000, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x4, r0, 0x3) (async) ioperm(0x3, 0x2, 0x3ff) (async, rerun: 32) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="02eb8af7e68228a90d0200000000000000b5cac38a02b731ce5583ec8c57801cc93bdedd31963a0000000000000000a0cc629dac65c6a3"], 0x2b) (rerun: 32) 17:30:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2d, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 4) [ 985.914059][T14817] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 985.923067][T14817] blk-mq: reduced tag depth (128 -> 64) [ 985.949757][T14830] FAULT_INJECTION: forcing a failure. [ 985.949757][T14830] name failslab, interval 1, probability 0, space 0, times 0 17:30:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3e, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x64, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x76, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 985.965651][T14830] CPU: 0 PID: 14830 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 985.975890][T14830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.986204][T14830] Call Trace: [ 985.989489][T14830] dump_stack+0x18e/0x1de [ 985.993815][T14830] should_fail+0x5d8/0x740 [ 985.998226][T14830] ? kvmalloc_node+0x7e/0xf0 [ 986.002806][T14830] should_failslab+0x5/0x20 [ 986.007300][T14830] __kmalloc+0x5f/0x2f0 [ 986.011448][T14830] ? btf_struct_check_meta+0x6e5/0x8a0 [ 986.016910][T14830] kvmalloc_node+0x7e/0xf0 [ 986.021416][T14830] btf_new_fd+0x163f/0x36a0 [ 986.025895][T14830] ? cred_has_capability+0x14f/0x340 [ 986.031150][T14830] ? security_capable+0xb1/0xd0 [ 986.035971][T14830] __do_sys_bpf+0x12ab/0xbd30 [ 986.040704][T14830] ? refcount_sub_and_test_checked+0x151/0x210 [ 986.046830][T14830] ? proc_fail_nth_read+0x150/0x150 [ 986.051999][T14830] ? proc_fail_nth_write+0x157/0x1c0 [ 986.057253][T14830] ? memset+0x1f/0x40 [ 986.061206][T14830] ? __sb_end_write+0xb5/0x100 [ 986.065942][T14830] ? vfs_write+0x422/0x4e0 [ 986.070330][T14830] ? fput_many+0x42/0x1a0 [ 986.074628][T14830] ? check_preemption_disabled+0xde/0x2c0 [ 986.080318][T14830] do_syscall_64+0xcb/0x1e0 [ 986.084792][T14830] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.090660][T14830] RIP: 0033:0x7f218a5e8e99 [ 986.095042][T14830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.114624][T14830] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 986.123012][T14830] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 986.130953][T14830] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 986.138894][T14830] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.146841][T14830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.154844][T14830] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 986.166369][T14906] FAULT_INJECTION: forcing a failure. [ 986.166369][T14906] name failslab, interval 1, probability 0, space 0, times 0 [ 986.179302][T14906] CPU: 0 PID: 14906 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 986.189522][T14906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.199653][T14906] Call Trace: [ 986.202938][T14906] dump_stack+0x18e/0x1de [ 986.207258][T14906] should_fail+0x5d8/0x740 [ 986.211663][T14906] ? blk_mq_alloc_rq_map+0xb3/0x1a0 [ 986.216850][T14906] should_failslab+0x5/0x20 [ 986.221335][T14906] __kmalloc+0x5f/0x2f0 [ 986.225473][T14906] ? blk_mq_init_tags+0x209/0x290 [ 986.230473][T14906] blk_mq_alloc_rq_map+0xb3/0x1a0 [ 986.235470][T14906] blk_mq_alloc_tag_set+0x6bc/0xe60 [ 986.240643][T14906] loop_add+0x22b/0x710 [ 986.244780][T14906] ? radix_tree_lookup+0x1c0/0x1d0 [ 986.249864][T14906] loop_control_ioctl+0x468/0x680 [ 986.254861][T14906] ? xor_init+0x60/0x60 [ 986.258989][T14906] do_vfs_ioctl+0x6fb/0x15b0 [ 986.263555][T14906] __x64_sys_ioctl+0xd4/0x110 [ 986.268204][T14906] do_syscall_64+0xcb/0x1e0 [ 986.272678][T14906] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.278547][T14906] RIP: 0033:0x7fddc0dc7e99 [ 986.282937][T14906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.302513][T14906] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 986.310898][T14906] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 17:30:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 10) 17:30:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3df, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb701000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 5) 17:30:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@fwd={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0xffffffffffffffa8, 0xe8, 0x1}, 0x20) write$9p(0xffffffffffffffff, &(0x7f0000000000)="f7f1ee319fefd491348218cdc34f4ef06faf3896e0cfb99704b6af807333071c0dabe442b8bcba2557c5e0cb460cdc6d8c17cce23a72a8eb4a2f1d8823834af022c708cf16ed3cb6da0115be527cedc9fb080056736a829c6ebf778fe828daa5", 0x60) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000140)=r0) [ 986.318844][T14906] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 986.326975][T14906] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.334965][T14906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.343038][T14906] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 986.351183][T14906] blk-mq: reduced tag depth (128 -> 64) 17:30:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@fwd={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0xffffffffffffffa8, 0xe8, 0x1}, 0x20) write$9p(0xffffffffffffffff, &(0x7f0000000000)="f7f1ee319fefd491348218cdc34f4ef06faf3896e0cfb99704b6af807333071c0dabe442b8bcba2557c5e0cb460cdc6d8c17cce23a72a8eb4a2f1d8823834af022c708cf16ed3cb6da0115be527cedc9fb080056736a829c6ebf778fe828daa5", 0x60) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000140)=r0) 17:30:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb702000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5f5e0ff, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 986.382373][T14950] FAULT_INJECTION: forcing a failure. [ 986.382373][T14950] name failslab, interval 1, probability 0, space 0, times 0 [ 986.406031][T14950] CPU: 1 PID: 14950 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 986.416358][T14950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.426396][T14950] Call Trace: 17:30:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@fwd={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0xffffffffffffffa8, 0xe8, 0x1}, 0x20) (async) write$9p(0xffffffffffffffff, &(0x7f0000000000)="f7f1ee319fefd491348218cdc34f4ef06faf3896e0cfb99704b6af807333071c0dabe442b8bcba2557c5e0cb460cdc6d8c17cce23a72a8eb4a2f1d8823834af022c708cf16ed3cb6da0115be527cedc9fb080056736a829c6ebf778fe828daa5", 0x60) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000140)=r0) 17:30:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x22, 0xe8, 0x1}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000300)=""/172) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000000)={0xc0002008}) [ 986.429684][T14950] dump_stack+0x18e/0x1de [ 986.434008][T14950] should_fail+0x5d8/0x740 [ 986.438411][T14950] ? kvmalloc_node+0x7e/0xf0 [ 986.443016][T14950] should_failslab+0x5/0x20 [ 986.447506][T14950] __kmalloc+0x5f/0x2f0 [ 986.451648][T14950] ? kvmalloc_node+0x7e/0xf0 [ 986.456232][T14950] kvmalloc_node+0x7e/0xf0 [ 986.460649][T14950] btf_new_fd+0x1ad1/0x36a0 [ 986.465147][T14950] ? cred_has_capability+0x14f/0x340 [ 986.470426][T14950] ? security_capable+0xb1/0xd0 [ 986.475268][T14950] __do_sys_bpf+0x12ab/0xbd30 [ 986.479935][T14950] ? refcount_sub_and_test_checked+0x151/0x210 [ 986.486077][T14950] ? proc_fail_nth_read+0x150/0x150 [ 986.491257][T14950] ? proc_fail_nth_write+0x157/0x1c0 [ 986.496528][T14950] ? memset+0x1f/0x40 [ 986.500570][T14950] ? __sb_end_write+0xb5/0x100 [ 986.505306][T14950] ? vfs_write+0x422/0x4e0 [ 986.509694][T14950] ? fput_many+0x42/0x1a0 [ 986.514016][T14950] ? check_preemption_disabled+0xde/0x2c0 [ 986.519716][T14950] do_syscall_64+0xcb/0x1e0 [ 986.524196][T14950] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.530116][T14950] RIP: 0033:0x7f218a5e8e99 [ 986.534502][T14950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.554078][T14950] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 986.562458][T14950] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 986.570404][T14950] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 986.578356][T14950] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.586297][T14950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.594345][T14950] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 986.609389][T15159] FAULT_INJECTION: forcing a failure. [ 986.609389][T15159] name failslab, interval 1, probability 0, space 0, times 0 [ 986.624975][T15159] CPU: 1 PID: 15159 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 986.635197][T15159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.645227][T15159] Call Trace: [ 986.648516][T15159] dump_stack+0x18e/0x1de [ 986.652818][T15159] should_fail+0x5d8/0x740 [ 986.657207][T15159] ? blk_mq_alloc_rq_map+0xe9/0x1a0 [ 986.662378][T15159] should_failslab+0x5/0x20 [ 986.666853][T15159] __kmalloc+0x5f/0x2f0 [ 986.670982][T15159] ? blk_mq_alloc_rq_map+0xb3/0x1a0 [ 986.676150][T15159] ? blk_mq_init_tags+0x209/0x290 [ 986.681159][T15159] blk_mq_alloc_rq_map+0xe9/0x1a0 [ 986.686158][T15159] blk_mq_alloc_tag_set+0x6bc/0xe60 [ 986.691327][T15159] loop_add+0x22b/0x710 [ 986.695457][T15159] ? radix_tree_lookup+0x1c0/0x1d0 [ 986.700543][T15159] loop_control_ioctl+0x468/0x680 [ 986.705539][T15159] ? xor_init+0x60/0x60 [ 986.709821][T15159] do_vfs_ioctl+0x6fb/0x15b0 [ 986.714397][T15159] __x64_sys_ioctl+0xd4/0x110 [ 986.719059][T15159] do_syscall_64+0xcb/0x1e0 [ 986.723542][T15159] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.729408][T15159] RIP: 0033:0x7fddc0dc7e99 [ 986.733798][T15159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.753371][T15159] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 986.761750][T15159] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 986.769690][T15159] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 17:30:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 11) 17:30:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x22, 0xe8, 0x1}, 0x20) (async) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000300)=""/172) (async) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000000)={0xc0002008}) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb703000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0xa}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 6) 17:30:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb704000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x67}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 986.777630][T15159] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.785570][T15159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 986.793516][T15159] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 986.801723][T15159] blk-mq: reduced tag depth (128 -> 64) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xec00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x3fe}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 986.837428][T15377] FAULT_INJECTION: forcing a failure. [ 986.837428][T15377] name failslab, interval 1, probability 0, space 0, times 0 [ 986.850681][T15377] CPU: 0 PID: 15377 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 986.860915][T15377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.870959][T15377] Call Trace: [ 986.874242][T15377] dump_stack+0x18e/0x1de [ 986.878566][T15377] should_fail+0x5d8/0x740 [ 986.882992][T15377] ? kvmalloc_node+0x7e/0xf0 [ 986.887580][T15377] should_failslab+0x5/0x20 [ 986.892068][T15377] __kmalloc+0x5f/0x2f0 [ 986.896193][T15377] ? kvmalloc_node+0x7e/0xf0 [ 986.900751][T15377] kvmalloc_node+0x7e/0xf0 [ 986.905137][T15377] btf_new_fd+0x1aef/0x36a0 [ 986.909613][T15377] ? cred_has_capability+0x14f/0x340 [ 986.914867][T15377] ? security_capable+0xb1/0xd0 [ 986.919690][T15377] __do_sys_bpf+0x12ab/0xbd30 [ 986.924338][T15377] ? refcount_sub_and_test_checked+0x151/0x210 [ 986.930464][T15377] ? proc_fail_nth_read+0x150/0x150 [ 986.935636][T15377] ? proc_fail_nth_write+0x157/0x1c0 [ 986.940891][T15377] ? memset+0x1f/0x40 [ 986.944843][T15377] ? __sb_end_write+0xb5/0x100 [ 986.949574][T15377] ? vfs_write+0x422/0x4e0 [ 986.953959][T15377] ? fput_many+0x42/0x1a0 [ 986.958258][T15377] ? check_preemption_disabled+0xde/0x2c0 [ 986.963945][T15377] do_syscall_64+0xcb/0x1e0 [ 986.968427][T15377] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.974290][T15377] RIP: 0033:0x7f218a5e8e99 [ 986.978678][T15377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.998250][T15377] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 987.006635][T15377] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 987.014578][T15377] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 987.022521][T15377] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.030551][T15377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 987.038492][T15377] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 987.050646][T15426] FAULT_INJECTION: forcing a failure. [ 987.050646][T15426] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 987.065255][T15426] CPU: 1 PID: 15426 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 987.075487][T15426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.085524][T15426] Call Trace: [ 987.088908][T15426] dump_stack+0x18e/0x1de [ 987.093234][T15426] should_fail+0x5d8/0x740 [ 987.097624][T15426] __alloc_pages_nodemask+0x12e/0x740 [ 987.102968][T15426] blk_mq_alloc_rqs+0x252/0x660 [ 987.107788][T15426] ? blk_mq_alloc_rq_map+0x11a/0x1a0 [ 987.113041][T15426] blk_mq_alloc_tag_set+0x74b/0xe60 [ 987.118214][T15426] loop_add+0x22b/0x710 [ 987.122351][T15426] ? radix_tree_lookup+0x1c0/0x1d0 [ 987.127453][T15426] loop_control_ioctl+0x468/0x680 [ 987.132452][T15426] ? xor_init+0x60/0x60 [ 987.136580][T15426] do_vfs_ioctl+0x6fb/0x15b0 [ 987.141138][T15426] __x64_sys_ioctl+0xd4/0x110 [ 987.145961][T15426] do_syscall_64+0xcb/0x1e0 [ 987.150526][T15426] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 987.156394][T15426] RIP: 0033:0x7fddc0dc7e99 [ 987.160968][T15426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.180540][T15426] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:30:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 12) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x1000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x22, 0xe8, 0x1}, 0x20) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000300)=""/172) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000000)={0xc0002008}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x22, 0xe8, 0x1}, 0x20) (async) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000300)=""/172) (async) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000000)={0xc0002008}) (async) 17:30:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 7) [ 987.188922][T15426] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 987.196861][T15426] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 987.204892][T15426] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.212835][T15426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.220859][T15426] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 17:30:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb801000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 987.251546][T15500] FAULT_INJECTION: forcing a failure. [ 987.251546][T15500] name failslab, interval 1, probability 0, space 0, times 0 [ 987.269037][T15500] CPU: 0 PID: 15500 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 987.279359][T15500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.289408][T15500] Call Trace: [ 987.292695][T15500] dump_stack+0x18e/0x1de [ 987.297018][T15500] should_fail+0x5d8/0x740 [ 987.301424][T15500] ? kvmalloc_node+0x7e/0xf0 [ 987.306009][T15500] should_failslab+0x5/0x20 [ 987.310496][T15500] __kmalloc+0x5f/0x2f0 [ 987.314631][T15500] ? kvmalloc_node+0x7e/0xf0 [ 987.319188][T15500] kvmalloc_node+0x7e/0xf0 [ 987.323663][T15500] btf_new_fd+0x1b0d/0x36a0 [ 987.328135][T15500] ? cred_has_capability+0x14f/0x340 [ 987.333389][T15500] ? security_capable+0xb1/0xd0 [ 987.338207][T15500] __do_sys_bpf+0x12ab/0xbd30 [ 987.342960][T15500] ? refcount_sub_and_test_checked+0x151/0x210 [ 987.349079][T15500] ? proc_fail_nth_read+0x150/0x150 [ 987.354243][T15500] ? proc_fail_nth_write+0x157/0x1c0 [ 987.359492][T15500] ? memset+0x1f/0x40 [ 987.363442][T15500] ? __sb_end_write+0xb5/0x100 [ 987.368175][T15500] ? vfs_write+0x422/0x4e0 [ 987.372737][T15500] ? fput_many+0x42/0x1a0 [ 987.377125][T15500] ? check_preemption_disabled+0xde/0x2c0 [ 987.382812][T15500] do_syscall_64+0xcb/0x1e0 [ 987.387283][T15500] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 987.393142][T15500] RIP: 0033:0x7f218a5e8e99 [ 987.397528][T15500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.417185][T15500] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 987.425564][T15500] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 987.433501][T15500] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 987.441438][T15500] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.449376][T15500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 987.457317][T15500] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 987.468423][T15528] FAULT_INJECTION: forcing a failure. [ 987.468423][T15528] name failslab, interval 1, probability 0, space 0, times 0 [ 987.482915][T15528] CPU: 0 PID: 15528 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 987.493134][T15528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.503275][T15528] Call Trace: [ 987.506541][T15528] dump_stack+0x18e/0x1de [ 987.510845][T15528] should_fail+0x5d8/0x740 [ 987.515233][T15528] ? blk_alloc_queue_node+0x2c/0x570 [ 987.520485][T15528] should_failslab+0x5/0x20 [ 987.524960][T15528] kmem_cache_alloc+0x36/0x290 [ 987.529712][T15528] ? __mutex_init+0x9d/0xf0 [ 987.534182][T15528] blk_alloc_queue_node+0x2c/0x570 [ 987.539346][T15528] blk_mq_init_queue+0x33/0xa0 [ 987.544073][T15528] loop_add+0x256/0x710 [ 987.548200][T15528] ? radix_tree_lookup+0x1c0/0x1d0 [ 987.553276][T15528] loop_control_ioctl+0x468/0x680 [ 987.558354][T15528] ? xor_init+0x60/0x60 [ 987.562490][T15528] do_vfs_ioctl+0x6fb/0x15b0 [ 987.567050][T15528] __x64_sys_ioctl+0xd4/0x110 [ 987.571695][T15528] do_syscall_64+0xcb/0x1e0 [ 987.576165][T15528] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 987.582023][T15528] RIP: 0033:0x7fddc0dc7e99 [ 987.586409][T15528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.605981][T15528] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 987.614358][T15528] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 987.622297][T15528] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 987.630235][T15528] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.638179][T15528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:30:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 13) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x4}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb802000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000007000000000c0000000a00000006000000000000070000000000030000000000000000"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 17:30:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 8) 17:30:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 987.646119][T15528] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 987.687129][T15620] FAULT_INJECTION: forcing a failure. [ 987.687129][T15620] name failslab, interval 1, probability 0, space 0, times 0 [ 987.688816][T15627] FAULT_INJECTION: forcing a failure. [ 987.688816][T15627] name failslab, interval 1, probability 0, space 0, times 0 [ 987.702388][T15620] CPU: 0 PID: 15620 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 987.722563][T15620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.732593][T15620] Call Trace: [ 987.735864][T15620] dump_stack+0x18e/0x1de [ 987.740172][T15620] should_fail+0x5d8/0x740 [ 987.744568][T15620] ? mempool_init_node+0x131/0x500 [ 987.749652][T15620] should_failslab+0x5/0x20 [ 987.754129][T15620] __kmalloc+0x5f/0x2f0 [ 987.758269][T15620] mempool_init_node+0x131/0x500 [ 987.763181][T15620] ? ida_alloc_range+0x8e5/0x940 [ 987.768103][T15620] ? mempool_free+0x380/0x380 [ 987.772844][T15620] ? mempool_alloc_slab+0x20/0x20 [ 987.777842][T15620] mempool_init+0x35/0x50 [ 987.782147][T15620] bioset_init+0x465/0x610 [ 987.786540][T15620] blk_alloc_queue_node+0xc4/0x570 [ 987.791630][T15620] blk_mq_init_queue+0x33/0xa0 [ 987.796370][T15620] loop_add+0x256/0x710 [ 987.800501][T15620] ? radix_tree_lookup+0x1c0/0x1d0 [ 987.805596][T15620] loop_control_ioctl+0x468/0x680 [ 987.810609][T15620] ? xor_init+0x60/0x60 [ 987.814740][T15620] do_vfs_ioctl+0x6fb/0x15b0 [ 987.819307][T15620] __x64_sys_ioctl+0xd4/0x110 [ 987.823961][T15620] do_syscall_64+0xcb/0x1e0 [ 987.828439][T15620] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 987.834311][T15620] RIP: 0033:0x7fddc0dc7e99 [ 987.838706][T15620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.858285][T15620] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 987.866668][T15620] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 987.874613][T15620] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 17:30:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb803000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb804000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 987.882561][T15620] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.890510][T15620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.898455][T15620] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 987.906413][T15627] CPU: 1 PID: 15627 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 987.916637][T15627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.926680][T15627] Call Trace: [ 987.929961][T15627] dump_stack+0x18e/0x1de 17:30:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 14) 17:30:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x7}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 987.934289][T15627] should_fail+0x5d8/0x740 [ 987.938708][T15627] ? radix_tree_node_alloc+0x84/0x370 [ 987.944075][T15627] should_failslab+0x5/0x20 [ 987.948567][T15627] kmem_cache_alloc+0x36/0x290 [ 987.953323][T15627] radix_tree_node_alloc+0x84/0x370 [ 987.958522][T15627] idr_get_free+0x2aa/0x900 [ 987.963021][T15627] idr_alloc_cyclic+0x170/0x510 [ 987.967871][T15627] btf_new_fd+0x3098/0x36a0 [ 987.969756][T15645] FAULT_INJECTION: forcing a failure. [ 987.969756][T15645] name failslab, interval 1, probability 0, space 0, times 0 [ 987.972365][T15627] ? cred_has_capability+0x14f/0x340 [ 987.972376][T15627] ? security_capable+0xb1/0xd0 [ 987.972391][T15627] __do_sys_bpf+0x12ab/0xbd30 [ 987.999692][T15627] ? refcount_sub_and_test_checked+0x151/0x210 [ 988.005825][T15627] ? proc_fail_nth_read+0x150/0x150 [ 988.011001][T15627] ? proc_fail_nth_write+0x157/0x1c0 [ 988.016262][T15627] ? memset+0x1f/0x40 [ 988.020251][T15627] ? __sb_end_write+0xb5/0x100 [ 988.024991][T15627] ? vfs_write+0x422/0x4e0 [ 988.029386][T15627] ? fput_many+0x42/0x1a0 [ 988.033692][T15627] ? check_preemption_disabled+0xde/0x2c0 [ 988.039386][T15627] do_syscall_64+0xcb/0x1e0 [ 988.043870][T15627] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 988.049737][T15627] RIP: 0033:0x7f218a5e8e99 [ 988.054131][T15627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 988.073710][T15627] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 988.082182][T15627] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 988.090217][T15627] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 988.098165][T15627] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.106112][T15627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 988.114057][T15627] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 988.122014][T15645] CPU: 0 PID: 15645 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 988.132253][T15645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.142289][T15645] Call Trace: [ 988.145554][T15645] dump_stack+0x18e/0x1de [ 988.149854][T15645] should_fail+0x5d8/0x740 [ 988.154236][T15645] ? mempool_alloc_slab+0x16/0x20 [ 988.159229][T15645] should_failslab+0x5/0x20 [ 988.163701][T15645] kmem_cache_alloc+0x36/0x290 [ 988.168435][T15645] ? __kmalloc+0x174/0x2f0 [ 988.172818][T15645] ? mempool_init_node+0x131/0x500 [ 988.177896][T15645] mempool_alloc_slab+0x16/0x20 [ 988.182714][T15645] ? mempool_free+0x380/0x380 [ 988.187359][T15645] mempool_init_node+0x1f6/0x500 [ 988.192260][T15645] ? mempool_free+0x380/0x380 [ 988.196904][T15645] ? mempool_alloc_slab+0x20/0x20 [ 988.201893][T15645] mempool_init+0x35/0x50 [ 988.206190][T15645] bioset_init+0x465/0x610 [ 988.210574][T15645] blk_alloc_queue_node+0xc4/0x570 [ 988.215652][T15645] blk_mq_init_queue+0x33/0xa0 [ 988.220383][T15645] loop_add+0x256/0x710 [ 988.224765][T15645] ? radix_tree_lookup+0x1c0/0x1d0 [ 988.229839][T15645] loop_control_ioctl+0x468/0x680 [ 988.234828][T15645] ? xor_init+0x60/0x60 [ 988.238952][T15645] do_vfs_ioctl+0x6fb/0x15b0 [ 988.243510][T15645] __x64_sys_ioctl+0xd4/0x110 [ 988.248164][T15645] do_syscall_64+0xcb/0x1e0 [ 988.252640][T15645] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 988.258501][T15645] RIP: 0033:0x7fddc0dc7e99 [ 988.262884][T15645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:30:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000007000000000c0000000a00000006000000000000070000000000030000000000000000"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 17:30:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb901000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x8}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 9) 17:30:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 15) [ 988.282557][T15645] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 988.291051][T15645] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 988.299001][T15645] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 988.307029][T15645] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.314975][T15645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 988.322927][T15645] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb902000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x9}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 988.354592][T15749] FAULT_INJECTION: forcing a failure. [ 988.354592][T15749] name failslab, interval 1, probability 0, space 0, times 0 [ 988.373301][T15752] FAULT_INJECTION: forcing a failure. [ 988.373301][T15752] name failslab, interval 1, probability 0, space 0, times 0 [ 988.380311][T15749] CPU: 1 PID: 15749 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 988.396110][T15749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.406142][T15749] Call Trace: [ 988.409413][T15749] dump_stack+0x18e/0x1de [ 988.413722][T15749] should_fail+0x5d8/0x740 [ 988.418113][T15749] ? mempool_alloc_slab+0x16/0x20 [ 988.423113][T15749] should_failslab+0x5/0x20 [ 988.427591][T15749] kmem_cache_alloc+0x36/0x290 [ 988.432331][T15749] ? __kmalloc+0x174/0x2f0 [ 988.436895][T15749] ? mempool_init_node+0x131/0x500 [ 988.441984][T15749] mempool_alloc_slab+0x16/0x20 [ 988.446807][T15749] ? mempool_free+0x380/0x380 [ 988.451459][T15749] mempool_init_node+0x1f6/0x500 [ 988.456373][T15749] ? mempool_free+0x380/0x380 [ 988.461027][T15749] ? mempool_alloc_slab+0x20/0x20 [ 988.466025][T15749] mempool_init+0x35/0x50 [ 988.470337][T15749] bioset_init+0x465/0x610 [ 988.474733][T15749] blk_alloc_queue_node+0xc4/0x570 [ 988.479823][T15749] blk_mq_init_queue+0x33/0xa0 [ 988.484563][T15749] loop_add+0x256/0x710 [ 988.488694][T15749] ? radix_tree_lookup+0x1c0/0x1d0 [ 988.493788][T15749] loop_control_ioctl+0x468/0x680 [ 988.498790][T15749] ? xor_init+0x60/0x60 [ 988.502937][T15749] do_vfs_ioctl+0x6fb/0x15b0 [ 988.507526][T15749] __x64_sys_ioctl+0xd4/0x110 [ 988.512195][T15749] do_syscall_64+0xcb/0x1e0 [ 988.516689][T15749] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 988.522562][T15749] RIP: 0033:0x7fddc0dc7e99 [ 988.526957][T15749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 988.546540][T15749] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 988.554929][T15749] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 988.562964][T15749] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 988.570914][T15749] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.578951][T15749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 988.586899][T15749] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 988.594858][T15752] CPU: 0 PID: 15752 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 17:30:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xa}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000007000000000c0000000a00000006000000000000070000000000030000000000000000"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 17:30:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 16) 17:30:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xb}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 988.605125][T15752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.615172][T15752] Call Trace: [ 988.618454][T15752] dump_stack+0x18e/0x1de [ 988.622775][T15752] should_fail+0x5d8/0x740 [ 988.627185][T15752] ? radix_tree_node_alloc+0x84/0x370 [ 988.632553][T15752] should_failslab+0x5/0x20 [ 988.637137][T15752] kmem_cache_alloc+0x36/0x290 [ 988.641916][T15752] radix_tree_node_alloc+0x84/0x370 [ 988.647110][T15752] idr_get_free+0x2aa/0x900 17:30:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb904000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.651608][T15752] idr_alloc_cyclic+0x170/0x510 [ 988.652756][T15866] FAULT_INJECTION: forcing a failure. [ 988.652756][T15866] name failslab, interval 1, probability 0, space 0, times 0 [ 988.656449][T15752] btf_new_fd+0x3098/0x36a0 [ 988.656462][T15752] ? cred_has_capability+0x14f/0x340 [ 988.656477][T15752] ? security_capable+0xb1/0xd0 [ 988.683610][T15752] __do_sys_bpf+0x12ab/0xbd30 [ 988.688282][T15752] ? refcount_sub_and_test_checked+0x151/0x210 [ 988.694461][T15752] ? proc_fail_nth_read+0x150/0x150 [ 988.699642][T15752] ? proc_fail_nth_write+0x157/0x1c0 [ 988.704907][T15752] ? memset+0x1f/0x40 [ 988.708879][T15752] ? __sb_end_write+0xb5/0x100 [ 988.713622][T15752] ? vfs_write+0x422/0x4e0 [ 988.718018][T15752] ? fput_many+0x42/0x1a0 [ 988.722333][T15752] ? check_preemption_disabled+0xde/0x2c0 [ 988.728552][T15752] do_syscall_64+0xcb/0x1e0 [ 988.733038][T15752] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 988.738905][T15752] RIP: 0033:0x7f218a5e8e99 [ 988.743300][T15752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 988.762880][T15752] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 988.771268][T15752] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 988.779214][T15752] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 988.787159][T15752] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.795107][T15752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 988.803055][T15752] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 988.811014][T15866] CPU: 1 PID: 15866 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 988.821239][T15866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.831269][T15866] Call Trace: [ 988.834545][T15866] dump_stack+0x18e/0x1de [ 988.838862][T15866] should_fail+0x5d8/0x740 [ 988.843249][T15866] ? mempool_init_node+0x131/0x500 [ 988.848329][T15866] should_failslab+0x5/0x20 [ 988.852798][T15866] __kmalloc+0x5f/0x2f0 [ 988.856923][T15866] ? mempool_init_node+0x131/0x500 [ 988.862002][T15866] mempool_init_node+0x131/0x500 [ 988.866908][T15866] ? mempool_free+0x380/0x380 [ 988.871569][T15866] ? mempool_alloc_slab+0x20/0x20 [ 988.876602][T15866] mempool_init+0x35/0x50 [ 988.880900][T15866] bioset_init+0x4da/0x610 [ 988.885288][T15866] blk_alloc_queue_node+0xc4/0x570 [ 988.890370][T15866] blk_mq_init_queue+0x33/0xa0 [ 988.895104][T15866] loop_add+0x256/0x710 [ 988.899233][T15866] ? radix_tree_lookup+0x1c0/0x1d0 [ 988.904321][T15866] loop_control_ioctl+0x468/0x680 [ 988.909312][T15866] ? xor_init+0x60/0x60 [ 988.913443][T15866] do_vfs_ioctl+0x6fb/0x15b0 [ 988.918003][T15866] __x64_sys_ioctl+0xd4/0x110 [ 988.922648][T15866] do_syscall_64+0xcb/0x1e0 [ 988.927119][T15866] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 988.932984][T15866] RIP: 0033:0x7fddc0dc7e99 [ 988.937385][T15866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:30:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 10) 17:30:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xc}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:56 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:56 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x60100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1, 0x9, 0x10000}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="8c961dfe05f08112073eee732c3e04000000eb010018000000000000000c0000000c0000000a000000060000007ec1016241c619a3a469607eeb9600000007"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x1, 0x3, 0x3, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r2, 0x3, 0x3, 0x4}, 0x40) 17:30:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 17) [ 988.956962][T15866] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 988.965337][T15866] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 988.973277][T15866] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 988.981278][T15866] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.989219][T15866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 988.997157][T15866] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 989.026798][T15979] FAULT_INJECTION: forcing a failure. [ 989.026798][T15979] name failslab, interval 1, probability 0, space 0, times 0 [ 989.035763][T16026] FAULT_INJECTION: forcing a failure. [ 989.035763][T16026] name failslab, interval 1, probability 0, space 0, times 0 [ 989.050012][T15979] CPU: 0 PID: 15979 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 989.062218][T15979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.072259][T15979] Call Trace: [ 989.075542][T15979] dump_stack+0x18e/0x1de [ 989.079859][T15979] should_fail+0x5d8/0x740 [ 989.084256][T15979] ? __alloc_file+0x26/0x380 [ 989.088821][T15979] should_failslab+0x5/0x20 [ 989.093387][T15979] kmem_cache_alloc+0x36/0x290 [ 989.098125][T15979] __alloc_file+0x26/0x380 [ 989.102520][T15979] ? alloc_empty_file+0x49/0x1b0 [ 989.107436][T15979] alloc_empty_file+0xa9/0x1b0 [ 989.112174][T15979] alloc_file+0x57/0x4d0 [ 989.116395][T15979] alloc_file_pseudo+0x1c5/0x240 [ 989.121312][T15979] __anon_inode_getfd+0x242/0x390 [ 989.126319][T15979] btf_new_fd+0x3142/0x36a0 [ 989.130800][T15979] ? cred_has_capability+0x14f/0x340 [ 989.136080][T15979] ? security_capable+0xb1/0xd0 [ 989.140909][T15979] __do_sys_bpf+0x12ab/0xbd30 [ 989.145567][T15979] ? refcount_sub_and_test_checked+0x151/0x210 [ 989.151697][T15979] ? proc_fail_nth_read+0x150/0x150 [ 989.156871][T15979] ? proc_fail_nth_write+0x157/0x1c0 [ 989.162132][T15979] ? memset+0x1f/0x40 [ 989.166092][T15979] ? __sb_end_write+0xb5/0x100 [ 989.170833][T15979] ? vfs_write+0x422/0x4e0 [ 989.175226][T15979] ? fput_many+0x42/0x1a0 [ 989.179532][T15979] ? check_preemption_disabled+0xde/0x2c0 [ 989.185229][T15979] do_syscall_64+0xcb/0x1e0 [ 989.189710][T15979] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 989.195584][T15979] RIP: 0033:0x7f218a5e8e99 [ 989.199976][T15979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.219646][T15979] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 989.228031][T15979] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 989.235980][T15979] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 989.243929][T15979] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.251875][T15979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.259820][T15979] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 989.267777][T16026] CPU: 1 PID: 16026 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 17:30:56 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x60100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1, 0x9, 0x10000}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="8c961dfe05f08112073eee732c3e04000000eb010018000000000000000c0000000c0000000a000000060000007ec1016241c619a3a469607eeb9600000007"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x1, 0x3, 0x3, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r2, 0x3, 0x3, 0x4}, 0x40) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x60100, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1, 0x9, 0x10000}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="8c961dfe05f08112073eee732c3e04000000eb010018000000000000000c0000000c0000000a000000060000007ec1016241c619a3a469607eeb9600000007"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) write$tun(r2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x1, 0x3, 0x3, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r2, 0x3, 0x3, 0x4}, 0x40) (async) 17:30:56 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xd}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 11) 17:30:56 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x60100, 0x0) (async, rerun: 64) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) (rerun: 64) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r1, 0x9, 0x10000}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="8c961dfe05f08112073eee732c3e04000000eb010018000000000000000c0000000c0000000a000000060000007ec1016241c619a3a469607eeb9600000007"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x1, 0x3, 0x3, 0x0, 0xffffffffffffffff, 0x400, '\x00', 0x0, r2, 0x3, 0x3, 0x4}, 0x40) [ 989.278002][T16026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.288044][T16026] Call Trace: [ 989.288453][T16090] FAULT_INJECTION: forcing a failure. [ 989.288453][T16090] name failslab, interval 1, probability 0, space 0, times 0 [ 989.291323][T16026] dump_stack+0x18e/0x1de [ 989.291340][T16026] should_fail+0x5d8/0x740 [ 989.312609][T16026] ? mempool_alloc_slab+0x16/0x20 [ 989.317618][T16026] should_failslab+0x5/0x20 [ 989.322107][T16026] kmem_cache_alloc+0x36/0x290 17:30:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@union={0x6, 0x7, 0x0, 0x7, 0x1, 0x0, [{0x2, 0x1000003, 0xff9}, {0x0, 0x2, 0x2}, {0xa, 0x5, 0xf746}, {0x8, 0x1, 0x40}, {0x6, 0x4, 0xfffffff7}, {0xb, 0x0, 0xf43}, {0x3, 0x5, 0x3ad6186a}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x82, 0xe8}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x101400, 0x0) write$tun(r0, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000000)=0xf000) write$tcp_congestion(r0, &(0x7f0000000040)='dctcp\x00', 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) [ 989.326856][T16026] ? __kmalloc+0x174/0x2f0 [ 989.331254][T16026] ? mempool_init_node+0x131/0x500 [ 989.336355][T16026] mempool_alloc_slab+0x16/0x20 [ 989.341453][T16026] ? mempool_free+0x380/0x380 [ 989.346116][T16026] mempool_init_node+0x1f6/0x500 [ 989.351039][T16026] ? mempool_free+0x380/0x380 [ 989.355699][T16026] ? mempool_alloc_slab+0x20/0x20 [ 989.360707][T16026] mempool_init+0x35/0x50 [ 989.365017][T16026] bioset_init+0x4da/0x610 [ 989.369421][T16026] blk_alloc_queue_node+0xc4/0x570 17:30:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@union={0x6, 0x7, 0x0, 0x7, 0x1, 0x0, [{0x2, 0x1000003, 0xff9}, {0x0, 0x2, 0x2}, {0xa, 0x5, 0xf746}, {0x8, 0x1, 0x40}, {0x6, 0x4, 0xfffffff7}, {0xb, 0x0, 0xf43}, {0x3, 0x5, 0x3ad6186a}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x82, 0xe8}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x101400, 0x0) write$tun(r0, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000000)=0xf000) write$tcp_congestion(r0, &(0x7f0000000040)='dctcp\x00', 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@union={0x6, 0x7, 0x0, 0x7, 0x1, 0x0, [{0x2, 0x1000003, 0xff9}, {0x0, 0x2, 0x2}, {0xa, 0x5, 0xf746}, {0x8, 0x1, 0x40}, {0x6, 0x4, 0xfffffff7}, {0xb, 0x0, 0xf43}, {0x3, 0x5, 0x3ad6186a}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x82, 0xe8}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x101400, 0x0) (async) write$tun(r0, 0x0, 0x0) (async) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000000)=0xf000) (async) write$tcp_congestion(r0, &(0x7f0000000040)='dctcp\x00', 0x6) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) 17:30:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@union={0x6, 0x7, 0x0, 0x7, 0x1, 0x0, [{0x2, 0x1000003, 0xff9}, {0x0, 0x2, 0x2}, {0xa, 0x5, 0xf746}, {0x8, 0x1, 0x40}, {0x6, 0x4, 0xfffffff7}, {0xb, 0x0, 0xf43}, {0x3, 0x5, 0x3ad6186a}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x82, 0xe8}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x101400, 0x0) write$tun(r0, 0x0, 0x0) (async) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000000)=0xf000) write$tcp_congestion(r0, &(0x7f0000000040)='dctcp\x00', 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) [ 989.374514][T16026] blk_mq_init_queue+0x33/0xa0 [ 989.379262][T16026] loop_add+0x256/0x710 [ 989.383408][T16026] ? radix_tree_lookup+0x1c0/0x1d0 [ 989.388507][T16026] loop_control_ioctl+0x468/0x680 [ 989.393517][T16026] ? xor_init+0x60/0x60 [ 989.397659][T16026] do_vfs_ioctl+0x6fb/0x15b0 [ 989.402237][T16026] __x64_sys_ioctl+0xd4/0x110 [ 989.406894][T16026] do_syscall_64+0xcb/0x1e0 [ 989.411381][T16026] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 989.417259][T16026] RIP: 0033:0x7fddc0dc7e99 17:30:56 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000106000000000000302e0000e6e8e6b500000000000000dfeb145c8ff783ef6a23020fe25d81b551728042c6c558c3ad433c0107f144a4b05379f11af1a27f81934f3e4e8a1e5ae4dfafb658cdff0904b9e2e26b8631c05e2a720c032aa058e76d0189e0b756dbe4fa3b34af940f1ff01e9a812ef8ffff51018ae7bba469863f76fa2f8add3d0f7ec9929dbc3e2a4ca13a1c7c81dded3c497f7f"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f00000003c0)='io.pressure\x00', 0x2, 0x0) write$tun(r2, 0x0, 0x0) ioctl$KVM_CAP_X2APIC_API(r2, 0x4068aea3, &(0x7f0000000280)={0x81, 0x0, 0x3}) r3 = getpid() pidfd_open(r3, 0x0) pidfd_open(r3, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0xa) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000000300)=""/172) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000300)={0x0, 0x0, r5, 0x7, 0x80000}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x80000000, 0x9, 0x9, 0x800, r1, 0x5, '\x00', 0x0, r4, 0x0, 0x4, 0x5}, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x3, 0x2, &(0x7f0000000180)="581925a3bd253d6265d9ad782e354f0ce16f55defb167e0bec8473d0c781b1b8c8a2cdef0e1acae90b3b71b53f5126d3e6461fce02887d42477ec291571f4f0de8e114dd754f4b5ec37d225c44f787e3ee2849dbee48edae946f0c34949ea51a1016513bb9954eea3cb6be5cbbb92483ad632e390103533f940962e1b0611033498a3941d3f2bf4e", 0x20, 0x0, 0x1}, 0x9) [ 989.421663][T16026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.441246][T16026] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 989.449732][T16026] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 989.457693][T16026] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 989.466085][T16026] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.474389][T16026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.482345][T16026] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 989.490311][T16090] CPU: 0 PID: 16090 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 989.500536][T16090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.510747][T16090] Call Trace: [ 989.514116][T16090] dump_stack+0x18e/0x1de [ 989.516623][T16618] FAULT_INJECTION: forcing a failure. [ 989.516623][T16618] name failslab, interval 1, probability 0, space 0, times 0 [ 989.518439][T16090] should_fail+0x5d8/0x740 [ 989.518449][T16090] ? __alloc_file+0x26/0x380 [ 989.518459][T16090] should_failslab+0x5/0x20 [ 989.518473][T16090] kmem_cache_alloc+0x36/0x290 [ 989.549202][T16090] ? __d_alloc+0x2a/0x6a0 [ 989.553516][T16090] __alloc_file+0x26/0x380 [ 989.557924][T16090] ? alloc_empty_file+0x49/0x1b0 [ 989.562848][T16090] alloc_empty_file+0xa9/0x1b0 [ 989.567597][T16090] alloc_file+0x57/0x4d0 [ 989.571822][T16090] alloc_file_pseudo+0x1c5/0x240 17:30:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 18) 17:30:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xe}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x10}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:56 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x11}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 989.576751][T16090] __anon_inode_getfd+0x242/0x390 [ 989.581856][T16090] btf_new_fd+0x3142/0x36a0 [ 989.586352][T16090] ? cred_has_capability+0x14f/0x340 [ 989.591630][T16090] ? security_capable+0xb1/0xd0 [ 989.596473][T16090] __do_sys_bpf+0x12ab/0xbd30 [ 989.601144][T16090] ? refcount_sub_and_test_checked+0x151/0x210 [ 989.607277][T16090] ? proc_fail_nth_read+0x150/0x150 [ 989.612454][T16090] ? proc_fail_nth_write+0x157/0x1c0 [ 989.617722][T16090] ? memset+0x1f/0x40 [ 989.621686][T16090] ? __sb_end_write+0xb5/0x100 [ 989.626422][T16090] ? vfs_write+0x422/0x4e0 [ 989.630830][T16090] ? fput_many+0x42/0x1a0 [ 989.635143][T16090] ? check_preemption_disabled+0xde/0x2c0 [ 989.640860][T16090] do_syscall_64+0xcb/0x1e0 [ 989.645341][T16090] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 989.651213][T16090] RIP: 0033:0x7f218a5e8e99 [ 989.655609][T16090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.675195][T16090] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 989.683582][T16090] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 989.691528][T16090] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 989.699560][T16090] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.707508][T16090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.715461][T16090] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 989.723418][T16618] CPU: 1 PID: 16618 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 989.733639][T16618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.743674][T16618] Call Trace: [ 989.746948][T16618] dump_stack+0x18e/0x1de [ 989.751271][T16618] should_fail+0x5d8/0x740 [ 989.755677][T16618] ? mempool_alloc_slab+0x16/0x20 [ 989.760690][T16618] should_failslab+0x5/0x20 [ 989.765178][T16618] kmem_cache_alloc+0x36/0x290 [ 989.767153][T16715] FAULT_INJECTION: forcing a failure. [ 989.767153][T16715] name failslab, interval 1, probability 0, space 0, times 0 [ 989.769927][T16618] mempool_alloc_slab+0x16/0x20 [ 989.769935][T16618] ? mempool_free+0x380/0x380 [ 989.769942][T16618] mempool_init_node+0x1f6/0x500 [ 989.769950][T16618] ? mempool_free+0x380/0x380 [ 989.769963][T16618] ? mempool_alloc_slab+0x20/0x20 [ 989.806528][T16618] mempool_init+0x35/0x50 [ 989.810835][T16618] bioset_init+0x4da/0x610 [ 989.815231][T16618] blk_alloc_queue_node+0xc4/0x570 [ 989.820320][T16618] blk_mq_init_queue+0x33/0xa0 [ 989.825055][T16618] loop_add+0x256/0x710 [ 989.829184][T16618] ? radix_tree_lookup+0x1c0/0x1d0 [ 989.834270][T16618] loop_control_ioctl+0x468/0x680 [ 989.839267][T16618] ? xor_init+0x60/0x60 [ 989.843396][T16618] do_vfs_ioctl+0x6fb/0x15b0 [ 989.847961][T16618] __x64_sys_ioctl+0xd4/0x110 [ 989.852610][T16618] do_syscall_64+0xcb/0x1e0 [ 989.857091][T16618] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 989.862955][T16618] RIP: 0033:0x7fddc0dc7e99 [ 989.867345][T16618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.886920][T16618] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 989.895300][T16618] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 989.903245][T16618] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 989.911188][T16618] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.919133][T16618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 12) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x12}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:57 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000106000000000000302e0000e6e8e6b500000000000000dfeb145c8ff783ef6a23020fe25d81b551728042c6c558c3ad433c0107f144a4b05379f11af1a27f81934f3e4e8a1e5ae4dfafb658cdff0904b9e2e26b8631c05e2a720c032aa058e76d0189e0b756dbe4fa3b34af940f1ff01e9a812ef8ffff51018ae7bba469863f76fa2f8add3d0f7ec9929dbc3e2a4ca13a1c7c81dded3c497f7f"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f00000003c0)='io.pressure\x00', 0x2, 0x0) (async) write$tun(r2, 0x0, 0x0) (async) ioctl$KVM_CAP_X2APIC_API(r2, 0x4068aea3, &(0x7f0000000280)={0x81, 0x0, 0x3}) r3 = getpid() pidfd_open(r3, 0x0) pidfd_open(r3, 0x0) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0xa) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000000300)=""/172) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000300)={0x0, 0x0, r5, 0x7, 0x80000}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x80000000, 0x9, 0x9, 0x800, r1, 0x5, '\x00', 0x0, r4, 0x0, 0x4, 0x5}, 0x40) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x3, 0x2, &(0x7f0000000180)="581925a3bd253d6265d9ad782e354f0ce16f55defb167e0bec8473d0c781b1b8c8a2cdef0e1acae90b3b71b53f5126d3e6461fce02887d42477ec291571f4f0de8e114dd754f4b5ec37d225c44f787e3ee2849dbee48edae946f0c34949ea51a1016513bb9954eea3cb6be5cbbb92483ad632e390103533f940962e1b0611033498a3941d3f2bf4e", 0x20, 0x0, 0x1}, 0x9) 17:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x25}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 19) 17:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x26}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.927079][T16618] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 989.935034][T16715] CPU: 0 PID: 16715 Comm: syz-executor.2 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 989.945255][T16715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.955299][T16715] Call Trace: [ 989.958580][T16715] dump_stack+0x18e/0x1de [ 989.962902][T16715] should_fail+0x5d8/0x740 [ 989.967315][T16715] ? security_file_alloc+0x32/0x1f0 [ 989.972501][T16715] should_failslab+0x5/0x20 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x43}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 989.976990][T16715] kmem_cache_alloc+0x36/0x290 [ 989.981741][T16715] security_file_alloc+0x32/0x1f0 [ 989.986753][T16715] __alloc_file+0xba/0x380 [ 989.991153][T16715] alloc_empty_file+0xa9/0x1b0 [ 989.995902][T16715] alloc_file+0x57/0x4d0 [ 990.000135][T16715] alloc_file_pseudo+0x1c5/0x240 [ 990.005071][T16715] __anon_inode_getfd+0x242/0x390 [ 990.006743][T16831] FAULT_INJECTION: forcing a failure. [ 990.006743][T16831] name failslab, interval 1, probability 0, space 0, times 0 [ 990.010173][T16715] btf_new_fd+0x3142/0x36a0 [ 990.010186][T16715] ? cred_has_capability+0x14f/0x340 [ 990.010196][T16715] ? security_capable+0xb1/0xd0 [ 990.010212][T16715] __do_sys_bpf+0x12ab/0xbd30 [ 990.042072][T16715] ? refcount_sub_and_test_checked+0x151/0x210 [ 990.048206][T16715] ? proc_fail_nth_read+0x150/0x150 [ 990.053450][T16715] ? proc_fail_nth_write+0x157/0x1c0 [ 990.058710][T16715] ? memset+0x1f/0x40 [ 990.062674][T16715] ? __sb_end_write+0xb5/0x100 [ 990.067414][T16715] ? vfs_write+0x422/0x4e0 [ 990.071808][T16715] ? fput_many+0x42/0x1a0 [ 990.076113][T16715] ? check_preemption_disabled+0xde/0x2c0 [ 990.081809][T16715] do_syscall_64+0xcb/0x1e0 [ 990.086297][T16715] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.092163][T16715] RIP: 0033:0x7f218a5e8e99 [ 990.096557][T16715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 990.116135][T16715] RSP: 002b:00007f218975f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 990.124627][T16715] RAX: ffffffffffffffda RBX: 00007f218a6fbf60 RCX: 00007f218a5e8e99 [ 990.132577][T16715] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 990.140524][T16715] RBP: 00007f218975f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 990.148471][T16715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 990.156419][T16715] R13: 00007ffce57974cf R14: 00007f218975f300 R15: 0000000000022000 [ 990.164378][T16831] CPU: 1 PID: 16831 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 17:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) (fail_nth: 13) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x48}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:57 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000106000000000000302e0000e6e8e6b500000000000000dfeb145c8ff783ef6a23020fe25d81b551728042c6c558c3ad433c0107f144a4b05379f11af1a27f81934f3e4e8a1e5ae4dfafb658cdff0904b9e2e26b8631c05e2a720c032aa058e76d0189e0b756dbe4fa3b34af940f1ff01e9a812ef8ffff51018ae7bba469863f76fa2f8add3d0f7ec9929dbc3e2a4ca13a1c7c81dded3c497f7f"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) openat$cgroup_pressure(r0, &(0x7f00000003c0)='io.pressure\x00', 0x2, 0x0) write$tun(r2, 0x0, 0x0) (async) ioctl$KVM_CAP_X2APIC_API(r2, 0x4068aea3, &(0x7f0000000280)={0x81, 0x0, 0x3}) r3 = getpid() pidfd_open(r3, 0x0) (async) pidfd_open(r3, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0xa) (async) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000000300)=""/172) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000300)={0x0, 0x0, r5, 0x7, 0x80000}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x80000000, 0x9, 0x9, 0x800, r1, 0x5, '\x00', 0x0, r4, 0x0, 0x4, 0x5}, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x3, 0x2, &(0x7f0000000180)="581925a3bd253d6265d9ad782e354f0ce16f55defb167e0bec8473d0c781b1b8c8a2cdef0e1acae90b3b71b53f5126d3e6461fce02887d42477ec291571f4f0de8e114dd754f4b5ec37d225c44f787e3ee2849dbee48edae946f0c34949ea51a1016513bb9954eea3cb6be5cbbb92483ad632e390103533f940962e1b0611033498a3941d3f2bf4e", 0x20, 0x0, 0x1}, 0x9) 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x4c}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 990.174599][T16831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.184638][T16831] Call Trace: [ 990.187918][T16831] dump_stack+0x18e/0x1de [ 990.192239][T16831] should_fail+0x5d8/0x740 [ 990.196643][T16831] ? bdi_alloc_node+0x76/0xc0 [ 990.201309][T16831] should_failslab+0x5/0x20 [ 990.205804][T16831] kmem_cache_alloc_trace+0x39/0x2b0 [ 990.211079][T16831] ? bioset_init+0x51b/0x610 [ 990.215657][T16831] bdi_alloc_node+0x76/0xc0 [ 990.220148][T16831] blk_alloc_queue_node+0x10b/0x570 [ 990.225335][T16831] blk_mq_init_queue+0x33/0xa0 [ 990.230086][T16831] loop_add+0x256/0x710 [ 990.234227][T16831] ? radix_tree_lookup+0x1c0/0x1d0 [ 990.239325][T16831] loop_control_ioctl+0x468/0x680 [ 990.244333][T16831] ? xor_init+0x60/0x60 [ 990.248481][T16831] do_vfs_ioctl+0x6fb/0x15b0 [ 990.253062][T16831] __x64_sys_ioctl+0xd4/0x110 [ 990.257736][T16831] do_syscall_64+0xcb/0x1e0 [ 990.262222][T16831] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.268084][T16831] RIP: 0033:0x7fddc0dc7e99 [ 990.272467][T16831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 990.292168][T16831] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 990.300552][T16831] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 990.308495][T16831] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 990.316871][T16831] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 990.324816][T16831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:30:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 20) 17:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x68}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:57 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80800) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x0, [0x5, 0x1000, 0xffc0000]}, &(0x7f0000000140)=0x44) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x6c}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 990.332757][T16831] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 990.367744][T16953] FAULT_INJECTION: forcing a failure. [ 990.367744][T16953] name failslab, interval 1, probability 0, space 0, times 0 17:30:57 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80800) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x0, [0x5, 0x1000, 0xffc0000]}, &(0x7f0000000140)=0x44) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) [ 990.389124][T16953] CPU: 0 PID: 16953 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 990.399370][T16953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.409416][T16953] Call Trace: [ 990.412701][T16953] dump_stack+0x18e/0x1de [ 990.417025][T16953] should_fail+0x5d8/0x740 [ 990.421437][T16953] ? bdi_init+0x196/0x940 [ 990.425768][T16953] should_failslab+0x5/0x20 [ 990.430260][T16953] kmem_cache_alloc_trace+0x39/0x2b0 [ 990.435532][T16953] ? bdi_alloc_node+0x76/0xc0 [ 990.440279][T16953] bdi_init+0x196/0x940 [ 990.444404][T16953] ? bdi_alloc_node+0x76/0xc0 [ 990.449048][T16953] bdi_alloc_node+0x86/0xc0 [ 990.453526][T16953] blk_alloc_queue_node+0x10b/0x570 [ 990.458695][T16953] blk_mq_init_queue+0x33/0xa0 [ 990.463437][T16953] loop_add+0x256/0x710 [ 990.467566][T16953] ? radix_tree_lookup+0x1c0/0x1d0 [ 990.472647][T16953] loop_control_ioctl+0x468/0x680 [ 990.477643][T16953] ? xor_init+0x60/0x60 [ 990.481771][T16953] do_vfs_ioctl+0x6fb/0x15b0 [ 990.486335][T16953] __x64_sys_ioctl+0xd4/0x110 [ 990.490981][T16953] do_syscall_64+0xcb/0x1e0 [ 990.495452][T16953] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.501310][T16953] RIP: 0033:0x7fddc0dc7e99 [ 990.505694][T16953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 990.525442][T16953] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:30:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 21) 17:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:57 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80800) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x0, [0x5, 0x1000, 0xffc0000]}, &(0x7f0000000140)=0x44) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x74}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 990.533827][T16953] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 990.541781][T16953] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 990.549811][T16953] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 990.557763][T16953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 990.565711][T16953] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x26000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:57 executing program 2: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x5c, 0x7f, 0x9, 0x2, 0x0, 0x66154d2, 0x64000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x2080, 0x380, 0x80, 0x7, 0x4, 0x80, 0x1, 0x0, 0xba, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r0, 0xd) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x10000) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000005c0)={'filter\x00', 0x1000, "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"}, &(0x7f0000000100)=0x1024) write$tun(r1, 0x0, 0x0) epoll_pwait(r1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x1ff, &(0x7f00000000c0)={[0xce5b]}, 0x8) [ 990.594655][T17175] FAULT_INJECTION: forcing a failure. [ 990.594655][T17175] name failslab, interval 1, probability 0, space 0, times 0 [ 990.609501][T17175] CPU: 0 PID: 17175 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 990.619738][T17175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.629789][T17175] Call Trace: [ 990.633072][T17175] dump_stack+0x18e/0x1de [ 990.637398][T17175] should_fail+0x5d8/0x740 17:30:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.641810][T17175] ? __percpu_counter_init+0x1aa/0x1e0 [ 990.647257][T17175] ? blk_alloc_queue_stats+0x48/0x100 [ 990.652622][T17175] should_failslab+0x5/0x20 [ 990.657120][T17175] kmem_cache_alloc_trace+0x39/0x2b0 [ 990.662398][T17175] blk_alloc_queue_stats+0x48/0x100 [ 990.667590][T17175] blk_alloc_queue_node+0x14d/0x570 [ 990.672783][T17175] blk_mq_init_queue+0x33/0xa0 [ 990.677540][T17175] loop_add+0x256/0x710 [ 990.681686][T17175] ? radix_tree_lookup+0x1c0/0x1d0 [ 990.686777][T17175] loop_control_ioctl+0x468/0x680 [ 990.691776][T17175] ? xor_init+0x60/0x60 [ 990.695905][T17175] do_vfs_ioctl+0x6fb/0x15b0 [ 990.700478][T17175] __x64_sys_ioctl+0xd4/0x110 [ 990.705130][T17175] do_syscall_64+0xcb/0x1e0 [ 990.709608][T17175] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.715471][T17175] RIP: 0033:0x7fddc0dc7e99 [ 990.719857][T17175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:30:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 22) 17:30:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x7a}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x5c, 0x7f, 0x9, 0x2, 0x0, 0x66154d2, 0x64000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x2080, 0x380, 0x80, 0x7, 0x4, 0x80, 0x1, 0x0, 0xba, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r0, 0xd) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async) r2 = socket$inet(0x2, 0xa, 0x10000) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000005c0)={'filter\x00', 0x1000, "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"}, &(0x7f0000000100)=0x1024) (async) write$tun(r1, 0x0, 0x0) (async) epoll_pwait(r1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x1ff, &(0x7f00000000c0)={[0xce5b]}, 0x8) 17:30:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 990.739523][T17175] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 990.747948][T17175] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 990.755889][T17175] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 990.763829][T17175] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 990.771807][T17175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 990.779747][T17175] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xe7}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x300}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async, rerun: 64) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (rerun: 64) write$tun(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x5c, 0x7f, 0x9, 0x2, 0x0, 0x66154d2, 0x64000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x2080, 0x380, 0x80, 0x7, 0x4, 0x80, 0x1, 0x0, 0xba, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r0, 0xd) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (async, rerun: 64) r2 = socket$inet(0x2, 0xa, 0x10000) (rerun: 64) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000005c0)={'filter\x00', 0x1000, "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"}, &(0x7f0000000100)=0x1024) (async, rerun: 64) write$tun(r1, 0x0, 0x0) (rerun: 64) epoll_pwait(r1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x1ff, &(0x7f00000000c0)={[0xce5b]}, 0x8) [ 990.813753][T17401] FAULT_INJECTION: forcing a failure. [ 990.813753][T17401] name failslab, interval 1, probability 0, space 0, times 0 [ 990.838720][T17401] CPU: 0 PID: 17401 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 990.848963][T17401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.859006][T17401] Call Trace: [ 990.862295][T17401] dump_stack+0x18e/0x1de [ 990.866625][T17401] should_fail+0x5d8/0x740 [ 990.871036][T17401] ? blk_stat_alloc_callback+0x5c/0x210 [ 990.876576][T17401] should_failslab+0x5/0x20 [ 990.881073][T17401] kmem_cache_alloc_trace+0x39/0x2b0 [ 990.886352][T17401] ? blk_mq_poll_stats_fn+0x1b0/0x1b0 [ 990.891827][T17401] ? blk_mq_free_tag_set+0x470/0x470 [ 990.897086][T17401] blk_stat_alloc_callback+0x5c/0x210 [ 990.902439][T17401] blk_mq_init_allocated_queue+0x86/0x16e0 [ 990.908226][T17401] ? blk_timeout_work+0x10/0x10 [ 990.913059][T17401] ? blk_alloc_queue_node+0x4e0/0x570 [ 990.918413][T17401] blk_mq_init_queue+0x48/0xa0 [ 990.923157][T17401] loop_add+0x256/0x710 [ 990.927288][T17401] ? radix_tree_lookup+0x1c0/0x1d0 [ 990.932381][T17401] loop_control_ioctl+0x468/0x680 [ 990.937378][T17401] ? xor_init+0x60/0x60 [ 990.941506][T17401] do_vfs_ioctl+0x6fb/0x15b0 [ 990.946122][T17401] __x64_sys_ioctl+0xd4/0x110 [ 990.950779][T17401] do_syscall_64+0xcb/0x1e0 [ 990.955253][T17401] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.961213][T17401] RIP: 0033:0x7fddc0dc7e99 [ 990.965606][T17401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 990.985179][T17401] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 990.993575][T17401] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 991.001517][T17401] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 17:30:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 23) 17:30:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x500}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000003c0)={r0, 0x1, 0x8}) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000003940)=[{{&(0x7f0000000000), 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/129, 0x81}, {&(0x7f00000001c0)=""/75, 0x4b}, {&(0x7f0000000240)=""/108, 0x6c}], 0x5, &(0x7f0000000340)=""/123, 0x7b}, 0x5}, {{&(0x7f0000000440)=@phonet, 0x80, &(0x7f0000003840)=[{&(0x7f00000015c0)=""/196, 0xc4}, {&(0x7f00000016c0)=""/195, 0xc3}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/65, 0x41}, {&(0x7f0000002840)=""/4096, 0x1000}], 0x5, &(0x7f00000038c0)=""/114, 0x72}, 0x2}], 0x2, 0x40000020, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 991.009461][T17401] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 991.017402][T17401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 991.025340][T17401] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 991.052354][T17619] FAULT_INJECTION: forcing a failure. [ 991.052354][T17619] name failslab, interval 1, probability 0, space 0, times 0 17:30:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x600}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000003c0)={r0, 0x1, 0x8}) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000003940)=[{{&(0x7f0000000000), 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/129, 0x81}, {&(0x7f00000001c0)=""/75, 0x4b}, {&(0x7f0000000240)=""/108, 0x6c}], 0x5, &(0x7f0000000340)=""/123, 0x7b}, 0x5}, {{&(0x7f0000000440)=@phonet, 0x80, &(0x7f0000003840)=[{&(0x7f00000015c0)=""/196, 0xc4}, {&(0x7f00000016c0)=""/195, 0xc3}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/65, 0x41}, {&(0x7f0000002840)=""/4096, 0x1000}], 0x5, &(0x7f00000038c0)=""/114, 0x72}, 0x2}], 0x2, 0x40000020, 0x0) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (rerun: 32) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 991.070138][T17619] CPU: 0 PID: 17619 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 991.080378][T17619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.090430][T17619] Call Trace: [ 991.093726][T17619] dump_stack+0x18e/0x1de [ 991.098049][T17619] should_fail+0x5d8/0x740 [ 991.102462][T17619] ? blk_mq_poll_stats_fn+0x1b0/0x1b0 [ 991.107825][T17619] ? blk_stat_alloc_callback+0x95/0x210 [ 991.113381][T17619] should_failslab+0x5/0x20 [ 991.117883][T17619] __kmalloc+0x5f/0x2f0 [ 991.122031][T17619] ? blk_stat_alloc_callback+0x5c/0x210 [ 991.127654][T17619] ? blk_mq_poll_stats_fn+0x1b0/0x1b0 [ 991.133025][T17619] ? blk_mq_free_tag_set+0x470/0x470 [ 991.138294][T17619] blk_stat_alloc_callback+0x95/0x210 [ 991.143765][T17619] ? blk_mq_free_tag_set+0x470/0x470 [ 991.149021][T17619] ? blk_mq_poll_stats_fn+0x1b0/0x1b0 [ 991.154361][T17619] blk_mq_init_allocated_queue+0x86/0x16e0 [ 991.160143][T17619] ? blk_timeout_work+0x10/0x10 [ 991.164961][T17619] ? blk_alloc_queue_node+0x4e0/0x570 [ 991.170299][T17619] blk_mq_init_queue+0x48/0xa0 [ 991.175031][T17619] loop_add+0x256/0x710 [ 991.179155][T17619] ? radix_tree_lookup+0x1c0/0x1d0 [ 991.184237][T17619] loop_control_ioctl+0x468/0x680 [ 991.189227][T17619] ? xor_init+0x60/0x60 [ 991.193354][T17619] do_vfs_ioctl+0x6fb/0x15b0 [ 991.197914][T17619] __x64_sys_ioctl+0xd4/0x110 [ 991.202559][T17619] do_syscall_64+0xcb/0x1e0 [ 991.207029][T17619] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 991.212947][T17619] RIP: 0033:0x7fddc0dc7e99 [ 991.217329][T17619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 991.237079][T17619] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 991.245458][T17619] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 991.253408][T17619] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 991.261352][T17619] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 17:30:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 24) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000003c0)={r0, 0x1, 0x8}) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000003940)=[{{&(0x7f0000000000), 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/129, 0x81}, {&(0x7f00000001c0)=""/75, 0x4b}, {&(0x7f0000000240)=""/108, 0x6c}], 0x5, &(0x7f0000000340)=""/123, 0x7b}, 0x5}, {{&(0x7f0000000440)=@phonet, 0x80, &(0x7f0000003840)=[{&(0x7f00000015c0)=""/196, 0xc4}, {&(0x7f00000016c0)=""/195, 0xc3}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/65, 0x41}, {&(0x7f0000002840)=""/4096, 0x1000}], 0x5, &(0x7f00000038c0)=""/114, 0x72}, 0x2}], 0x2, 0x40000020, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x700}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x900}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.269292][T17619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 991.277232][T17619] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 991.310366][T17845] FAULT_INJECTION: forcing a failure. 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xa00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xb00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 991.310366][T17845] name failslab, interval 1, probability 0, space 0, times 0 [ 991.332874][T17845] CPU: 0 PID: 17845 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 991.343121][T17845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.353166][T17845] Call Trace: [ 991.356449][T17845] dump_stack+0x18e/0x1de [ 991.360775][T17845] should_fail+0x5d8/0x740 [ 991.365176][T17845] ? blk_mq_init_allocated_queue+0xf0/0x16e0 [ 991.371126][T17845] should_failslab+0x5/0x20 [ 991.375599][T17845] kmem_cache_alloc_trace+0x39/0x2b0 [ 991.380853][T17845] ? blk_stat_alloc_callback+0x1a4/0x210 [ 991.386459][T17845] ? blk_mq_free_tag_set+0x470/0x470 [ 991.391713][T17845] ? blk_mq_poll_stats_fn+0x1b0/0x1b0 [ 991.397057][T17845] blk_mq_init_allocated_queue+0xf0/0x16e0 [ 991.402832][T17845] ? blk_alloc_queue_node+0x4e0/0x570 [ 991.408177][T17845] blk_mq_init_queue+0x48/0xa0 [ 991.412910][T17845] loop_add+0x256/0x710 [ 991.417049][T17845] ? radix_tree_lookup+0x1c0/0x1d0 [ 991.422130][T17845] loop_control_ioctl+0x468/0x680 [ 991.427131][T17845] ? xor_init+0x60/0x60 [ 991.431271][T17845] do_vfs_ioctl+0x6fb/0x15b0 [ 991.435833][T17845] __x64_sys_ioctl+0xd4/0x110 [ 991.440477][T17845] do_syscall_64+0xcb/0x1e0 [ 991.444949][T17845] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 991.450809][T17845] RIP: 0033:0x7fddc0dc7e99 [ 991.455196][T17845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 991.474768][T17845] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 991.483234][T17845] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 991.491284][T17845] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 991.499333][T17845] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 991.507292][T17845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:30:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 25) 17:30:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb050018000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xc00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.515243][T17845] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xd00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 991.547698][T17960] FAULT_INJECTION: forcing a failure. [ 991.547698][T17960] name failslab, interval 1, probability 0, space 0, times 0 [ 991.561087][T17960] CPU: 0 PID: 17960 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 991.571315][T17960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.581352][T17960] Call Trace: [ 991.584622][T17960] dump_stack+0x18e/0x1de [ 991.588971][T17960] should_fail+0x5d8/0x740 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xe00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 2: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x1100}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 991.593384][T17960] ? blk_mq_init_allocated_queue+0x429/0x16e0 [ 991.599442][T17960] should_failslab+0x5/0x20 [ 991.603933][T17960] __kmalloc+0x5f/0x2f0 [ 991.608087][T17960] ? blk_mq_sysfs_init+0x18b/0x1c0 [ 991.613188][T17960] blk_mq_init_allocated_queue+0x429/0x16e0 [ 991.619076][T17960] ? blk_alloc_queue_node+0x4e0/0x570 [ 991.624440][T17960] blk_mq_init_queue+0x48/0xa0 [ 991.629191][T17960] loop_add+0x256/0x710 [ 991.633320][T17960] ? radix_tree_lookup+0x1c0/0x1d0 [ 991.638508][T17960] loop_control_ioctl+0x468/0x680 [ 991.643511][T17960] ? xor_init+0x60/0x60 [ 991.647757][T17960] do_vfs_ioctl+0x6fb/0x15b0 [ 991.652322][T17960] __x64_sys_ioctl+0xd4/0x110 [ 991.656966][T17960] do_syscall_64+0xcb/0x1e0 [ 991.661443][T17960] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 991.667318][T17960] RIP: 0033:0x7fddc0dc7e99 [ 991.671708][T17960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:30:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 26) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb050018000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x1200}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 991.691286][T17960] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 991.699669][T17960] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 991.707616][T17960] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 991.715566][T17960] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 991.723513][T17960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 991.731458][T17960] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x2500}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xec000000, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x2600}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 991.761028][T18089] FAULT_INJECTION: forcing a failure. [ 991.761028][T18089] name failslab, interval 1, probability 0, space 0, times 0 [ 991.781203][T18089] CPU: 0 PID: 18089 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 991.791444][T18089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.801486][T18089] Call Trace: [ 991.804771][T18089] dump_stack+0x18e/0x1de 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x4000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 991.809098][T18089] should_fail+0x5d8/0x740 [ 991.813513][T18089] ? blk_mq_realloc_hw_ctxs+0x38a/0x1440 [ 991.819141][T18089] should_failslab+0x5/0x20 [ 991.823651][T18089] __kmalloc+0x5f/0x2f0 [ 991.827800][T18089] ? _raw_spin_lock+0x6c/0x170 [ 991.832550][T18089] blk_mq_realloc_hw_ctxs+0x38a/0x1440 [ 991.838015][T18089] ? blk_mq_sysfs_init+0x18b/0x1c0 [ 991.843097][T18089] blk_mq_init_allocated_queue+0x4d8/0x16e0 [ 991.848985][T18089] ? blk_alloc_queue_node+0x4e0/0x570 [ 991.854325][T18089] blk_mq_init_queue+0x48/0xa0 [ 991.859072][T18089] loop_add+0x256/0x710 [ 991.863198][T18089] ? radix_tree_lookup+0x1c0/0x1d0 [ 991.868284][T18089] loop_control_ioctl+0x468/0x680 [ 991.873279][T18089] ? xor_init+0x60/0x60 [ 991.877405][T18089] do_vfs_ioctl+0x6fb/0x15b0 [ 991.881970][T18089] __x64_sys_ioctl+0xd4/0x110 [ 991.886629][T18089] do_syscall_64+0xcb/0x1e0 [ 991.891108][T18089] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 991.896972][T18089] RIP: 0033:0x7fddc0dc7e99 [ 991.901357][T18089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 991.920933][T18089] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 991.929314][T18089] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 991.937258][T18089] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 991.945205][T18089] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 991.953153][T18089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:30:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 27) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x4300}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb050018000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb050018000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x4800}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.961190][T18089] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 991.993874][T18212] FAULT_INJECTION: forcing a failure. [ 991.993874][T18212] name failslab, interval 1, probability 0, space 0, times 0 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xa, [@union={0x6, 0x4, 0x0, 0x7, 0x0, 0x0, [{0xd, 0x5, 0x6}, {0x6, 0x0, 0x7b58}, {0x10, 0x4, 0x2}, {0xb, 0x4, 0xca}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/248, 0x5e, 0xf8, 0x1}, 0x20) [ 992.014733][T18212] CPU: 0 PID: 18212 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 992.024979][T18212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.035028][T18212] Call Trace: [ 992.038317][T18212] dump_stack+0x18e/0x1de [ 992.042657][T18212] should_fail+0x5d8/0x740 [ 992.047067][T18212] ? blk_mq_realloc_hw_ctxs+0x637/0x1440 [ 992.052693][T18212] should_failslab+0x5/0x20 [ 992.057195][T18212] __kmalloc+0x5f/0x2f0 [ 992.061333][T18212] ? blk_mq_realloc_hw_ctxs+0x38a/0x1440 [ 992.066951][T18212] ? _raw_spin_lock+0x6c/0x170 [ 992.071716][T18212] blk_mq_realloc_hw_ctxs+0x637/0x1440 [ 992.077161][T18212] blk_mq_init_allocated_queue+0x4d8/0x16e0 [ 992.083041][T18212] ? blk_alloc_queue_node+0x4e0/0x570 [ 992.088388][T18212] blk_mq_init_queue+0x48/0xa0 [ 992.093124][T18212] loop_add+0x256/0x710 [ 992.097251][T18212] ? radix_tree_lookup+0x1c0/0x1d0 [ 992.102354][T18212] loop_control_ioctl+0x468/0x680 [ 992.107346][T18212] ? xor_init+0x60/0x60 [ 992.111471][T18212] do_vfs_ioctl+0x6fb/0x15b0 [ 992.116032][T18212] __x64_sys_ioctl+0xd4/0x110 [ 992.120780][T18212] do_syscall_64+0xcb/0x1e0 [ 992.125254][T18212] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 992.131118][T18212] RIP: 0033:0x7fddc0dc7e99 [ 992.135503][T18212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 992.155124][T18212] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:30:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 28) 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x4c00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xa, [@union={0x6, 0x4, 0x0, 0x7, 0x0, 0x0, [{0xd, 0x5, 0x6}, {0x6, 0x0, 0x7b58}, {0x10, 0x4, 0x2}, {0xb, 0x4, 0xca}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/248, 0x5e, 0xf8, 0x1}, 0x20) 17:30:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.163505][T18212] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 992.171446][T18212] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 992.179390][T18212] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.187331][T18212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 992.195272][T18212] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x6800}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xa, [@union={0x6, 0x4, 0x0, 0x7, 0x0, 0x0, [{0xd, 0x5, 0x6}, {0x6, 0x0, 0x7b58}, {0x10, 0x4, 0x2}, {0xb, 0x4, 0xca}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/248, 0x5e, 0xf8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xa, [@union={0x6, 0x4, 0x0, 0x7, 0x0, 0x0, [{0xd, 0x5, 0x6}, {0x6, 0x0, 0x7b58}, {0x10, 0x4, 0x2}, {0xb, 0x4, 0xca}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/248, 0x5e, 0xf8, 0x1}, 0x20) (async) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 992.226533][T18433] FAULT_INJECTION: forcing a failure. [ 992.226533][T18433] name failslab, interval 1, probability 0, space 0, times 0 [ 992.243543][T18433] CPU: 0 PID: 18433 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 992.253784][T18433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.263822][T18433] Call Trace: [ 992.267111][T18433] dump_stack+0x18e/0x1de [ 992.271438][T18433] should_fail+0x5d8/0x740 [ 992.275855][T18433] ? sbitmap_init_node+0x145/0x3d0 [ 992.280961][T18433] should_failslab+0x5/0x20 [ 992.285454][T18433] __kmalloc+0x5f/0x2f0 [ 992.289689][T18433] ? blk_mq_realloc_hw_ctxs+0x637/0x1440 [ 992.295313][T18433] sbitmap_init_node+0x145/0x3d0 [ 992.300243][T18433] blk_mq_realloc_hw_ctxs+0x6a1/0x1440 [ 992.305688][T18433] blk_mq_init_allocated_queue+0x4d8/0x16e0 [ 992.311551][T18433] ? blk_alloc_queue_node+0x4e0/0x570 [ 992.316890][T18433] blk_mq_init_queue+0x48/0xa0 [ 992.321719][T18433] loop_add+0x256/0x710 [ 992.325842][T18433] ? radix_tree_lookup+0x1c0/0x1d0 [ 992.330922][T18433] loop_control_ioctl+0x468/0x680 [ 992.335916][T18433] ? xor_init+0x60/0x60 [ 992.340142][T18433] do_vfs_ioctl+0x6fb/0x15b0 [ 992.344787][T18433] __x64_sys_ioctl+0xd4/0x110 [ 992.349446][T18433] do_syscall_64+0xcb/0x1e0 [ 992.353921][T18433] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 992.359778][T18433] RIP: 0033:0x7fddc0dc7e99 [ 992.364167][T18433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 992.383752][T18433] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 992.392129][T18433] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 992.400071][T18433] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 992.408025][T18433] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.415965][T18433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:30:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 29) 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x6, 0x0, 0x0, 0x7}]}}, &(0x7f00000004c0)=""/228, 0x26, 0xe4, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x60600, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0xb6b, 0x5, 0x1, 0x1851, r0, 0x2, '\x00', 0x0, r1, 0x5, 0x0, 0x2}, 0x40) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x6c00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.423911][T18433] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x7400}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x7a00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 992.456799][T18654] FAULT_INJECTION: forcing a failure. [ 992.456799][T18654] name failslab, interval 1, probability 0, space 0, times 0 [ 992.478068][T18654] CPU: 0 PID: 18654 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 992.488396][T18654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.498438][T18654] Call Trace: [ 992.501724][T18654] dump_stack+0x18e/0x1de [ 992.506046][T18654] should_fail+0x5d8/0x740 [ 992.510463][T18654] ? blk_alloc_flush_queue+0x7e/0x230 [ 992.515839][T18654] should_failslab+0x5/0x20 [ 992.520320][T18654] kmem_cache_alloc_trace+0x39/0x2b0 [ 992.525592][T18654] blk_alloc_flush_queue+0x7e/0x230 [ 992.530817][T18654] blk_mq_realloc_hw_ctxs+0x873/0x1440 [ 992.536351][T18654] blk_mq_init_allocated_queue+0x4d8/0x16e0 [ 992.542219][T18654] ? blk_alloc_queue_node+0x4e0/0x570 [ 992.547563][T18654] blk_mq_init_queue+0x48/0xa0 [ 992.552300][T18654] loop_add+0x256/0x710 [ 992.556425][T18654] ? radix_tree_lookup+0x1c0/0x1d0 [ 992.561517][T18654] loop_control_ioctl+0x468/0x680 [ 992.566522][T18654] ? xor_init+0x60/0x60 [ 992.570653][T18654] do_vfs_ioctl+0x6fb/0x15b0 [ 992.575242][T18654] __x64_sys_ioctl+0xd4/0x110 [ 992.579966][T18654] do_syscall_64+0xcb/0x1e0 [ 992.584442][T18654] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 992.590305][T18654] RIP: 0033:0x7fddc0dc7e99 [ 992.594698][T18654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 992.614285][T18654] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 992.622681][T18654] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 992.630627][T18654] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 992.638573][T18654] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.646521][T18654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:30:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 30) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x5b, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:30:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0xe700}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:30:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x6, 0x0, 0x0, 0x7}]}}, &(0x7f00000004c0)=""/228, 0x26, 0xe4, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x60600, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0xb6b, 0x5, 0x1, 0x1851, r0, 0x2, '\x00', 0x0, r1, 0x5, 0x0, 0x2}, 0x40) 17:30:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x49, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:30:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:30:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 992.654467][T18654] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 992.676264][T18774] FAULT_INJECTION: forcing a failure. [ 992.676264][T18774] name failslab, interval 1, probability 0, space 0, times 0 17:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x6, 0x0, 0x0, 0x7}]}}, &(0x7f00000004c0)=""/228, 0x26, 0xe4, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async, rerun: 32) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x60600, 0x0) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0xb6b, 0x5, 0x1, 0x1851, r0, 0x2, '\x00', 0x0, r1, 0x5, 0x0, 0x2}, 0x40) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.715447][T18774] CPU: 1 PID: 18774 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 992.725691][T18774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.735730][T18774] Call Trace: [ 992.739017][T18774] dump_stack+0x18e/0x1de [ 992.743353][T18774] should_fail+0x5d8/0x740 [ 992.747764][T18774] ? blk_alloc_flush_queue+0xdf/0x230 [ 992.753117][T18774] should_failslab+0x5/0x20 [ 992.757601][T18774] __kmalloc+0x5f/0x2f0 [ 992.761747][T18774] ? blk_alloc_flush_queue+0x7e/0x230 [ 992.767102][T18774] blk_alloc_flush_queue+0xdf/0x230 [ 992.772271][T18774] blk_mq_realloc_hw_ctxs+0x873/0x1440 [ 992.777704][T18774] blk_mq_init_allocated_queue+0x4d8/0x16e0 [ 992.783568][T18774] ? blk_alloc_queue_node+0x4e0/0x570 [ 992.788910][T18774] blk_mq_init_queue+0x48/0xa0 [ 992.793648][T18774] loop_add+0x256/0x710 [ 992.797783][T18774] ? radix_tree_lookup+0x1c0/0x1d0 [ 992.802862][T18774] loop_control_ioctl+0x468/0x680 [ 992.807856][T18774] ? xor_init+0x60/0x60 [ 992.811984][T18774] do_vfs_ioctl+0x6fb/0x15b0 [ 992.816547][T18774] __x64_sys_ioctl+0xd4/0x110 [ 992.821195][T18774] do_syscall_64+0xcb/0x1e0 [ 992.825676][T18774] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 992.831539][T18774] RIP: 0033:0x7fddc0dc7e99 [ 992.835924][T18774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 992.855502][T18774] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 31) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 0: mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000b, 0x10, 0xffffffffffffffff, 0xfffffffffffffffe) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 992.863927][T18774] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 992.871872][T18774] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 992.879817][T18774] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 992.887759][T18774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 992.895708][T18774] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:00 executing program 0: mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000b, 0x10, 0xffffffffffffffff, 0xfffffffffffffffe) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc002000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.924459][T18998] FAULT_INJECTION: forcing a failure. [ 992.924459][T18998] name failslab, interval 1, probability 0, space 0, times 0 [ 992.952793][T18998] CPU: 1 PID: 18998 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 992.963036][T18998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.973079][T18998] Call Trace: [ 992.976364][T18998] dump_stack+0x18e/0x1de [ 992.980690][T18998] should_fail+0x5d8/0x740 [ 992.985099][T18998] ? __alloc_disk_node+0x76/0x5a0 [ 992.990116][T18998] should_failslab+0x5/0x20 [ 992.994610][T18998] kmem_cache_alloc_trace+0x39/0x2b0 [ 992.999884][T18998] __alloc_disk_node+0x76/0x5a0 [ 993.004718][T18998] loop_add+0x323/0x710 [ 993.008842][T18998] loop_control_ioctl+0x468/0x680 [ 993.013838][T18998] ? xor_init+0x60/0x60 [ 993.017966][T18998] do_vfs_ioctl+0x6fb/0x15b0 [ 993.022539][T18998] __x64_sys_ioctl+0xd4/0x110 [ 993.027203][T18998] do_syscall_64+0xcb/0x1e0 [ 993.031769][T18998] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 993.037630][T18998] RIP: 0033:0x7fddc0dc7e99 [ 993.042015][T18998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 993.061673][T18998] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 32) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc004000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:00 executing program 0: mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000b, 0x10, 0xffffffffffffffff, 0xfffffffffffffffe) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000b, 0x10, 0xffffffffffffffff, 0xfffffffffffffffe) (async) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x4}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0xa, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 993.070051][T18998] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 993.077990][T18998] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 993.085938][T18998] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 993.093884][T18998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 993.101825][T18998] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0xc, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 993.134610][T19224] FAULT_INJECTION: forcing a failure. [ 993.134610][T19224] name failslab, interval 1, probability 0, space 0, times 0 [ 993.154617][T19224] CPU: 1 PID: 19224 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 993.164864][T19224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.174908][T19224] Call Trace: [ 993.178193][T19224] dump_stack+0x18e/0x1de [ 993.182547][T19224] should_fail+0x5d8/0x740 [ 993.186962][T19224] ? __alloc_disk_node+0x319/0x5a0 [ 993.192067][T19224] should_failslab+0x5/0x20 [ 993.196570][T19224] kmem_cache_alloc_trace+0x39/0x2b0 [ 993.201837][T19224] __alloc_disk_node+0x319/0x5a0 [ 993.206744][T19224] loop_add+0x323/0x710 [ 993.210869][T19224] loop_control_ioctl+0x468/0x680 [ 993.215862][T19224] ? xor_init+0x60/0x60 [ 993.219990][T19224] do_vfs_ioctl+0x6fb/0x15b0 [ 993.224568][T19224] __x64_sys_ioctl+0xd4/0x110 [ 993.229216][T19224] do_syscall_64+0xcb/0x1e0 [ 993.233735][T19224] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 993.239595][T19224] RIP: 0033:0x7fddc0dc7e99 [ 993.243980][T19224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 993.263553][T19224] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 993.271931][T19224] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 17:31:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 33) 17:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800ffff000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@multicast2, @private=0xa010101}, 0x8) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x7}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc101000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x11, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc102000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x8}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 993.279871][T19224] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 993.287815][T19224] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 993.295763][T19224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 993.303711][T19224] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x13, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x26, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x49, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 993.342717][T19354] FAULT_INJECTION: forcing a failure. [ 993.342717][T19354] name failslab, interval 1, probability 0, space 0, times 0 [ 993.356231][T19354] CPU: 0 PID: 19354 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 993.366461][T19354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.376501][T19354] Call Trace: [ 993.379782][T19354] dump_stack+0x18e/0x1de [ 993.384109][T19354] should_fail+0x5d8/0x740 [ 993.388521][T19354] ? rand_initialize_disk+0x4b/0xb0 [ 993.393704][T19354] should_failslab+0x5/0x20 [ 993.398189][T19354] kmem_cache_alloc_trace+0x39/0x2b0 [ 993.403533][T19354] ? part_release+0xc0/0xc0 [ 993.408007][T19354] ? percpu_ref_init+0x189/0x230 [ 993.412936][T19354] rand_initialize_disk+0x4b/0xb0 [ 993.417937][T19354] __alloc_disk_node+0x3f6/0x5a0 [ 993.422846][T19354] loop_add+0x323/0x710 [ 993.427039][T19354] loop_control_ioctl+0x468/0x680 [ 993.432062][T19354] ? xor_init+0x60/0x60 [ 993.436340][T19354] do_vfs_ioctl+0x6fb/0x15b0 [ 993.440903][T19354] __x64_sys_ioctl+0xd4/0x110 [ 993.445552][T19354] do_syscall_64+0xcb/0x1e0 [ 993.450035][T19354] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 993.455904][T19354] RIP: 0033:0x7fddc0dc7e99 [ 993.460292][T19354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 993.479880][T19354] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 34) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x64, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc103000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x9}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800ffff000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async, rerun: 64) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@multicast2, @private=0xa010101}, 0x8) (rerun: 64) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 993.488319][T19354] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 993.496264][T19354] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 993.504214][T19354] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 993.512165][T19354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 993.520114][T19354] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc104000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x3fe, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0xa}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800ffff000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@multicast2, @private=0xa010101}, 0x8) 17:31:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x5f5e0ff, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 993.600590][T19469] FAULT_INJECTION: forcing a failure. [ 993.600590][T19469] name failslab, interval 1, probability 0, space 0, times 0 [ 993.614419][T19469] CPU: 0 PID: 19469 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 993.624641][T19469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.634672][T19469] Call Trace: [ 993.637940][T19469] dump_stack+0x18e/0x1de [ 993.642242][T19469] should_fail+0x5d8/0x740 [ 993.646678][T19469] ? blk_mq_init_tags+0x74/0x290 [ 993.651591][T19469] should_failslab+0x5/0x20 [ 993.656157][T19469] kmem_cache_alloc_trace+0x39/0x2b0 [ 993.661417][T19469] ? mutex_unlock+0x19/0x40 [ 993.665942][T19469] blk_mq_init_tags+0x74/0x290 [ 993.670820][T19469] ? blk_mq_hw_queue_to_node+0xeb/0x100 [ 993.676341][T19469] blk_mq_alloc_rq_map+0x93/0x1a0 [ 993.681337][T19469] blk_mq_init_sched+0x1d6/0xb10 [ 993.686256][T19469] elevator_init_mq+0x2cd/0x3f0 [ 993.691172][T19469] __device_add_disk+0x87/0x1220 [ 993.696081][T19469] ? loop_add+0x400/0x710 [ 993.700383][T19469] loop_add+0x554/0x710 [ 993.704514][T19469] loop_control_ioctl+0x468/0x680 [ 993.709510][T19469] ? xor_init+0x60/0x60 [ 993.713636][T19469] do_vfs_ioctl+0x6fb/0x15b0 [ 993.718205][T19469] __x64_sys_ioctl+0xd4/0x110 [ 993.722860][T19469] do_syscall_64+0xcb/0x1e0 [ 993.727349][T19469] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 993.733213][T19469] RIP: 0033:0x7fddc0dc7e99 [ 993.737602][T19469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 993.757176][T19469] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 993.765557][T19469] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 993.773516][T19469] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 993.781472][T19469] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 993.789428][T19469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 35) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0xb}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc201000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 0: getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0xc}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:01 executing program 0: getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) (async) 17:31:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc202000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.797369][T19469] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 993.806457][T19469] "mq-deadline" elevator initialization failed, falling back to "none" 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0xd}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 993.882717][T19760] FAULT_INJECTION: forcing a failure. [ 993.882717][T19760] name failslab, interval 1, probability 0, space 0, times 0 [ 993.895456][T19760] CPU: 0 PID: 19760 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 993.905683][T19760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.915716][T19760] Call Trace: [ 993.918984][T19760] dump_stack+0x18e/0x1de [ 993.923288][T19760] should_fail+0x5d8/0x740 [ 993.927672][T19760] ? sbitmap_init_node+0x145/0x3d0 [ 993.932786][T19760] should_failslab+0x5/0x20 [ 993.937256][T19760] __kmalloc+0x5f/0x2f0 [ 993.941392][T19760] sbitmap_init_node+0x145/0x3d0 [ 993.946298][T19760] sbitmap_queue_init_node+0x2f/0xbe0 [ 993.951641][T19760] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 993.957154][T19760] ? blk_mq_init_tags+0x74/0x290 [ 993.962757][T19760] blk_mq_init_tags+0xef/0x290 [ 993.967519][T19760] blk_mq_alloc_rq_map+0x93/0x1a0 [ 993.972603][T19760] blk_mq_init_sched+0x1d6/0xb10 [ 993.977559][T19760] elevator_init_mq+0x2cd/0x3f0 [ 993.982409][T19760] __device_add_disk+0x87/0x1220 [ 993.987319][T19760] ? loop_add+0x400/0x710 [ 993.991622][T19760] loop_add+0x554/0x710 [ 993.995749][T19760] loop_control_ioctl+0x468/0x680 [ 994.000744][T19760] ? xor_init+0x60/0x60 [ 994.004868][T19760] do_vfs_ioctl+0x6fb/0x15b0 [ 994.009429][T19760] __x64_sys_ioctl+0xd4/0x110 [ 994.014077][T19760] do_syscall_64+0xcb/0x1e0 [ 994.018552][T19760] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 994.024415][T19760] RIP: 0033:0x7fddc0dc7e99 [ 994.028800][T19760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 994.048375][T19760] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 994.056762][T19760] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 994.064708][T19760] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 994.072650][T19760] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 17:31:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 36) 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3fe, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0xe}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc203000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:01 executing program 0: getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x10}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc204000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x11}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 994.080589][T19760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 994.088702][T19760] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 994.096752][T19760] "mq-deadline" elevator initialization failed, falling back to "none" 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x20000153, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 0: epoll_create1(0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000126a09060000000000185a000000000000610000004e302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) [ 994.168967][T19935] FAULT_INJECTION: forcing a failure. [ 994.168967][T19935] name failslab, interval 1, probability 0, space 0, times 0 [ 994.182352][T19935] CPU: 0 PID: 19935 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 994.192576][T19935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.202610][T19935] Call Trace: [ 994.205965][T19935] dump_stack+0x18e/0x1de [ 994.210280][T19935] should_fail+0x5d8/0x740 [ 994.214670][T19935] ? sbitmap_queue_init_node+0x3db/0xbe0 [ 994.220278][T19935] should_failslab+0x5/0x20 [ 994.224761][T19935] kmem_cache_alloc_trace+0x39/0x2b0 [ 994.230028][T19935] sbitmap_queue_init_node+0x3db/0xbe0 [ 994.235463][T19935] blk_mq_init_tags+0xef/0x290 [ 994.240205][T19935] blk_mq_alloc_rq_map+0x93/0x1a0 [ 994.245207][T19935] blk_mq_init_sched+0x1d6/0xb10 [ 994.250124][T19935] elevator_init_mq+0x2cd/0x3f0 [ 994.254957][T19935] __device_add_disk+0x87/0x1220 [ 994.259869][T19935] ? loop_add+0x400/0x710 [ 994.264173][T19935] loop_add+0x554/0x710 [ 994.268352][T19935] loop_control_ioctl+0x468/0x680 [ 994.273362][T19935] ? xor_init+0x60/0x60 [ 994.277489][T19935] do_vfs_ioctl+0x6fb/0x15b0 [ 994.282053][T19935] __x64_sys_ioctl+0xd4/0x110 [ 994.286702][T19935] do_syscall_64+0xcb/0x1e0 [ 994.291177][T19935] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 994.297040][T19935] RIP: 0033:0x7fddc0dc7e99 [ 994.301424][T19935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 994.321002][T19935] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 994.329382][T19935] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 994.337322][T19935] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 994.345262][T19935] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.353203][T19935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 994.361153][T19935] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 37) 17:31:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x20000189, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x12}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 0: epoll_create1(0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000126a09060000000000185a000000000000610000004e302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x25}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc301000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 994.369195][T19935] "mq-deadline" elevator initialization failed, falling back to "none" [ 994.450351][T20152] FAULT_INJECTION: forcing a failure. [ 994.450351][T20152] name failslab, interval 1, probability 0, space 0, times 0 [ 994.463195][T20152] CPU: 0 PID: 20152 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 994.473406][T20152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.483528][T20152] Call Trace: [ 994.486802][T20152] dump_stack+0x18e/0x1de [ 994.491106][T20152] should_fail+0x5d8/0x740 [ 994.495497][T20152] ? sbitmap_queue_init_node+0x3db/0xbe0 [ 994.501105][T20152] should_failslab+0x5/0x20 [ 994.505581][T20152] kmem_cache_alloc_trace+0x39/0x2b0 [ 994.510846][T20152] sbitmap_queue_init_node+0x3db/0xbe0 [ 994.516293][T20152] blk_mq_init_tags+0x153/0x290 [ 994.521253][T20152] blk_mq_alloc_rq_map+0x93/0x1a0 [ 994.526295][T20152] blk_mq_init_sched+0x1d6/0xb10 [ 994.531428][T20152] elevator_init_mq+0x2cd/0x3f0 [ 994.536256][T20152] __device_add_disk+0x87/0x1220 [ 994.541170][T20152] ? loop_add+0x400/0x710 [ 994.545519][T20152] loop_add+0x554/0x710 [ 994.549739][T20152] loop_control_ioctl+0x468/0x680 [ 994.554735][T20152] ? xor_init+0x60/0x60 [ 994.558859][T20152] do_vfs_ioctl+0x6fb/0x15b0 [ 994.563438][T20152] __x64_sys_ioctl+0xd4/0x110 [ 994.568263][T20152] do_syscall_64+0xcb/0x1e0 [ 994.572752][T20152] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 994.578611][T20152] RIP: 0033:0x7fddc0dc7e99 [ 994.582997][T20152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 994.602628][T20152] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 994.611006][T20152] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 994.618946][T20152] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 994.626888][T20152] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.634830][T20152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 994.642794][T20152] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 38) 17:31:01 executing program 0: epoll_create1(0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000126a09060000000000185a000000000000610000004e302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) epoll_create1(0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a000000126a09060000000000185a000000000000610000004e302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc302000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x26}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x43}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc303000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 994.652036][T20152] "mq-deadline" elevator initialization failed, falling back to "none" 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x48}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 994.730544][T20276] FAULT_INJECTION: forcing a failure. [ 994.730544][T20276] name failslab, interval 1, probability 0, space 0, times 0 [ 994.745355][T20276] CPU: 0 PID: 20276 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 994.755582][T20276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.765613][T20276] Call Trace: [ 994.768879][T20276] dump_stack+0x18e/0x1de [ 994.773183][T20276] should_fail+0x5d8/0x740 [ 994.777571][T20276] ? blk_mq_alloc_rq_map+0xb3/0x1a0 [ 994.782738][T20276] should_failslab+0x5/0x20 [ 994.787209][T20276] __kmalloc+0x5f/0x2f0 [ 994.791335][T20276] ? blk_mq_init_tags+0x209/0x290 [ 994.796330][T20276] blk_mq_alloc_rq_map+0xb3/0x1a0 [ 994.801322][T20276] blk_mq_init_sched+0x1d6/0xb10 [ 994.806577][T20276] elevator_init_mq+0x2cd/0x3f0 [ 994.811395][T20276] __device_add_disk+0x87/0x1220 [ 994.816311][T20276] ? loop_add+0x400/0x710 [ 994.820611][T20276] loop_add+0x554/0x710 [ 994.824737][T20276] loop_control_ioctl+0x468/0x680 [ 994.829727][T20276] ? xor_init+0x60/0x60 [ 994.833852][T20276] do_vfs_ioctl+0x6fb/0x15b0 [ 994.838506][T20276] __x64_sys_ioctl+0xd4/0x110 [ 994.843153][T20276] do_syscall_64+0xcb/0x1e0 [ 994.847629][T20276] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 994.853490][T20276] RIP: 0033:0x7fddc0dc7e99 [ 994.857880][T20276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 994.877461][T20276] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 994.885927][T20276] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 994.893883][T20276] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 994.901933][T20276] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.909872][T20276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 994.917811][T20276] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 39) 17:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0xffffffff}, 0x20) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000005c0)) r2 = getpid() pidfd_open(r2, 0x0) r3 = accept4(r1, 0x0, &(0x7f0000000100), 0x0) setsockopt$inet_buf(r3, 0x0, 0x9, &(0x7f0000000640)="8a1d55bc5043ded7f0bcb1fb199936ceb6f2e4977e89a5925651c593d0204d5c9b31f90c3bde52ce2b7b36bd436a87010a00c99fe0821037ab1fa4269064f305be2e57d3d01488af1faa2855964a5f611b83c64415dcee53daec0de9c00aaaa440", 0x61) r4 = clone3(&(0x7f0000000380)={0x84000, &(0x7f0000000340), &(0x7f0000000140), &(0x7f0000000180), {0x26}, &(0x7f00000001c0)=""/93, 0xfffffffffffffe8d, &(0x7f0000000240)=""/238, &(0x7f0000000440)=[0x0, 0x0, 0x0, r2], 0x4, {r0}}, 0x58) pidfd_open(r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x15, 0x1, 0x1, 0x81, 0x1058, r0, 0x51, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5}, 0x40) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000400)) 17:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x6}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc304000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x4c}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x68}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x7}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 994.926631][T20276] "mq-deadline" elevator initialization failed, falling back to "none" 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x6c}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 994.999148][T20393] FAULT_INJECTION: forcing a failure. [ 994.999148][T20393] name failslab, interval 1, probability 0, space 0, times 0 [ 995.012354][T20393] CPU: 1 PID: 20393 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 995.022668][T20393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.032783][T20393] Call Trace: [ 995.036053][T20393] dump_stack+0x18e/0x1de [ 995.040352][T20393] should_fail+0x5d8/0x740 [ 995.044738][T20393] ? blk_mq_alloc_rq_map+0xe9/0x1a0 [ 995.049905][T20393] should_failslab+0x5/0x20 [ 995.054375][T20393] __kmalloc+0x5f/0x2f0 [ 995.058500][T20393] ? blk_mq_alloc_rq_map+0xb3/0x1a0 [ 995.063666][T20393] ? blk_mq_init_tags+0x209/0x290 [ 995.068666][T20393] blk_mq_alloc_rq_map+0xe9/0x1a0 [ 995.073656][T20393] blk_mq_init_sched+0x1d6/0xb10 [ 995.078560][T20393] elevator_init_mq+0x2cd/0x3f0 [ 995.083466][T20393] __device_add_disk+0x87/0x1220 [ 995.088370][T20393] ? loop_add+0x400/0x710 [ 995.092665][T20393] loop_add+0x554/0x710 [ 995.096784][T20393] loop_control_ioctl+0x468/0x680 [ 995.101780][T20393] ? xor_init+0x60/0x60 [ 995.105903][T20393] do_vfs_ioctl+0x6fb/0x15b0 [ 995.110474][T20393] __x64_sys_ioctl+0xd4/0x110 [ 995.115132][T20393] do_syscall_64+0xcb/0x1e0 [ 995.119611][T20393] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 995.125483][T20393] RIP: 0033:0x7fddc0dc7e99 [ 995.129871][T20393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 995.149714][T20393] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 995.158181][T20393] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 995.166217][T20393] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 995.174160][T20393] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 995.182102][T20393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 995.190043][T20393] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 40) 17:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0xffffffff}, 0x20) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000005c0)) (async) r2 = getpid() pidfd_open(r2, 0x0) (async) r3 = accept4(r1, 0x0, &(0x7f0000000100), 0x0) setsockopt$inet_buf(r3, 0x0, 0x9, &(0x7f0000000640)="8a1d55bc5043ded7f0bcb1fb199936ceb6f2e4977e89a5925651c593d0204d5c9b31f90c3bde52ce2b7b36bd436a87010a00c99fe0821037ab1fa4269064f305be2e57d3d01488af1faa2855964a5f611b83c64415dcee53daec0de9c00aaaa440", 0x61) (async) r4 = clone3(&(0x7f0000000380)={0x84000, &(0x7f0000000340), &(0x7f0000000140), &(0x7f0000000180), {0x26}, &(0x7f00000001c0)=""/93, 0xfffffffffffffe8d, &(0x7f0000000240)=""/238, &(0x7f0000000440)=[0x0, 0x0, 0x0, r2], 0x4, {r0}}, 0x58) pidfd_open(r4, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x15, 0x1, 0x1, 0x81, 0x1058, r0, 0x51, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5}, 0x40) (async) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000400)) 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x74}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc401000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x7a}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc402000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb01001800000000010000604ad90a2ad741365ac9ecc8f980a2550c0000000c0000d2ba127c20d3792433b68c6377b55f4e87b5440a037df2a1738d9afa173d749777445b2a607b48e6eceefd6c72499ef5ccee49173999eca94c94c7162575e2f40d17605946d313917d7b51451bcd8d83411ff79f09c0112dee127028a039145fdd8f3d46a0e7a3c9d4e22619366443295067e81a86eb7578ebd354500129be2d4dbb95c67886164d00f8e56fceb39dc590ffd8cccee3bfe4894ea3dc0d8113bceb2afaeab8d4a9e872838de1d7f8fd54cd936cfab043834da057d7a10f3c603105235d44fc77794b2b036d4284c6ad1972d300766a258d85da28896ec10752c1e946caa3b4c43f73e18856b6e58334a1eacc71b5cc642c967b7f617d78edbe629e542c3040b44f80b674674a12"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0xffffffff}, 0x20) (async) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000005c0)) (async) r2 = getpid() pidfd_open(r2, 0x0) r3 = accept4(r1, 0x0, &(0x7f0000000100), 0x0) setsockopt$inet_buf(r3, 0x0, 0x9, &(0x7f0000000640)="8a1d55bc5043ded7f0bcb1fb199936ceb6f2e4977e89a5925651c593d0204d5c9b31f90c3bde52ce2b7b36bd436a87010a00c99fe0821037ab1fa4269064f305be2e57d3d01488af1faa2855964a5f611b83c64415dcee53daec0de9c00aaaa440", 0x61) (async) r4 = clone3(&(0x7f0000000380)={0x84000, &(0x7f0000000340), &(0x7f0000000140), &(0x7f0000000180), {0x26}, &(0x7f00000001c0)=""/93, 0xfffffffffffffe8d, &(0x7f0000000240)=""/238, &(0x7f0000000440)=[0x0, 0x0, 0x0, r2], 0x4, {r0}}, 0x58) pidfd_open(r4, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x15, 0x1, 0x1, 0x81, 0x1058, r0, 0x51, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5}, 0x40) (async) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000400)) 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0xe7}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 995.198943][T20393] "mq-deadline" elevator initialization failed, falling back to "none" [ 995.268613][T20555] FAULT_INJECTION: forcing a failure. [ 995.268613][T20555] name failslab, interval 1, probability 0, space 0, times 0 [ 995.281401][T20555] CPU: 1 PID: 20555 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 995.291806][T20555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.301849][T20555] Call Trace: [ 995.305116][T20555] dump_stack+0x18e/0x1de [ 995.309419][T20555] should_fail+0x5d8/0x740 [ 995.313807][T20555] ? blk_mq_alloc_rq_map+0xe9/0x1a0 [ 995.318976][T20555] should_failslab+0x5/0x20 [ 995.323881][T20555] __kmalloc+0x5f/0x2f0 [ 995.328008][T20555] ? blk_mq_alloc_rq_map+0xb3/0x1a0 [ 995.333178][T20555] blk_mq_alloc_rq_map+0xe9/0x1a0 [ 995.338172][T20555] blk_mq_init_sched+0x1d6/0xb10 [ 995.343089][T20555] elevator_init_mq+0x2cd/0x3f0 [ 995.347910][T20555] __device_add_disk+0x87/0x1220 [ 995.352817][T20555] ? loop_add+0x400/0x710 [ 995.357129][T20555] loop_add+0x554/0x710 [ 995.361263][T20555] loop_control_ioctl+0x468/0x680 [ 995.366268][T20555] ? xor_init+0x60/0x60 [ 995.370402][T20555] do_vfs_ioctl+0x6fb/0x15b0 [ 995.374974][T20555] __x64_sys_ioctl+0xd4/0x110 [ 995.379634][T20555] do_syscall_64+0xcb/0x1e0 [ 995.384122][T20555] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 995.389986][T20555] RIP: 0033:0x7fddc0dc7e99 [ 995.394374][T20555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 995.413952][T20555] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 995.422340][T20555] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 995.430306][T20555] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 995.438253][T20555] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 995.446196][T20555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 995.454157][T20555] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 41) 17:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc403000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xa}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:02 executing program 0: setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @local}, 0x8) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x4ac0, 0x0) read$hidraw(r0, &(0x7f0000000080)=""/205, 0xcd) 17:31:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xb}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc404000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.463201][T20555] "mq-deadline" elevator initialization failed, falling back to "none" 17:31:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe7, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 995.530384][T20737] FAULT_INJECTION: forcing a failure. [ 995.530384][T20737] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 995.546664][T20737] CPU: 0 PID: 20737 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 995.557031][T20737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.567075][T20737] Call Trace: [ 995.570345][T20737] dump_stack+0x18e/0x1de [ 995.574648][T20737] should_fail+0x5d8/0x740 [ 995.579038][T20737] __alloc_pages_nodemask+0x12e/0x740 [ 995.584397][T20737] blk_mq_alloc_rqs+0x252/0x660 [ 995.589223][T20737] blk_mq_init_sched+0x235/0xb10 [ 995.594131][T20737] elevator_init_mq+0x2cd/0x3f0 [ 995.598951][T20737] __device_add_disk+0x87/0x1220 [ 995.603854][T20737] ? loop_add+0x400/0x710 [ 995.608240][T20737] loop_add+0x554/0x710 [ 995.612369][T20737] loop_control_ioctl+0x468/0x680 [ 995.617365][T20737] ? xor_init+0x60/0x60 [ 995.621493][T20737] do_vfs_ioctl+0x6fb/0x15b0 [ 995.626052][T20737] __x64_sys_ioctl+0xd4/0x110 [ 995.630697][T20737] do_syscall_64+0xcb/0x1e0 [ 995.635164][T20737] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 995.641020][T20737] RIP: 0033:0x7fddc0dc7e99 [ 995.645487][T20737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 995.665232][T20737] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 42) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 0: setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @local}, 0x8) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x4ac0, 0x0) read$hidraw(r0, &(0x7f0000000080)=""/205, 0xcd) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc501000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x4}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xd}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xe}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc502000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.673617][T20737] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 995.681662][T20737] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 995.689605][T20737] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 995.697558][T20737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 995.705510][T20737] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 995.778937][T20873] FAULT_INJECTION: forcing a failure. [ 995.778937][T20873] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 995.792344][T20873] CPU: 1 PID: 20873 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 995.802552][T20873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.812578][T20873] Call Trace: [ 995.815929][T20873] dump_stack+0x18e/0x1de [ 995.820226][T20873] should_fail+0x5d8/0x740 [ 995.824619][T20873] __alloc_pages_nodemask+0x12e/0x740 [ 995.829957][T20873] blk_mq_alloc_rqs+0x252/0x660 [ 995.834776][T20873] blk_mq_init_sched+0x235/0xb10 [ 995.839681][T20873] elevator_init_mq+0x2cd/0x3f0 [ 995.844499][T20873] __device_add_disk+0x87/0x1220 [ 995.849416][T20873] ? loop_add+0x400/0x710 [ 995.853801][T20873] loop_add+0x554/0x710 [ 995.857935][T20873] loop_control_ioctl+0x468/0x680 [ 995.862925][T20873] ? xor_init+0x60/0x60 [ 995.867049][T20873] do_vfs_ioctl+0x6fb/0x15b0 [ 995.871608][T20873] __x64_sys_ioctl+0xd4/0x110 [ 995.876253][T20873] do_syscall_64+0xcb/0x1e0 [ 995.880723][T20873] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 995.886668][T20873] RIP: 0033:0x7fddc0dc7e99 [ 995.891052][T20873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 995.910622][T20873] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 995.919000][T20873] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 17:31:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 43) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 0: setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @local}, 0x8) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x4ac0, 0x0) read$hidraw(r0, &(0x7f0000000080)=""/205, 0xcd) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2a, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc503000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x10}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x7}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x11}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc504000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01005e000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x12}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 995.926944][T20873] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 995.934883][T20873] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 995.942828][T20873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 995.950765][T20873] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 996.020500][T20978] FAULT_INJECTION: forcing a failure. [ 996.020500][T20978] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 996.034581][T20978] CPU: 1 PID: 20978 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 996.044801][T20978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.054847][T20978] Call Trace: [ 996.058111][T20978] dump_stack+0x18e/0x1de [ 996.062413][T20978] should_fail+0x5d8/0x740 [ 996.066800][T20978] __alloc_pages_nodemask+0x12e/0x740 [ 996.072141][T20978] blk_mq_alloc_rqs+0x252/0x660 [ 996.076961][T20978] blk_mq_init_sched+0x235/0xb10 [ 996.081870][T20978] elevator_init_mq+0x2cd/0x3f0 [ 996.086686][T20978] __device_add_disk+0x87/0x1220 [ 996.091591][T20978] ? loop_add+0x400/0x710 [ 996.095972][T20978] loop_add+0x554/0x710 [ 996.100095][T20978] loop_control_ioctl+0x468/0x680 [ 996.105086][T20978] ? xor_init+0x60/0x60 [ 996.109206][T20978] do_vfs_ioctl+0x6fb/0x15b0 [ 996.113764][T20978] __x64_sys_ioctl+0xd4/0x110 [ 996.118408][T20978] do_syscall_64+0xcb/0x1e0 [ 996.123447][T20978] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 996.129305][T20978] RIP: 0033:0x7fddc0dc7e99 [ 996.133685][T20978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 996.153257][T20978] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 996.161631][T20978] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 17:31:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 44) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x8}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x18}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01005e000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01005e000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x25}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc601000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc602000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x9}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 996.169570][T20978] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 996.177508][T20978] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 996.185447][T20978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 996.193385][T20978] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 996.260192][T21203] FAULT_INJECTION: forcing a failure. [ 996.260192][T21203] name failslab, interval 1, probability 0, space 0, times 0 [ 996.274875][T21203] CPU: 1 PID: 21203 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 996.285088][T21203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.295116][T21203] Call Trace: [ 996.298378][T21203] dump_stack+0x18e/0x1de [ 996.302676][T21203] should_fail+0x5d8/0x740 [ 996.307058][T21203] ? elevator_alloc+0x4b/0xc0 [ 996.311700][T21203] ? dd_init_queue+0x69/0x330 [ 996.316343][T21203] should_failslab+0x5/0x20 [ 996.320813][T21203] kmem_cache_alloc_trace+0x39/0x2b0 [ 996.326154][T21203] ? memset+0x1f/0x40 [ 996.330109][T21203] dd_init_queue+0x69/0x330 [ 996.334576][T21203] blk_mq_init_sched+0x444/0xb10 [ 996.339827][T21203] elevator_init_mq+0x2cd/0x3f0 [ 996.344643][T21203] __device_add_disk+0x87/0x1220 [ 996.349546][T21203] ? loop_add+0x400/0x710 [ 996.353840][T21203] loop_add+0x554/0x710 [ 996.357958][T21203] loop_control_ioctl+0x468/0x680 [ 996.362945][T21203] ? xor_init+0x60/0x60 [ 996.367184][T21203] do_vfs_ioctl+0x6fb/0x15b0 [ 996.371746][T21203] __x64_sys_ioctl+0xd4/0x110 [ 996.376394][T21203] do_syscall_64+0xcb/0x1e0 [ 996.380871][T21203] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 996.386734][T21203] RIP: 0033:0x7fddc0dc7e99 [ 996.391126][T21203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 996.410702][T21203] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 996.419083][T21203] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 996.427034][T21203] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 996.434974][T21203] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 996.442913][T21203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 996.450855][T21203] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 45) 17:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01005e000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x26}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xa}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc603000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc604000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xb}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x43}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)) 17:31:03 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.459210][T21203] "mq-deadline" elevator initialization failed, falling back to "none" [ 996.530267][T21327] FAULT_INJECTION: forcing a failure. [ 996.530267][T21327] name failslab, interval 1, probability 0, space 0, times 0 [ 996.545329][T21327] CPU: 1 PID: 21327 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 996.555553][T21327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.565579][T21327] Call Trace: [ 996.568841][T21327] dump_stack+0x18e/0x1de [ 996.573143][T21327] should_fail+0x5d8/0x740 [ 996.577527][T21327] ? kobject_set_name_vargs+0x5d/0x110 [ 996.582954][T21327] should_failslab+0x5/0x20 [ 996.587424][T21327] __kmalloc_track_caller+0x5d/0x2e0 [ 996.592678][T21327] kstrdup_const+0x51/0x90 [ 996.597062][T21327] kobject_set_name_vargs+0x5d/0x110 [ 996.602317][T21327] device_create_vargs+0x182/0x210 [ 996.607394][T21327] device_create+0x86/0xb0 [ 996.611775][T21327] ? vsnprintf+0x1a07/0x1aa0 [ 996.616334][T21327] bdi_register_va+0x89/0x5e0 [ 996.620994][T21327] bdi_register+0x80/0xa0 [ 996.625643][T21327] ? __device_add_disk+0x50a/0x1220 [ 996.630817][T21327] bdi_register_owner+0x56/0xf0 [ 996.635725][T21327] __device_add_disk+0x583/0x1220 [ 996.640722][T21327] loop_add+0x554/0x710 [ 996.644854][T21327] loop_control_ioctl+0x468/0x680 [ 996.649996][T21327] ? xor_init+0x60/0x60 [ 996.654122][T21327] do_vfs_ioctl+0x6fb/0x15b0 [ 996.658684][T21327] __x64_sys_ioctl+0xd4/0x110 [ 996.663332][T21327] do_syscall_64+0xcb/0x1e0 [ 996.667810][T21327] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 996.673675][T21327] RIP: 0033:0x7fddc0dc7e99 [ 996.678061][T21327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 996.697973][T21327] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 996.706354][T21327] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 996.714298][T21327] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 996.722242][T21327] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 996.730194][T21327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 996.738200][T21327] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 996.747163][T21327] ------------[ cut here ]------------ [ 996.752622][T21327] WARNING: CPU: 1 PID: 21327 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 996.761693][T21327] Modules linked in: [ 996.765562][T21327] CPU: 1 PID: 21327 Comm: syz-executor.1 Not tainted 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 996.775757][T21327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.785787][T21327] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 996.791563][T21327] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 996.811268][T21327] RSP: 0018:ffff8881e1847ce8 EFLAGS: 00010246 [ 996.817305][T21327] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 996.825265][T21327] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 996.833211][T21327] RBP: ffff8881eec2de88 R08: ffffffff82147f7e R09: ffffed103c308ed4 [ 996.841157][T21327] R10: ffffed103c308ed4 R11: 0000000000000000 R12: dffffc0000000000 [ 996.849100][T21327] R13: 1ffff1103e9fb001 R14: 1ffff1103e9fb09d R15: ffff8881f4fd8000 [ 996.857043][T21327] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 996.865938][T21327] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 996.872498][T21327] CR2: 00007ffeaac5de48 CR3: 00000001ed526000 CR4: 00000000003406e0 [ 996.880450][T21327] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 996.888394][T21327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 996.896336][T21327] Call Trace: [ 996.899606][T21327] loop_add+0x554/0x710 [ 996.903732][T21327] loop_control_ioctl+0x468/0x680 [ 996.908722][T21327] ? xor_init+0x60/0x60 [ 996.912846][T21327] do_vfs_ioctl+0x6fb/0x15b0 [ 996.917406][T21327] __x64_sys_ioctl+0xd4/0x110 [ 996.922051][T21327] do_syscall_64+0xcb/0x1e0 [ 996.926525][T21327] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 996.932394][T21327] RIP: 0033:0x7fddc0dc7e99 [ 996.936778][T21327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 996.956348][T21327] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 996.964724][T21327] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 996.972662][T21327] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 17:31:04 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 46) 17:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x48}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xc}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc701000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)) 17:31:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc702000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x4c}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xd}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xe}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 996.980694][T21327] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 996.988632][T21327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 996.996585][T21327] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 997.004969][T21327] ---[ end trace 8d4e5fe33cce545f ]--- [ 997.075191][T21550] FAULT_INJECTION: forcing a failure. [ 997.075191][T21550] name failslab, interval 1, probability 0, space 0, times 0 [ 997.089316][T21550] CPU: 1 PID: 21550 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 997.100920][T21550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.110971][T21550] Call Trace: [ 997.114238][T21550] dump_stack+0x18e/0x1de [ 997.118551][T21550] should_fail+0x5d8/0x740 [ 997.122937][T21550] ? kobject_set_name_vargs+0x5d/0x110 [ 997.128387][T21550] should_failslab+0x5/0x20 [ 997.132862][T21550] __kmalloc_track_caller+0x5d/0x2e0 [ 997.138118][T21550] kstrdup_const+0x51/0x90 [ 997.142500][T21550] kobject_set_name_vargs+0x5d/0x110 [ 997.147924][T21550] device_create_vargs+0x182/0x210 [ 997.153004][T21550] device_create+0x86/0xb0 [ 997.157384][T21550] ? vsnprintf+0x1a07/0x1aa0 [ 997.161944][T21550] bdi_register_va+0x89/0x5e0 [ 997.166586][T21550] bdi_register+0x80/0xa0 [ 997.170883][T21550] ? __device_add_disk+0x50a/0x1220 [ 997.176046][T21550] bdi_register_owner+0x56/0xf0 [ 997.180866][T21550] __device_add_disk+0x583/0x1220 [ 997.185860][T21550] loop_add+0x554/0x710 [ 997.189993][T21550] loop_control_ioctl+0x468/0x680 [ 997.194983][T21550] ? xor_init+0x60/0x60 [ 997.199118][T21550] do_vfs_ioctl+0x6fb/0x15b0 [ 997.203690][T21550] __x64_sys_ioctl+0xd4/0x110 [ 997.208341][T21550] do_syscall_64+0xcb/0x1e0 [ 997.212819][T21550] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 997.218687][T21550] RIP: 0033:0x7fddc0dc7e99 [ 997.223078][T21550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 997.242657][T21550] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 997.251035][T21550] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 997.258976][T21550] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 997.266916][T21550] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 997.274866][T21550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 997.282893][T21550] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 997.291887][T21550] ------------[ cut here ]------------ [ 997.297342][T21550] WARNING: CPU: 1 PID: 21550 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 997.306406][T21550] Modules linked in: [ 997.310281][T21550] CPU: 1 PID: 21550 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 997.321868][T21550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.331983][T21550] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 997.337757][T21550] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 997.357327][T21550] RSP: 0018:ffff8881ec087ce8 EFLAGS: 00010246 [ 997.363357][T21550] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 997.371348][T21550] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 997.379328][T21550] RBP: ffff8881eec28058 R08: ffffffff82147f7e R09: 0000000000000011 [ 997.387303][T21550] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 997.395248][T21550] R13: 1ffff11039f91601 R14: 1ffff11039f9169d R15: ffff8881cfc8b000 [ 997.403194][T21550] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 997.412090][T21550] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 997.418640][T21550] CR2: 00007fddbff3dff8 CR3: 00000001edd41000 CR4: 00000000003406e0 [ 997.426579][T21550] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 997.434519][T21550] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 997.442462][T21550] Call Trace: [ 997.445745][T21550] loop_add+0x554/0x710 [ 997.449875][T21550] loop_control_ioctl+0x468/0x680 [ 997.454869][T21550] ? xor_init+0x60/0x60 [ 997.459006][T21550] do_vfs_ioctl+0x6fb/0x15b0 [ 997.463579][T21550] __x64_sys_ioctl+0xd4/0x110 [ 997.468247][T21550] do_syscall_64+0xcb/0x1e0 [ 997.472878][T21550] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 997.478749][T21550] RIP: 0033:0x7fddc0dc7e99 [ 997.483222][T21550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 997.502880][T21550] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 997.511291][T21550] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 997.519405][T21550] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 17:31:04 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 47) 17:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x68}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)) 17:31:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc703000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x10}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x6c}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc704000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x74}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x11}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 997.527342][T21550] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 997.535284][T21550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 997.543227][T21550] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 997.551515][T21550] ---[ end trace 8d4e5fe33cce5460 ]--- [ 997.616309][T21669] FAULT_INJECTION: forcing a failure. [ 997.616309][T21669] name failslab, interval 1, probability 0, space 0, times 0 [ 997.629674][T21669] CPU: 0 PID: 21669 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 997.641291][T21669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.651321][T21669] Call Trace: [ 997.654587][T21669] dump_stack+0x18e/0x1de [ 997.658888][T21669] should_fail+0x5d8/0x740 [ 997.663305][T21669] ? device_add+0xcb/0x1820 [ 997.667957][T21669] should_failslab+0x5/0x20 [ 997.672431][T21669] kmem_cache_alloc_trace+0x39/0x2b0 [ 997.677683][T21669] device_add+0xcb/0x1820 [ 997.681985][T21669] ? kobject_set_name_vargs+0x5d/0x110 [ 997.687410][T21669] ? kstrdup_const+0x6c/0x90 [ 997.691964][T21669] ? memcpy+0x38/0x50 [ 997.695917][T21669] device_create_vargs+0x1b8/0x210 [ 997.701172][T21669] device_create+0x86/0xb0 [ 997.705552][T21669] ? vsnprintf+0x1a07/0x1aa0 [ 997.710110][T21669] bdi_register_va+0x89/0x5e0 [ 997.714752][T21669] bdi_register+0x80/0xa0 [ 997.719048][T21669] ? __device_add_disk+0x50a/0x1220 [ 997.724214][T21669] bdi_register_owner+0x56/0xf0 [ 997.729032][T21669] __device_add_disk+0x583/0x1220 [ 997.734024][T21669] loop_add+0x554/0x710 [ 997.738146][T21669] loop_control_ioctl+0x468/0x680 [ 997.743261][T21669] ? xor_init+0x60/0x60 [ 997.747384][T21669] do_vfs_ioctl+0x6fb/0x15b0 [ 997.751945][T21669] __x64_sys_ioctl+0xd4/0x110 [ 997.756588][T21669] do_syscall_64+0xcb/0x1e0 [ 997.761061][T21669] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 997.766938][T21669] RIP: 0033:0x7fddc0dc7e99 [ 997.771322][T21669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 997.790895][T21669] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 997.799271][T21669] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 997.807400][T21669] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 997.815339][T21669] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 997.823276][T21669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 997.831218][T21669] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 997.840372][T21669] ------------[ cut here ]------------ [ 997.845835][T21669] WARNING: CPU: 1 PID: 21669 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 997.854901][T21669] Modules linked in: [ 997.858768][T21669] CPU: 1 PID: 21669 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 997.870352][T21669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.880385][T21669] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 997.886161][T21669] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 997.905829][T21669] RSP: 0018:ffff8881e8b8fce8 EFLAGS: 00010246 [ 997.912011][T21669] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 997.919954][T21669] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 997.927896][T21669] RBP: ffff8881eec2b3b8 R08: ffffffff82147f7e R09: ffffed103d171eda [ 997.935836][T21669] R10: ffffed103d171eda R11: 0000000000000000 R12: dffffc0000000000 [ 997.943778][T21669] R13: 1ffff1103a1e5e01 R14: 1ffff1103a1e5e9d R15: ffff8881d0f2f000 [ 997.951829][T21669] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 997.960724][T21669] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 997.967304][T21669] CR2: 00007ffc5c594e98 CR3: 00000001ef600000 CR4: 00000000003406e0 [ 997.975255][T21669] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 997.983200][T21669] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 997.991140][T21669] Call Trace: [ 997.994403][T21669] loop_add+0x554/0x710 [ 997.998530][T21669] loop_control_ioctl+0x468/0x680 [ 998.003525][T21669] ? xor_init+0x60/0x60 [ 998.007653][T21669] do_vfs_ioctl+0x6fb/0x15b0 [ 998.012219][T21669] __x64_sys_ioctl+0xd4/0x110 [ 998.016868][T21669] do_syscall_64+0xcb/0x1e0 [ 998.021342][T21669] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.027203][T21669] RIP: 0033:0x7fddc0dc7e99 [ 998.031600][T21669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.051172][T21669] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 998.059548][T21669] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 17:31:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 48) 17:31:05 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100000a00000006000000000000070000000000000000030000002e00000000000000000000100000000000"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:05 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x7a}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x12}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xec}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x25}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:05 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc801000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.067496][T21669] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 998.075442][T21669] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 998.083382][T21669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 998.091320][T21669] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 998.099263][T21669] ---[ end trace 8d4e5fe33cce5461 ]--- 17:31:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x300}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 998.193608][T21910] FAULT_INJECTION: forcing a failure. [ 998.193608][T21910] name failslab, interval 1, probability 0, space 0, times 0 [ 998.206205][T21910] CPU: 1 PID: 21910 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 998.217885][T21910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.227910][T21910] Call Trace: [ 998.231171][T21910] dump_stack+0x18e/0x1de [ 998.235470][T21910] should_fail+0x5d8/0x740 [ 998.239853][T21910] ? __kernfs_new_node+0x8b/0x630 [ 998.244847][T21910] should_failslab+0x5/0x20 [ 998.249320][T21910] kmem_cache_alloc+0x36/0x290 [ 998.254050][T21910] ? memcpy+0x38/0x50 [ 998.257999][T21910] __kernfs_new_node+0x8b/0x630 [ 998.262817][T21910] ? bdi_register+0x80/0xa0 [ 998.267290][T21910] ? bdi_register_owner+0x56/0xf0 [ 998.272280][T21910] ? loop_add+0x554/0x710 [ 998.276574][T21910] ? loop_control_ioctl+0x468/0x680 [ 998.281762][T21910] ? do_vfs_ioctl+0x6fb/0x15b0 [ 998.286491][T21910] ? __x64_sys_ioctl+0xd4/0x110 [ 998.291351][T21910] ? do_syscall_64+0xcb/0x1e0 [ 998.295993][T21910] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.302027][T21910] kernfs_create_dir_ns+0x90/0x220 [ 998.307108][T21910] sysfs_create_dir_ns+0x14e/0x2f0 [ 998.312186][T21910] kobject_add_internal+0x595/0xbd0 [ 998.317350][T21910] kobject_add+0x100/0x1a0 [ 998.321734][T21910] ? get_device_parent+0x2cd/0x430 [ 998.326809][T21910] device_add+0x417/0x1820 [ 998.331197][T21910] device_create_vargs+0x1b8/0x210 [ 998.336278][T21910] device_create+0x86/0xb0 [ 998.340663][T21910] ? vsnprintf+0x1a07/0x1aa0 [ 998.345218][T21910] bdi_register_va+0x89/0x5e0 [ 998.349862][T21910] bdi_register+0x80/0xa0 [ 998.354159][T21910] ? __device_add_disk+0x50a/0x1220 [ 998.359328][T21910] bdi_register_owner+0x56/0xf0 [ 998.364144][T21910] __device_add_disk+0x583/0x1220 [ 998.369138][T21910] loop_add+0x554/0x710 [ 998.373258][T21910] loop_control_ioctl+0x468/0x680 [ 998.378248][T21910] ? xor_init+0x60/0x60 [ 998.382395][T21910] do_vfs_ioctl+0x6fb/0x15b0 [ 998.386953][T21910] __x64_sys_ioctl+0xd4/0x110 [ 998.391620][T21910] do_syscall_64+0xcb/0x1e0 [ 998.396089][T21910] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.401950][T21910] RIP: 0033:0x7fddc0dc7e99 [ 998.406338][T21910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.425909][T21910] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 998.434283][T21910] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 998.442224][T21910] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 998.450165][T21910] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 998.458103][T21910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 998.466042][T21910] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 998.474852][T21910] kobject_add_internal failed for 7:0 (error: -12 parent: bdi) [ 998.482582][T21910] ------------[ cut here ]------------ [ 998.488034][T21910] WARNING: CPU: 1 PID: 21910 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 998.497104][T21910] Modules linked in: [ 998.500972][T21910] CPU: 1 PID: 21910 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 998.512557][T21910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.522589][T21910] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 998.528369][T21910] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 998.547952][T21910] RSP: 0018:ffff8881e2e87ce8 EFLAGS: 00010246 [ 998.553991][T21910] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 998.561931][T21910] RDX: ffffc9000114c000 RSI: 000000000003ffff RDI: 0000000000040000 [ 998.569869][T21910] RBP: ffff8881eec2d5f8 R08: ffffffff82147f7e R09: 0000000000000010 [ 998.577819][T21910] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 998.585756][T21910] R13: 1ffff11039f8f001 R14: 1ffff11039f8f09d R15: ffff8881cfc78000 [ 998.593720][T21910] FS: 00007fddbff1d700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 998.602621][T21910] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 998.609199][T21910] CR2: 00007fddbff1cff8 CR3: 00000001e2931000 CR4: 00000000003406e0 [ 998.617152][T21910] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 998.625093][T21910] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 998.633033][T21910] Call Trace: [ 998.636314][T21910] loop_add+0x554/0x710 [ 998.640441][T21910] loop_control_ioctl+0x468/0x680 [ 998.645434][T21910] ? xor_init+0x60/0x60 [ 998.649559][T21910] do_vfs_ioctl+0x6fb/0x15b0 [ 998.654119][T21910] __x64_sys_ioctl+0xd4/0x110 [ 998.658765][T21910] do_syscall_64+0xcb/0x1e0 [ 998.663245][T21910] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.669114][T21910] RIP: 0033:0x7fddc0dc7e99 [ 998.673505][T21910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.693078][T21910] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 998.701458][T21910] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 998.709485][T21910] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 998.717425][T21910] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 998.725362][T21910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 998.733302][T21910] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 17:31:06 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 49) 17:31:06 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100000a00000006000000000000070000000000000000030000002e00000000000000000000100000000000"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc802000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x500}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x26}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x43}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc803000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x600}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 998.741244][T21910] ---[ end trace 8d4e5fe33cce5462 ]--- 17:31:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc804000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.814022][T21942] FAULT_INJECTION: forcing a failure. [ 998.814022][T21942] name failslab, interval 1, probability 0, space 0, times 0 [ 998.827679][T21942] CPU: 0 PID: 21942 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 998.839282][T21942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.849311][T21942] Call Trace: [ 998.852572][T21942] dump_stack+0x18e/0x1de [ 998.856870][T21942] should_fail+0x5d8/0x740 [ 998.861253][T21942] ? __kernfs_new_node+0x8b/0x630 [ 998.866246][T21942] should_failslab+0x5/0x20 [ 998.870715][T21942] kmem_cache_alloc+0x36/0x290 [ 998.875530][T21942] ? memcpy+0x38/0x50 [ 998.879480][T21942] __kernfs_new_node+0x8b/0x630 [ 998.884301][T21942] ? bdi_register+0x80/0xa0 [ 998.888774][T21942] ? bdi_register_owner+0x56/0xf0 [ 998.893773][T21942] ? loop_add+0x554/0x710 [ 998.898075][T21942] ? loop_control_ioctl+0x468/0x680 [ 998.903245][T21942] ? do_vfs_ioctl+0x6fb/0x15b0 [ 998.907973][T21942] ? __x64_sys_ioctl+0xd4/0x110 [ 998.912912][T21942] ? do_syscall_64+0xcb/0x1e0 [ 998.917561][T21942] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.923604][T21942] kernfs_create_dir_ns+0x90/0x220 [ 998.929155][T21942] sysfs_create_dir_ns+0x14e/0x2f0 [ 998.934235][T21942] kobject_add_internal+0x595/0xbd0 [ 998.939402][T21942] kobject_add+0x100/0x1a0 [ 998.943787][T21942] ? get_device_parent+0x2cd/0x430 [ 998.948869][T21942] device_add+0x417/0x1820 [ 998.953256][T21942] device_create_vargs+0x1b8/0x210 [ 998.958342][T21942] device_create+0x86/0xb0 [ 998.962815][T21942] ? vsnprintf+0x1a07/0x1aa0 [ 998.967378][T21942] bdi_register_va+0x89/0x5e0 [ 998.972025][T21942] bdi_register+0x80/0xa0 [ 998.976501][T21942] ? __device_add_disk+0x50a/0x1220 [ 998.981670][T21942] bdi_register_owner+0x56/0xf0 [ 998.986493][T21942] __device_add_disk+0x583/0x1220 [ 998.991485][T21942] loop_add+0x554/0x710 [ 998.995614][T21942] loop_control_ioctl+0x468/0x680 [ 999.000609][T21942] ? xor_init+0x60/0x60 [ 999.004734][T21942] do_vfs_ioctl+0x6fb/0x15b0 [ 999.009294][T21942] __x64_sys_ioctl+0xd4/0x110 [ 999.013939][T21942] do_syscall_64+0xcb/0x1e0 [ 999.018410][T21942] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.024282][T21942] RIP: 0033:0x7fddc0dc7e99 [ 999.028669][T21942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.048239][T21942] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 999.056616][T21942] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 999.064640][T21942] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 999.072577][T21942] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.080514][T21942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.088545][T21942] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 999.096952][T21942] kobject_add_internal failed for 7:0 (error: -12 parent: bdi) [ 999.104571][T21942] ------------[ cut here ]------------ [ 999.110007][T21942] WARNING: CPU: 0 PID: 21942 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 999.119078][T21942] Modules linked in: [ 999.122948][T21942] CPU: 0 PID: 21942 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 999.134541][T21942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.144573][T21942] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 999.150350][T21942] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 999.169929][T21942] RSP: 0018:ffff8881e8bffce8 EFLAGS: 00010246 [ 999.175964][T21942] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 999.183901][T21942] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 999.191943][T21942] RBP: ffff8881ef55bc48 R08: ffffffff82147f7e R09: 0000000000000010 [ 999.199906][T21942] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 999.207848][T21942] R13: 1ffff1103a0b8a01 R14: 1ffff1103a0b8a9d R15: ffff8881d05c5000 [ 999.215878][T21942] FS: 00007fddbff3e700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 999.224776][T21942] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 999.231326][T21942] CR2: 00007ffdcfc88be8 CR3: 00000001cf80a000 CR4: 00000000003406f0 [ 999.239265][T21942] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 999.247207][T21942] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 999.255171][T21942] Call Trace: [ 999.258440][T21942] loop_add+0x554/0x710 [ 999.262568][T21942] loop_control_ioctl+0x468/0x680 [ 999.267561][T21942] ? xor_init+0x60/0x60 [ 999.271684][T21942] do_vfs_ioctl+0x6fb/0x15b0 [ 999.276245][T21942] __x64_sys_ioctl+0xd4/0x110 [ 999.280897][T21942] do_syscall_64+0xcb/0x1e0 [ 999.285372][T21942] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.291231][T21942] RIP: 0033:0x7fddc0dc7e99 [ 999.295612][T21942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.315268][T21942] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 999.323647][T21942] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 999.331584][T21942] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 999.339521][T21942] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.347465][T21942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.355403][T21942] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:06 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 50) 17:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x700}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:06 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100000a00000006000000000000070000000000000000030000002e00000000000000000000100000000000"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100000a00000006000000000000070000000000000000030000002e00000000000000000000100000000000"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) 17:31:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x48}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc901000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x4c}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x900}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc902000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 999.363344][T21942] ---[ end trace 8d4e5fe33cce5463 ]--- 17:31:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010000000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 999.432291][T22131] FAULT_INJECTION: forcing a failure. [ 999.432291][T22131] name failslab, interval 1, probability 0, space 0, times 0 [ 999.445386][T22131] CPU: 0 PID: 22131 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 999.457163][T22131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.467193][T22131] Call Trace: [ 999.470456][T22131] dump_stack+0x18e/0x1de [ 999.474756][T22131] should_fail+0x5d8/0x740 [ 999.479144][T22131] ? __kernfs_new_node+0x8b/0x630 [ 999.484140][T22131] should_failslab+0x5/0x20 [ 999.488611][T22131] kmem_cache_alloc+0x36/0x290 [ 999.493349][T22131] ? kernfs_activate+0x3fc/0x420 [ 999.498253][T22131] __kernfs_new_node+0x8b/0x630 [ 999.503072][T22131] ? kernfs_create_dir_ns+0x1df/0x220 [ 999.508409][T22131] kernfs_new_node+0x95/0x160 [ 999.513053][T22131] __kernfs_create_file+0x45/0x260 [ 999.518137][T22131] sysfs_add_file_mode_ns+0x293/0x340 [ 999.523481][T22131] sysfs_create_file_ns+0x146/0x230 [ 999.528645][T22131] device_add+0x5d7/0x1820 [ 999.533033][T22131] device_create_vargs+0x1b8/0x210 [ 999.538110][T22131] device_create+0x86/0xb0 [ 999.542493][T22131] ? vsnprintf+0x1a07/0x1aa0 [ 999.547049][T22131] bdi_register_va+0x89/0x5e0 [ 999.551695][T22131] bdi_register+0x80/0xa0 [ 999.555992][T22131] ? __device_add_disk+0x50a/0x1220 [ 999.561156][T22131] bdi_register_owner+0x56/0xf0 [ 999.565972][T22131] __device_add_disk+0x583/0x1220 [ 999.570964][T22131] loop_add+0x554/0x710 [ 999.575097][T22131] loop_control_ioctl+0x468/0x680 [ 999.580091][T22131] ? xor_init+0x60/0x60 [ 999.584213][T22131] do_vfs_ioctl+0x6fb/0x15b0 [ 999.588815][T22131] __x64_sys_ioctl+0xd4/0x110 [ 999.593472][T22131] do_syscall_64+0xcb/0x1e0 [ 999.597956][T22131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.603823][T22131] RIP: 0033:0x7fddc0dc7e99 [ 999.608210][T22131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.627787][T22131] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 999.636174][T22131] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 999.644122][T22131] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 999.652065][T22131] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.660006][T22131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.667970][T22131] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 999.679608][T22131] ------------[ cut here ]------------ [ 999.685247][T22131] WARNING: CPU: 1 PID: 22131 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 999.694316][T22131] Modules linked in: [ 999.698189][T22131] CPU: 1 PID: 22131 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 999.709775][T22131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.719809][T22131] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 999.725585][T22131] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 999.745161][T22131] RSP: 0018:ffff8881e3187ce8 EFLAGS: 00010246 [ 999.751196][T22131] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 999.759164][T22131] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 999.767105][T22131] RBP: ffff8881eec29178 R08: ffffffff82147f7e R09: 0000000000000010 [ 999.775049][T22131] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 999.782990][T22131] R13: 1ffff11039e5a001 R14: 1ffff11039e5a09d R15: ffff8881cf2d0000 [ 999.790933][T22131] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 999.799830][T22131] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 999.806382][T22131] CR2: 00007f8d8c37ff2b CR3: 00000001ea747000 CR4: 00000000003406e0 [ 999.814326][T22131] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 999.822269][T22131] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 999.830206][T22131] Call Trace: [ 999.833467][T22131] loop_add+0x554/0x710 [ 999.837591][T22131] loop_control_ioctl+0x468/0x680 [ 999.842584][T22131] ? xor_init+0x60/0x60 [ 999.846717][T22131] do_vfs_ioctl+0x6fb/0x15b0 [ 999.851282][T22131] __x64_sys_ioctl+0xd4/0x110 [ 999.855929][T22131] do_syscall_64+0xcb/0x1e0 [ 999.860406][T22131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.866270][T22131] RIP: 0033:0x7fddc0dc7e99 [ 999.870656][T22131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.890229][T22131] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 999.898611][T22131] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 999.906551][T22131] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 999.914490][T22131] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.922449][T22131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:07 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 51) 17:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xa00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x68}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010000000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x6c}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc904000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xb00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010000000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010000000000000000000c0000000c0000000a00000006000000000000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) [ 999.930389][T22131] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 999.938334][T22131] ---[ end trace 8d4e5fe33cce5464 ]--- [ 1000.030525][T22479] FAULT_INJECTION: forcing a failure. [ 1000.030525][T22479] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.043274][T22479] CPU: 1 PID: 22479 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1000.054933][T22479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.064961][T22479] Call Trace: [ 1000.068271][T22479] dump_stack+0x18e/0x1de [ 1000.072571][T22479] should_fail+0x5d8/0x740 [ 1000.076957][T22479] ? __kernfs_new_node+0x8b/0x630 [ 1000.081954][T22479] should_failslab+0x5/0x20 [ 1000.086424][T22479] kmem_cache_alloc+0x36/0x290 [ 1000.091416][T22479] ? kernfs_activate+0x3fc/0x420 [ 1000.096323][T22479] __kernfs_new_node+0x8b/0x630 [ 1000.101148][T22479] ? kernfs_create_dir_ns+0x1df/0x220 [ 1000.106489][T22479] kernfs_new_node+0x95/0x160 [ 1000.111137][T22479] __kernfs_create_file+0x45/0x260 [ 1000.116220][T22479] sysfs_add_file_mode_ns+0x293/0x340 [ 1000.121560][T22479] sysfs_create_file_ns+0x146/0x230 [ 1000.126729][T22479] device_add+0x5d7/0x1820 [ 1000.131142][T22479] device_create_vargs+0x1b8/0x210 [ 1000.136327][T22479] device_create+0x86/0xb0 [ 1000.140717][T22479] ? vsnprintf+0x1a07/0x1aa0 [ 1000.145436][T22479] bdi_register_va+0x89/0x5e0 [ 1000.150095][T22479] bdi_register+0x80/0xa0 [ 1000.154406][T22479] ? __device_add_disk+0x50a/0x1220 [ 1000.159578][T22479] bdi_register_owner+0x56/0xf0 [ 1000.164407][T22479] __device_add_disk+0x583/0x1220 [ 1000.169404][T22479] loop_add+0x554/0x710 [ 1000.173549][T22479] loop_control_ioctl+0x468/0x680 [ 1000.178618][T22479] ? xor_init+0x60/0x60 [ 1000.182751][T22479] do_vfs_ioctl+0x6fb/0x15b0 [ 1000.187318][T22479] __x64_sys_ioctl+0xd4/0x110 [ 1000.191965][T22479] do_syscall_64+0xcb/0x1e0 [ 1000.196442][T22479] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.202309][T22479] RIP: 0033:0x7fddc0dc7e99 [ 1000.206694][T22479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1000.226271][T22479] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1000.234649][T22479] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 1000.242591][T22479] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1000.250532][T22479] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1000.258470][T22479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1000.266495][T22479] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 1000.275599][T22479] ------------[ cut here ]------------ [ 1000.281060][T22479] WARNING: CPU: 1 PID: 22479 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1000.290128][T22479] Modules linked in: [ 1000.293995][T22479] CPU: 1 PID: 22479 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1000.305585][T22479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.315709][T22479] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1000.321487][T22479] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1000.341067][T22479] RSP: 0018:ffff8881e7effce8 EFLAGS: 00010246 [ 1000.347112][T22479] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1000.355082][T22479] RDX: ffffc9000114c000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1000.363035][T22479] RBP: ffff8881eec29a08 R08: ffffffff82147f7e R09: 0000000000000010 [ 1000.370976][T22479] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1000.378918][T22479] R13: 1ffff1103c3b5801 R14: 1ffff1103c3b589d R15: ffff8881e1dac000 [ 1000.386862][T22479] FS: 00007fddbff1d700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1000.395765][T22479] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1000.402326][T22479] CR2: 00007fddbff1cff8 CR3: 00000001e7d2c000 CR4: 00000000003406e0 [ 1000.410376][T22479] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1000.418324][T22479] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1000.426265][T22479] Call Trace: [ 1000.429620][T22479] loop_add+0x554/0x710 [ 1000.433749][T22479] loop_control_ioctl+0x468/0x680 [ 1000.438743][T22479] ? xor_init+0x60/0x60 [ 1000.442871][T22479] do_vfs_ioctl+0x6fb/0x15b0 [ 1000.447435][T22479] __x64_sys_ioctl+0xd4/0x110 [ 1000.452082][T22479] do_syscall_64+0xcb/0x1e0 [ 1000.456558][T22479] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.462438][T22479] RIP: 0033:0x7fddc0dc7e99 [ 1000.466824][T22479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1000.486491][T22479] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1000.494872][T22479] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 1000.502861][T22479] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1000.510804][T22479] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1000.518744][T22479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:07 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 52) 17:31:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x74}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xc00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x7, 0x0, 0x0, 0x7}]}, {0x0, [0x2e, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xd00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x7a}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xe00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x7, 0x0, 0x0, 0x7}]}, {0x0, [0x2e, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) [ 1000.526684][T22479] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 1000.534737][T22479] ---[ end trace 8d4e5fe33cce5465 ]--- [ 1000.603762][T22489] FAULT_INJECTION: forcing a failure. [ 1000.603762][T22489] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.616407][T22489] CPU: 1 PID: 22489 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1000.628095][T22489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.638219][T22489] Call Trace: [ 1000.641486][T22489] dump_stack+0x18e/0x1de [ 1000.645787][T22489] should_fail+0x5d8/0x740 [ 1000.650174][T22489] ? __kernfs_new_node+0x47/0x630 [ 1000.655166][T22489] should_failslab+0x5/0x20 [ 1000.659647][T22489] __kmalloc_track_caller+0x5d/0x2e0 [ 1000.664912][T22489] kstrdup_const+0x51/0x90 [ 1000.669309][T22489] __kernfs_new_node+0x47/0x630 [ 1000.674151][T22489] ? mutex_lock+0x6c/0xc0 [ 1000.678451][T22489] ? kernfs_activate+0x3fc/0x420 [ 1000.683370][T22489] kernfs_new_node+0x95/0x160 [ 1000.688022][T22489] kernfs_create_link+0x9c/0x1f0 [ 1000.692928][T22489] sysfs_do_create_link_sd+0x85/0x100 [ 1000.698268][T22489] device_add+0x93a/0x1820 [ 1000.702656][T22489] device_create_vargs+0x1b8/0x210 [ 1000.707740][T22489] device_create+0x86/0xb0 [ 1000.712127][T22489] ? vsnprintf+0x1a07/0x1aa0 [ 1000.716693][T22489] bdi_register_va+0x89/0x5e0 [ 1000.721352][T22489] bdi_register+0x80/0xa0 [ 1000.725660][T22489] ? __device_add_disk+0x50a/0x1220 [ 1000.730836][T22489] bdi_register_owner+0x56/0xf0 [ 1000.735658][T22489] __device_add_disk+0x583/0x1220 [ 1000.740655][T22489] loop_add+0x554/0x710 [ 1000.744780][T22489] loop_control_ioctl+0x468/0x680 [ 1000.749771][T22489] ? xor_init+0x60/0x60 [ 1000.753896][T22489] do_vfs_ioctl+0x6fb/0x15b0 [ 1000.758459][T22489] __x64_sys_ioctl+0xd4/0x110 [ 1000.763104][T22489] do_syscall_64+0xcb/0x1e0 [ 1000.767578][T22489] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.773440][T22489] RIP: 0033:0x7fddc0dc7e99 [ 1000.777823][T22489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1000.797393][T22489] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1000.805770][T22489] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1000.813740][T22489] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1000.821682][T22489] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1000.829729][T22489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1000.837685][T22489] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1000.847489][T22489] ------------[ cut here ]------------ [ 1000.852951][T22489] WARNING: CPU: 1 PID: 22489 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1000.862020][T22489] Modules linked in: [ 1000.865932][T22489] CPU: 1 PID: 22489 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1000.877518][T22489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.887735][T22489] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1000.893510][T22489] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1000.913082][T22489] RSP: 0018:ffff8881e74e7ce8 EFLAGS: 00010246 [ 1000.919114][T22489] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1000.927054][T22489] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1000.934994][T22489] RBP: ffff8881eec2bc48 R08: ffffffff82147f7e R09: 0000000000000010 [ 1000.943195][T22489] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1000.951145][T22489] R13: 1ffff1103cd97e01 R14: 1ffff1103cd97e9d R15: ffff8881e6cbf000 [ 1000.959089][T22489] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1000.967983][T22489] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1000.974533][T22489] CR2: 00007fddbff3dff8 CR3: 00000001c8059000 CR4: 00000000003406e0 [ 1000.982476][T22489] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1000.990418][T22489] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1000.998360][T22489] Call Trace: [ 1001.001632][T22489] loop_add+0x554/0x710 [ 1001.005756][T22489] loop_control_ioctl+0x468/0x680 [ 1001.010751][T22489] ? xor_init+0x60/0x60 [ 1001.014894][T22489] do_vfs_ioctl+0x6fb/0x15b0 [ 1001.019455][T22489] __x64_sys_ioctl+0xd4/0x110 [ 1001.024099][T22489] do_syscall_64+0xcb/0x1e0 [ 1001.028599][T22489] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.034466][T22489] RIP: 0033:0x7fddc0dc7e99 [ 1001.038856][T22489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1001.058426][T22489] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1001.066814][T22489] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1001.074762][T22489] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1001.082703][T22489] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.090654][T22489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:08 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 53) 17:31:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xe7}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:08 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x1100}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x7, 0x0, 0x0, 0x7}]}, {0x0, [0x2e, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x7, 0x0, 0x0, 0x7}]}, {0x0, [0x2e, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) 17:31:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x300}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:08 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x500}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe7, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x1200}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1001.098594][T22489] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1001.106538][T22489] ---[ end trace 8d4e5fe33cce5466 ]--- [ 1001.189759][T22760] FAULT_INJECTION: forcing a failure. [ 1001.189759][T22760] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.203087][T22760] CPU: 0 PID: 22760 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1001.214687][T22760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.224716][T22760] Call Trace: [ 1001.227979][T22760] dump_stack+0x18e/0x1de [ 1001.232278][T22760] should_fail+0x5d8/0x740 [ 1001.236663][T22760] ? __kernfs_new_node+0x47/0x630 [ 1001.241656][T22760] should_failslab+0x5/0x20 [ 1001.246131][T22760] __kmalloc_track_caller+0x5d/0x2e0 [ 1001.251386][T22760] kstrdup_const+0x51/0x90 [ 1001.255772][T22760] __kernfs_new_node+0x47/0x630 [ 1001.260590][T22760] ? mutex_lock+0x6c/0xc0 [ 1001.264891][T22760] ? kernfs_activate+0x3fc/0x420 [ 1001.269800][T22760] kernfs_new_node+0x95/0x160 [ 1001.274445][T22760] kernfs_create_link+0x9c/0x1f0 [ 1001.279350][T22760] sysfs_do_create_link_sd+0x85/0x100 [ 1001.284886][T22760] device_add+0x93a/0x1820 [ 1001.289271][T22760] device_create_vargs+0x1b8/0x210 [ 1001.294349][T22760] device_create+0x86/0xb0 [ 1001.298818][T22760] ? vsnprintf+0x1a07/0x1aa0 [ 1001.303379][T22760] bdi_register_va+0x89/0x5e0 [ 1001.308028][T22760] bdi_register+0x80/0xa0 [ 1001.312327][T22760] ? __device_add_disk+0x50a/0x1220 [ 1001.317494][T22760] bdi_register_owner+0x56/0xf0 [ 1001.322314][T22760] __device_add_disk+0x583/0x1220 [ 1001.327310][T22760] loop_add+0x554/0x710 [ 1001.331435][T22760] loop_control_ioctl+0x468/0x680 [ 1001.336432][T22760] ? xor_init+0x60/0x60 [ 1001.340574][T22760] do_vfs_ioctl+0x6fb/0x15b0 [ 1001.345134][T22760] __x64_sys_ioctl+0xd4/0x110 [ 1001.349779][T22760] do_syscall_64+0xcb/0x1e0 [ 1001.354254][T22760] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.360113][T22760] RIP: 0033:0x7fddc0dc7e99 [ 1001.364506][T22760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1001.384120][T22760] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1001.392503][T22760] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1001.400569][T22760] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1001.408511][T22760] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.416489][T22760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1001.424430][T22760] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1001.432801][T22760] ------------[ cut here ]------------ [ 1001.438312][T22760] WARNING: CPU: 0 PID: 22760 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1001.447382][T22760] Modules linked in: [ 1001.451264][T22760] CPU: 0 PID: 22760 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1001.462852][T22760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.472884][T22760] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1001.478659][T22760] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1001.498353][T22760] RSP: 0018:ffff8881e859fce8 EFLAGS: 00010246 [ 1001.504390][T22760] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1001.512339][T22760] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1001.520284][T22760] RBP: ffff8881ef559a08 R08: ffffffff82147f7e R09: 0000000000000010 [ 1001.528227][T22760] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1001.536171][T22760] R13: 1ffff1103ab0d801 R14: 1ffff1103ab0d89d R15: ffff8881d586c000 [ 1001.544112][T22760] FS: 00007fddbff3e700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1001.553040][T22760] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1001.559592][T22760] CR2: 00007fddbff3dff8 CR3: 00000001e1462000 CR4: 00000000003406f0 [ 1001.567533][T22760] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1001.575473][T22760] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1001.583413][T22760] Call Trace: [ 1001.586678][T22760] loop_add+0x554/0x710 [ 1001.590804][T22760] loop_control_ioctl+0x468/0x680 [ 1001.595794][T22760] ? xor_init+0x60/0x60 [ 1001.599935][T22760] do_vfs_ioctl+0x6fb/0x15b0 [ 1001.604500][T22760] __x64_sys_ioctl+0xd4/0x110 [ 1001.609159][T22760] do_syscall_64+0xcb/0x1e0 [ 1001.613633][T22760] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.619498][T22760] RIP: 0033:0x7fddc0dc7e99 [ 1001.623886][T22760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1001.643468][T22760] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1001.651909][T22760] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1001.659852][T22760] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1001.667794][T22760] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.675776][T22760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1001.683888][T22760] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 54) 17:31:09 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x600}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x1800}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:09 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x2000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x700}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x2500}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x900}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1001.691856][T22760] ---[ end trace 8d4e5fe33cce5467 ]--- [ 1001.774079][T22992] FAULT_INJECTION: forcing a failure. [ 1001.774079][T22992] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.787113][T22992] CPU: 1 PID: 22992 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1001.798709][T22992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.808736][T22992] Call Trace: [ 1001.812006][T22992] dump_stack+0x18e/0x1de [ 1001.816306][T22992] should_fail+0x5d8/0x740 [ 1001.820694][T22992] ? __kernfs_new_node+0x8b/0x630 [ 1001.825686][T22992] should_failslab+0x5/0x20 [ 1001.830159][T22992] kmem_cache_alloc+0x36/0x290 [ 1001.834893][T22992] __kernfs_new_node+0x8b/0x630 [ 1001.839718][T22992] ? mutex_unlock+0x19/0x40 [ 1001.844191][T22992] ? kernfs_xattr_get+0x81/0x90 [ 1001.849011][T22992] ? selinux_kernfs_init_security+0x12d/0x720 [ 1001.855175][T22992] kernfs_new_node+0x95/0x160 [ 1001.859997][T22992] __kernfs_create_file+0x45/0x260 [ 1001.865079][T22992] sysfs_add_file_mode_ns+0x293/0x340 [ 1001.870422][T22992] internal_create_group+0x486/0xd70 [ 1001.875712][T22992] sysfs_create_groups+0x5d/0x130 [ 1001.880713][T22992] device_add+0x9fa/0x1820 [ 1001.885117][T22992] device_create_vargs+0x1b8/0x210 [ 1001.890324][T22992] device_create+0x86/0xb0 [ 1001.894711][T22992] ? vsnprintf+0x1a07/0x1aa0 [ 1001.899272][T22992] bdi_register_va+0x89/0x5e0 [ 1001.903916][T22992] bdi_register+0x80/0xa0 [ 1001.908225][T22992] ? __device_add_disk+0x50a/0x1220 [ 1001.913395][T22992] bdi_register_owner+0x56/0xf0 [ 1001.918217][T22992] __device_add_disk+0x583/0x1220 [ 1001.923212][T22992] loop_add+0x554/0x710 [ 1001.927335][T22992] loop_control_ioctl+0x468/0x680 [ 1001.932330][T22992] ? xor_init+0x60/0x60 [ 1001.936458][T22992] do_vfs_ioctl+0x6fb/0x15b0 [ 1001.941021][T22992] __x64_sys_ioctl+0xd4/0x110 [ 1001.945667][T22992] do_syscall_64+0xcb/0x1e0 [ 1001.950140][T22992] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.956004][T22992] RIP: 0033:0x7fddc0dc7e99 [ 1001.960390][T22992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1001.979961][T22992] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1001.988487][T22992] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 1001.996514][T22992] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1002.004455][T22992] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1002.012401][T22992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1002.020380][T22992] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 1002.030812][T22992] ------------[ cut here ]------------ [ 1002.036381][T22992] WARNING: CPU: 1 PID: 22992 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1002.045448][T22992] Modules linked in: [ 1002.049318][T22992] CPU: 1 PID: 22992 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1002.060905][T22992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.070940][T22992] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1002.076720][T22992] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1002.096291][T22992] RSP: 0018:ffff8881cd2cfce8 EFLAGS: 00010246 [ 1002.102327][T22992] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1002.110268][T22992] RDX: ffffc9000114c000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1002.118213][T22992] RBP: ffff8881f0416fa8 R08: ffffffff82147f7e R09: 0000000000000010 [ 1002.126200][T22992] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1002.134142][T22992] R13: 1ffff11039f34a01 R14: 1ffff11039f34a9d R15: ffff8881cf9a5000 [ 1002.142171][T22992] FS: 00007fddbff1d700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1002.151068][T22992] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1002.157618][T22992] CR2: 00007fddbff1cff8 CR3: 00000001d7419000 CR4: 00000000003406e0 [ 1002.165560][T22992] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1002.173505][T22992] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1002.181494][T22992] Call Trace: [ 1002.184759][T22992] loop_add+0x554/0x710 [ 1002.188904][T22992] loop_control_ioctl+0x468/0x680 [ 1002.193898][T22992] ? xor_init+0x60/0x60 [ 1002.198027][T22992] do_vfs_ioctl+0x6fb/0x15b0 [ 1002.202590][T22992] __x64_sys_ioctl+0xd4/0x110 [ 1002.207242][T22992] do_syscall_64+0xcb/0x1e0 [ 1002.211717][T22992] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1002.217580][T22992] RIP: 0033:0x7fddc0dc7e99 [ 1002.221966][T22992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1002.241542][T22992] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1002.249955][T22992] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 [ 1002.257961][T22992] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1002.265918][T22992] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 17:31:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 55) 17:31:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) 17:31:09 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x2600}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xa00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x4000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xb00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) 17:31:09 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.273932][T22992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1002.281885][T22992] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 1002.289835][T22992] ---[ end trace 8d4e5fe33cce5468 ]--- 17:31:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x4300}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1002.362282][T23048] FAULT_INJECTION: forcing a failure. [ 1002.362282][T23048] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.375022][T23048] CPU: 0 PID: 23048 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1002.386630][T23048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.396661][T23048] Call Trace: [ 1002.399929][T23048] dump_stack+0x18e/0x1de [ 1002.404240][T23048] should_fail+0x5d8/0x740 [ 1002.408632][T23048] ? __kernfs_new_node+0x8b/0x630 [ 1002.413627][T23048] should_failslab+0x5/0x20 [ 1002.418101][T23048] kmem_cache_alloc+0x36/0x290 [ 1002.422835][T23048] __kernfs_new_node+0x8b/0x630 [ 1002.427662][T23048] ? mutex_unlock+0x19/0x40 [ 1002.432134][T23048] ? kernfs_xattr_get+0x81/0x90 [ 1002.436951][T23048] ? selinux_kernfs_init_security+0x12d/0x720 [ 1002.442983][T23048] kernfs_new_node+0x95/0x160 [ 1002.447637][T23048] __kernfs_create_file+0x45/0x260 [ 1002.452737][T23048] sysfs_add_file_mode_ns+0x293/0x340 [ 1002.458083][T23048] internal_create_group+0x486/0xd70 [ 1002.463343][T23048] sysfs_create_groups+0x5d/0x130 [ 1002.468337][T23048] device_add+0x9fa/0x1820 [ 1002.472733][T23048] device_create_vargs+0x1b8/0x210 [ 1002.477838][T23048] device_create+0x86/0xb0 [ 1002.482225][T23048] ? vsnprintf+0x1a07/0x1aa0 [ 1002.486793][T23048] bdi_register_va+0x89/0x5e0 [ 1002.491443][T23048] bdi_register+0x80/0xa0 [ 1002.495745][T23048] ? __device_add_disk+0x50a/0x1220 [ 1002.500920][T23048] bdi_register_owner+0x56/0xf0 [ 1002.505740][T23048] __device_add_disk+0x583/0x1220 [ 1002.510734][T23048] loop_add+0x554/0x710 [ 1002.514877][T23048] loop_control_ioctl+0x468/0x680 [ 1002.520049][T23048] ? xor_init+0x60/0x60 [ 1002.524218][T23048] do_vfs_ioctl+0x6fb/0x15b0 [ 1002.528777][T23048] __x64_sys_ioctl+0xd4/0x110 [ 1002.533438][T23048] do_syscall_64+0xcb/0x1e0 [ 1002.537914][T23048] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1002.543777][T23048] RIP: 0033:0x7fddc0dc7e99 [ 1002.548166][T23048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1002.567744][T23048] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1002.576401][T23048] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1002.584341][T23048] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1002.592280][T23048] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1002.600219][T23048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1002.608162][T23048] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1002.617243][T23048] ------------[ cut here ]------------ [ 1002.622702][T23048] WARNING: CPU: 0 PID: 23048 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1002.631769][T23048] Modules linked in: [ 1002.635637][T23048] CPU: 0 PID: 23048 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1002.647227][T23048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.657265][T23048] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1002.663050][T23048] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1002.682641][T23048] RSP: 0018:ffff8881cc9f7ce8 EFLAGS: 00010246 [ 1002.688682][T23048] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1002.696625][T23048] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1002.704688][T23048] RBP: ffff8881ef55d5f8 R08: ffffffff82147f7e R09: 0000000000000010 [ 1002.712632][T23048] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1002.720661][T23048] R13: 1ffff1103c083001 R14: 1ffff1103c08309d R15: ffff8881e0418000 [ 1002.728606][T23048] FS: 00007fddbff3e700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1002.737593][T23048] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1002.744146][T23048] CR2: 00007fddbff3dff8 CR3: 00000001e9410000 CR4: 00000000003406f0 [ 1002.752091][T23048] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1002.760032][T23048] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1002.767971][T23048] Call Trace: [ 1002.771237][T23048] loop_add+0x554/0x710 [ 1002.775364][T23048] loop_control_ioctl+0x468/0x680 [ 1002.780361][T23048] ? xor_init+0x60/0x60 [ 1002.784488][T23048] do_vfs_ioctl+0x6fb/0x15b0 [ 1002.789049][T23048] __x64_sys_ioctl+0xd4/0x110 [ 1002.793695][T23048] do_syscall_64+0xcb/0x1e0 [ 1002.798174][T23048] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1002.804035][T23048] RIP: 0033:0x7fddc0dc7e99 [ 1002.808426][T23048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1002.828001][T23048] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1002.836382][T23048] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1002.844422][T23048] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1002.852451][T23048] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 17:31:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 56) 17:31:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x771, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:10 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x4800}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xc00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:10 executing program 0: socket$inet(0x2, 0x80009, 0xffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000300)=""/172) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f00000000c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:10 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xd00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x4c00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xe00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1002.860394][T23048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1002.868343][T23048] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1002.876293][T23048] ---[ end trace 8d4e5fe33cce5469 ]--- 17:31:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1002.949734][T23234] FAULT_INJECTION: forcing a failure. [ 1002.949734][T23234] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.962393][T23234] CPU: 0 PID: 23234 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1002.974001][T23234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.984027][T23234] Call Trace: [ 1002.987291][T23234] dump_stack+0x18e/0x1de [ 1002.991591][T23234] should_fail+0x5d8/0x740 [ 1002.995977][T23234] ? __kernfs_new_node+0x8b/0x630 [ 1003.000968][T23234] should_failslab+0x5/0x20 [ 1003.005439][T23234] kmem_cache_alloc+0x36/0x290 [ 1003.010169][T23234] __kernfs_new_node+0x8b/0x630 [ 1003.015052][T23234] ? mutex_lock+0x6c/0xc0 [ 1003.019353][T23234] ? kernfs_activate+0x3fc/0x420 [ 1003.024261][T23234] kernfs_new_node+0x95/0x160 [ 1003.028992][T23234] __kernfs_create_file+0x45/0x260 [ 1003.034082][T23234] sysfs_add_file_mode_ns+0x293/0x340 [ 1003.039424][T23234] internal_create_group+0x486/0xd70 [ 1003.044675][T23234] sysfs_create_groups+0x5d/0x130 [ 1003.049668][T23234] device_add+0x9fa/0x1820 [ 1003.054056][T23234] device_create_vargs+0x1b8/0x210 [ 1003.059146][T23234] device_create+0x86/0xb0 [ 1003.063527][T23234] ? vsnprintf+0x1a07/0x1aa0 [ 1003.068085][T23234] bdi_register_va+0x89/0x5e0 [ 1003.072729][T23234] bdi_register+0x80/0xa0 [ 1003.077030][T23234] ? __device_add_disk+0x50a/0x1220 [ 1003.082199][T23234] bdi_register_owner+0x56/0xf0 [ 1003.087027][T23234] __device_add_disk+0x583/0x1220 [ 1003.092034][T23234] loop_add+0x554/0x710 [ 1003.096157][T23234] loop_control_ioctl+0x468/0x680 [ 1003.101146][T23234] ? xor_init+0x60/0x60 [ 1003.105269][T23234] do_vfs_ioctl+0x6fb/0x15b0 [ 1003.109828][T23234] __x64_sys_ioctl+0xd4/0x110 [ 1003.114473][T23234] do_syscall_64+0xcb/0x1e0 [ 1003.118947][T23234] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1003.124813][T23234] RIP: 0033:0x7fddc0dc7e99 [ 1003.129196][T23234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.148771][T23234] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1003.157149][T23234] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1003.165087][T23234] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1003.173029][T23234] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.180997][T23234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1003.188939][T23234] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1003.199444][T23234] ------------[ cut here ]------------ [ 1003.204906][T23234] WARNING: CPU: 1 PID: 23234 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1003.213975][T23234] Modules linked in: [ 1003.217845][T23234] CPU: 1 PID: 23234 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1003.229437][T23234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.239469][T23234] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1003.245243][T23234] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1003.264817][T23234] RSP: 0018:ffff8881cd787ce8 EFLAGS: 00010246 [ 1003.270855][T23234] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1003.278797][T23234] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1003.286743][T23234] RBP: ffff8881ef55ab28 R08: ffffffff82147f7e R09: 0000000000000010 [ 1003.294687][T23234] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1003.302714][T23234] R13: 1ffff1103d053a01 R14: 1ffff1103d053a9d R15: ffff8881e829d000 [ 1003.310664][T23234] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1003.319586][T23234] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1003.326136][T23234] CR2: 00007f8d8c409058 CR3: 00000001ed57d000 CR4: 00000000003406e0 [ 1003.334077][T23234] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1003.342023][T23234] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1003.349962][T23234] Call Trace: [ 1003.353226][T23234] loop_add+0x554/0x710 [ 1003.357408][T23234] loop_control_ioctl+0x468/0x680 [ 1003.362416][T23234] ? xor_init+0x60/0x60 [ 1003.366541][T23234] do_vfs_ioctl+0x6fb/0x15b0 [ 1003.371105][T23234] __x64_sys_ioctl+0xd4/0x110 [ 1003.375750][T23234] do_syscall_64+0xcb/0x1e0 [ 1003.380227][T23234] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1003.386088][T23234] RIP: 0033:0x7fddc0dc7e99 [ 1003.390475][T23234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.410048][T23234] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1003.418426][T23234] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1003.426367][T23234] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1003.434326][T23234] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.442269][T23234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 57) 17:31:10 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x1100}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x6800}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:10 executing program 0: socket$inet(0x2, 0x80009, 0xffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000300)=""/172) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f00000000c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x6c00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x1200}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:10 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x2500}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1003.450213][T23234] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1003.458158][T23234] ---[ end trace 8d4e5fe33cce546a ]--- 17:31:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1003.527556][T23376] FAULT_INJECTION: forcing a failure. [ 1003.527556][T23376] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.540427][T23376] CPU: 0 PID: 23376 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1003.552061][T23376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.562118][T23376] Call Trace: [ 1003.565381][T23376] dump_stack+0x18e/0x1de [ 1003.569680][T23376] should_fail+0x5d8/0x740 [ 1003.574066][T23376] ? __kernfs_new_node+0x8b/0x630 [ 1003.579074][T23376] should_failslab+0x5/0x20 [ 1003.583547][T23376] kmem_cache_alloc+0x36/0x290 [ 1003.588280][T23376] __kernfs_new_node+0x8b/0x630 [ 1003.593098][T23376] ? mutex_lock+0x6c/0xc0 [ 1003.597396][T23376] ? kernfs_activate+0x3fc/0x420 [ 1003.602302][T23376] kernfs_new_node+0x95/0x160 [ 1003.606950][T23376] __kernfs_create_file+0x45/0x260 [ 1003.612034][T23376] sysfs_add_file_mode_ns+0x293/0x340 [ 1003.617374][T23376] internal_create_group+0x486/0xd70 [ 1003.622626][T23376] sysfs_create_groups+0x5d/0x130 [ 1003.627619][T23376] device_add+0x9fa/0x1820 [ 1003.632008][T23376] device_create_vargs+0x1b8/0x210 [ 1003.637087][T23376] device_create+0x86/0xb0 [ 1003.641470][T23376] ? vsnprintf+0x1a07/0x1aa0 [ 1003.646029][T23376] bdi_register_va+0x89/0x5e0 [ 1003.650677][T23376] bdi_register+0x80/0xa0 [ 1003.654976][T23376] ? __device_add_disk+0x50a/0x1220 [ 1003.660147][T23376] bdi_register_owner+0x56/0xf0 [ 1003.664969][T23376] __device_add_disk+0x583/0x1220 [ 1003.670061][T23376] loop_add+0x554/0x710 [ 1003.674190][T23376] loop_control_ioctl+0x468/0x680 [ 1003.679186][T23376] ? xor_init+0x60/0x60 [ 1003.683317][T23376] do_vfs_ioctl+0x6fb/0x15b0 [ 1003.687880][T23376] __x64_sys_ioctl+0xd4/0x110 [ 1003.692578][T23376] do_syscall_64+0xcb/0x1e0 [ 1003.697054][T23376] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1003.702916][T23376] RIP: 0033:0x7fddc0dc7e99 [ 1003.707345][T23376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.727003][T23376] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1003.735384][T23376] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1003.743325][T23376] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1003.751264][T23376] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.759202][T23376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1003.767146][T23376] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1003.777263][T23376] ------------[ cut here ]------------ [ 1003.782727][T23376] WARNING: CPU: 1 PID: 23376 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1003.791795][T23376] Modules linked in: [ 1003.795660][T23376] CPU: 1 PID: 23376 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1003.807245][T23376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.817277][T23376] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1003.823051][T23376] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1003.842637][T23376] RSP: 0018:ffff8881e48dfce8 EFLAGS: 00010246 [ 1003.848671][T23376] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1003.856656][T23376] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1003.864596][T23376] RBP: ffff8881ef55e718 R08: ffffffff82147f7e R09: 0000000000000010 [ 1003.872622][T23376] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1003.880649][T23376] R13: 1ffff1103c5b9801 R14: 1ffff1103c5b989d R15: ffff8881e2dcc000 [ 1003.888592][T23376] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1003.897490][T23376] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1003.904050][T23376] CR2: 00007ffce5795ee8 CR3: 00000001e1342000 CR4: 00000000003406e0 [ 1003.911993][T23376] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1003.919936][T23376] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1003.927876][T23376] Call Trace: [ 1003.931274][T23376] loop_add+0x554/0x710 [ 1003.935405][T23376] loop_control_ioctl+0x468/0x680 [ 1003.940443][T23376] ? xor_init+0x60/0x60 [ 1003.944576][T23376] do_vfs_ioctl+0x6fb/0x15b0 [ 1003.949139][T23376] __x64_sys_ioctl+0xd4/0x110 [ 1003.953784][T23376] do_syscall_64+0xcb/0x1e0 [ 1003.958259][T23376] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1003.964122][T23376] RIP: 0033:0x7fddc0dc7e99 [ 1003.968549][T23376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.988121][T23376] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1003.996503][T23376] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1004.004442][T23376] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1004.012381][T23376] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1004.020324][T23376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 58) 17:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x7400}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:11 executing program 0: socket$inet(0x2, 0x80009, 0xffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000300)=""/172) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f00000000c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) 17:31:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x2600}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x7a00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x4000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xec00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1004.028264][T23376] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1004.036225][T23376] ---[ end trace 8d4e5fe33cce546b ]--- 17:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xfffff}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1004.102042][T23482] FAULT_INJECTION: forcing a failure. [ 1004.102042][T23482] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.115438][T23482] CPU: 0 PID: 23482 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1004.127064][T23482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.137108][T23482] Call Trace: [ 1004.140394][T23482] dump_stack+0x18e/0x1de [ 1004.144718][T23482] should_fail+0x5d8/0x740 [ 1004.149131][T23482] ? __kernfs_new_node+0x8b/0x630 [ 1004.154137][T23482] should_failslab+0x5/0x20 [ 1004.158614][T23482] kmem_cache_alloc+0x36/0x290 [ 1004.163351][T23482] __kernfs_new_node+0x8b/0x630 [ 1004.168177][T23482] ? kernfs_add_one+0x49e/0x5c0 [ 1004.172996][T23482] kernfs_new_node+0x95/0x160 [ 1004.177644][T23482] __kernfs_create_file+0x45/0x260 [ 1004.182730][T23482] sysfs_add_file_mode_ns+0x293/0x340 [ 1004.188070][T23482] sysfs_create_file_ns+0x146/0x230 [ 1004.193235][T23482] device_add+0xbc7/0x1820 [ 1004.197621][T23482] device_create_vargs+0x1b8/0x210 [ 1004.202711][T23482] device_create+0x86/0xb0 [ 1004.207102][T23482] ? vsnprintf+0x1a07/0x1aa0 [ 1004.211663][T23482] bdi_register_va+0x89/0x5e0 [ 1004.216310][T23482] bdi_register+0x80/0xa0 [ 1004.220705][T23482] ? __device_add_disk+0x50a/0x1220 [ 1004.225871][T23482] bdi_register_owner+0x56/0xf0 [ 1004.230692][T23482] __device_add_disk+0x583/0x1220 [ 1004.235704][T23482] loop_add+0x554/0x710 [ 1004.239831][T23482] loop_control_ioctl+0x468/0x680 [ 1004.244824][T23482] ? xor_init+0x60/0x60 [ 1004.248950][T23482] do_vfs_ioctl+0x6fb/0x15b0 [ 1004.253510][T23482] __x64_sys_ioctl+0xd4/0x110 [ 1004.258157][T23482] do_syscall_64+0xcb/0x1e0 [ 1004.262637][T23482] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.268506][T23482] RIP: 0033:0x7fddc0dc7e99 [ 1004.272897][T23482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1004.292493][T23482] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1004.300875][T23482] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1004.308818][T23482] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1004.316768][T23482] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1004.324716][T23482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1004.333105][T23482] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1004.343081][T23482] ------------[ cut here ]------------ [ 1004.348535][T23482] WARNING: CPU: 0 PID: 23482 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1004.357603][T23482] Modules linked in: [ 1004.361470][T23482] CPU: 0 PID: 23482 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1004.373063][T23482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.383115][T23482] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1004.388889][T23482] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1004.408466][T23482] RSP: 0018:ffff8881dec4fce8 EFLAGS: 00010246 [ 1004.414506][T23482] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1004.422455][T23482] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1004.430402][T23482] RBP: ffff8881ef55b3b8 R08: ffffffff82147f7e R09: 0000000000000010 [ 1004.438453][T23482] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1004.446417][T23482] R13: 1ffff1103d4f8401 R14: 1ffff1103d4f849d R15: ffff8881ea7c2000 [ 1004.454369][T23482] FS: 00007fddbff3e700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1004.463269][T23482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1004.469911][T23482] CR2: 00007fddbff3dff8 CR3: 00000001ccce4000 CR4: 00000000003406f0 [ 1004.477854][T23482] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1004.485797][T23482] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1004.493748][T23482] Call Trace: [ 1004.497014][T23482] loop_add+0x554/0x710 [ 1004.501140][T23482] loop_control_ioctl+0x468/0x680 [ 1004.506324][T23482] ? xor_init+0x60/0x60 [ 1004.510456][T23482] do_vfs_ioctl+0x6fb/0x15b0 [ 1004.515024][T23482] __x64_sys_ioctl+0xd4/0x110 [ 1004.519680][T23482] do_syscall_64+0xcb/0x1e0 [ 1004.524172][T23482] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.530040][T23482] RIP: 0033:0x7fddc0dc7e99 [ 1004.534431][T23482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1004.554060][T23482] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1004.562446][T23482] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1004.570511][T23482] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1004.578471][T23482] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1004.586507][T23482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1004.594448][T23482] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 59) 17:31:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x4300}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000006000000800000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@caif, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000100)="7db84d815ed89b037fb86a6a0ac1173ec45365dcbc867210d8edbb5121efbad59b642940d5fa68955793fcb30ba1bf8b4839d63d5be350267cfb9e15aabfc66d41cf63bd83396454c83db0b38dea01b60791d987ba5de5bdde3b7e439b9c76a84ec8dbaeada64746507cb0ae9aedda99840cb7b7b7be4513a2c0f5db7be471f50f69a1c5ce72a3c87509257c3e57896a836d15bb4c9759c638c4", 0x9a) 17:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x1000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x4800}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1004.602395][T23482] ---[ end trace 8d4e5fe33cce546c ]--- 17:31:11 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000006000000800000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@caif, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000100)="7db84d815ed89b037fb86a6a0ac1173ec45365dcbc867210d8edbb5121efbad59b642940d5fa68955793fcb30ba1bf8b4839d63d5be350267cfb9e15aabfc66d41cf63bd83396454c83db0b38dea01b60791d987ba5de5bdde3b7e439b9c76a84ec8dbaeada64746507cb0ae9aedda99840cb7b7b7be4513a2c0f5db7be471f50f69a1c5ce72a3c87509257c3e57896a836d15bb4c9759c638c4", 0x9a) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000006000000800000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) accept4(0xffffffffffffffff, &(0x7f0000000000)=@caif, &(0x7f00000000c0)=0x80, 0x0) (async) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000100)="7db84d815ed89b037fb86a6a0ac1173ec45365dcbc867210d8edbb5121efbad59b642940d5fa68955793fcb30ba1bf8b4839d63d5be350267cfb9e15aabfc66d41cf63bd83396454c83db0b38dea01b60791d987ba5de5bdde3b7e439b9c76a84ec8dbaeada64746507cb0ae9aedda99840cb7b7b7be4513a2c0f5db7be471f50f69a1c5ce72a3c87509257c3e57896a836d15bb4c9759c638c4", 0x9a) (async) 17:31:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x2000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x4c00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1004.661319][T23601] FAULT_INJECTION: forcing a failure. [ 1004.661319][T23601] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.674275][T23601] CPU: 0 PID: 23601 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1004.685892][T23601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.696125][T23601] Call Trace: [ 1004.699408][T23601] dump_stack+0x18e/0x1de [ 1004.703725][T23601] should_fail+0x5d8/0x740 [ 1004.708113][T23601] ? __kernfs_new_node+0x8b/0x630 [ 1004.713107][T23601] should_failslab+0x5/0x20 [ 1004.717580][T23601] kmem_cache_alloc+0x36/0x290 [ 1004.722313][T23601] __kernfs_new_node+0x8b/0x630 [ 1004.727131][T23601] ? kernfs_add_one+0x49e/0x5c0 [ 1004.731959][T23601] kernfs_new_node+0x95/0x160 [ 1004.736608][T23601] __kernfs_create_file+0x45/0x260 [ 1004.741687][T23601] sysfs_add_file_mode_ns+0x293/0x340 [ 1004.747040][T23601] sysfs_create_file_ns+0x146/0x230 [ 1004.752205][T23601] device_add+0xbc7/0x1820 [ 1004.756592][T23601] device_create_vargs+0x1b8/0x210 [ 1004.761670][T23601] device_create+0x86/0xb0 [ 1004.766083][T23601] ? vsnprintf+0x1a07/0x1aa0 [ 1004.770642][T23601] bdi_register_va+0x89/0x5e0 [ 1004.775287][T23601] bdi_register+0x80/0xa0 [ 1004.779634][T23601] ? __device_add_disk+0x50a/0x1220 [ 1004.784802][T23601] bdi_register_owner+0x56/0xf0 [ 1004.789620][T23601] __device_add_disk+0x583/0x1220 [ 1004.794614][T23601] loop_add+0x554/0x710 [ 1004.798740][T23601] loop_control_ioctl+0x468/0x680 [ 1004.803741][T23601] ? xor_init+0x60/0x60 [ 1004.807863][T23601] do_vfs_ioctl+0x6fb/0x15b0 [ 1004.812423][T23601] __x64_sys_ioctl+0xd4/0x110 [ 1004.817113][T23601] do_syscall_64+0xcb/0x1e0 [ 1004.821586][T23601] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.827446][T23601] RIP: 0033:0x7fddc0dc7e99 [ 1004.831834][T23601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1004.851406][T23601] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1004.859834][T23601] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1004.867775][T23601] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1004.875770][T23601] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1004.883717][T23601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1004.891656][T23601] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1004.902267][T23601] ------------[ cut here ]------------ [ 1004.907729][T23601] WARNING: CPU: 1 PID: 23601 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1004.916832][T23601] Modules linked in: [ 1004.920698][T23601] CPU: 1 PID: 23601 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1004.932282][T23601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.942326][T23601] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1004.948098][T23601] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1004.967992][T23601] RSP: 0018:ffff8881dec4fce8 EFLAGS: 00010246 [ 1004.974031][T23601] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1004.981975][T23601] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1004.989923][T23601] RBP: ffff8881ef55a298 R08: ffffffff82147f7e R09: 0000000000000010 [ 1004.997867][T23601] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1005.005919][T23601] R13: 1ffff1103c848c01 R14: 1ffff1103c848c9d R15: ffff8881e4246000 [ 1005.013872][T23601] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1005.022771][T23601] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1005.029342][T23601] CR2: 00007f8d8c37ff2b CR3: 00000001ebb9e000 CR4: 00000000003406e0 [ 1005.037287][T23601] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1005.045230][T23601] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1005.053177][T23601] Call Trace: [ 1005.056456][T23601] loop_add+0x554/0x710 [ 1005.060600][T23601] loop_control_ioctl+0x468/0x680 [ 1005.065597][T23601] ? xor_init+0x60/0x60 [ 1005.069724][T23601] do_vfs_ioctl+0x6fb/0x15b0 [ 1005.074292][T23601] __x64_sys_ioctl+0xd4/0x110 [ 1005.078953][T23601] do_syscall_64+0xcb/0x1e0 [ 1005.083436][T23601] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.089309][T23601] RIP: 0033:0x7fddc0dc7e99 [ 1005.093706][T23601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.113341][T23601] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1005.121720][T23601] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1005.129679][T23601] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1005.137644][T23601] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.145596][T23601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1005.153546][T23601] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 60) 17:31:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:12 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x3000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x6800}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a00000006000000800000070000000000000000000061302e00"], &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@caif, &(0x7f00000000c0)=0x80, 0x0) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000100)="7db84d815ed89b037fb86a6a0ac1173ec45365dcbc867210d8edbb5121efbad59b642940d5fa68955793fcb30ba1bf8b4839d63d5be350267cfb9e15aabfc66d41cf63bd83396454c83db0b38dea01b60791d987ba5de5bdde3b7e439b9c76a84ec8dbaeada64746507cb0ae9aedda99840cb7b7b7be4513a2c0f5db7be471f50f69a1c5ce72a3c87509257c3e57896a836d15bb4c9759c638c4", 0x9a) 17:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x4000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x6c00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:12 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.161537][T23601] ---[ end trace 8d4e5fe33cce546d ]--- 17:31:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x5000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a0000000600000000dc1eab6ebe801c0000070000000000000000000061"], &(0x7f00000004c0)=""/232, 0x2e, 0x145, 0x1}, 0x20) syz_io_uring_setup(0x62c7, &(0x7f0000000100)={0x0, 0xb344, 0x8, 0x1, 0x139}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000006c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/242, 0xf2}, {&(0x7f00000005c0)=""/220, 0xdc}], 0x4}, 0x0, 0x30002, 0x1}, 0x4) ioctl$HIDIOCSFEATURE(0xffffffffffffffff, 0xc0404806, &(0x7f0000000000)="8098928a73593138d59b259fcb98c6d924c360b595c44f3b4e86151480cccddb17626ee681a62129e03813f74ccdf224c609172c11f7772b82eb5b60372549546abc47c90f2c335aa01fddf556d8f0a8445b2d3741827fbea179ecd0558e9b80ac909ab715656e1d6a969522a9") r1 = syz_open_dev$hidraw(&(0x7f0000000300), 0x0, 0x20080) ioctl$HIDIOCGRAWPHYS(r1, 0x80404805, &(0x7f0000000700)) 17:31:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1005.250329][T23825] FAULT_INJECTION: forcing a failure. [ 1005.250329][T23825] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.263274][T23825] CPU: 1 PID: 23825 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1005.274866][T23825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.285030][T23825] Call Trace: [ 1005.288303][T23825] dump_stack+0x18e/0x1de [ 1005.292614][T23825] should_fail+0x5d8/0x740 [ 1005.297011][T23825] ? __kernfs_new_node+0x8b/0x630 [ 1005.302020][T23825] should_failslab+0x5/0x20 [ 1005.306494][T23825] kmem_cache_alloc+0x36/0x290 [ 1005.311239][T23825] ? selinux_kernfs_init_security+0x12d/0x720 [ 1005.317282][T23825] __kernfs_new_node+0x8b/0x630 [ 1005.322105][T23825] ? mutex_lock+0x6c/0xc0 [ 1005.326406][T23825] kernfs_new_node+0x95/0x160 [ 1005.331066][T23825] __kernfs_create_file+0x45/0x260 [ 1005.336154][T23825] sysfs_add_file_mode_ns+0x293/0x340 [ 1005.341501][T23825] sysfs_merge_group+0x19b/0x320 [ 1005.346412][T23825] dpm_sysfs_add+0xbd/0x260 [ 1005.350885][T23825] device_add+0xcec/0x1820 [ 1005.355271][T23825] device_create_vargs+0x1b8/0x210 [ 1005.360354][T23825] device_create+0x86/0xb0 [ 1005.364739][T23825] ? vsnprintf+0x1a07/0x1aa0 [ 1005.369301][T23825] bdi_register_va+0x89/0x5e0 [ 1005.373951][T23825] bdi_register+0x80/0xa0 [ 1005.378251][T23825] ? __device_add_disk+0x50a/0x1220 [ 1005.383418][T23825] bdi_register_owner+0x56/0xf0 [ 1005.388237][T23825] __device_add_disk+0x583/0x1220 [ 1005.393230][T23825] loop_add+0x554/0x710 [ 1005.397366][T23825] loop_control_ioctl+0x468/0x680 [ 1005.402359][T23825] ? xor_init+0x60/0x60 [ 1005.406487][T23825] do_vfs_ioctl+0x6fb/0x15b0 [ 1005.411054][T23825] __x64_sys_ioctl+0xd4/0x110 [ 1005.415704][T23825] do_syscall_64+0xcb/0x1e0 [ 1005.420185][T23825] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.426052][T23825] RIP: 0033:0x7fddc0dc7e99 [ 1005.430440][T23825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.450015][T23825] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1005.458488][T23825] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1005.466435][T23825] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1005.474380][T23825] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.482320][T23825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1005.490270][T23825] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1005.498972][T23825] ------------[ cut here ]------------ [ 1005.504432][T23825] WARNING: CPU: 1 PID: 23825 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1005.513503][T23825] Modules linked in: [ 1005.517373][T23825] CPU: 1 PID: 23825 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1005.528960][T23825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.538998][T23825] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1005.544773][T23825] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1005.564345][T23825] RSP: 0018:ffff8881cce47ce8 EFLAGS: 00010246 [ 1005.570380][T23825] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1005.578367][T23825] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1005.586308][T23825] RBP: ffff8881f0412298 R08: ffffffff82147f7e R09: 0000000000000010 [ 1005.594308][T23825] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1005.602254][T23825] R13: 1ffff1103ddb0a01 R14: 1ffff1103ddb0a9d R15: ffff8881eed85000 [ 1005.610200][T23825] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1005.619123][T23825] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1005.625682][T23825] CR2: 00007fddbff3dff8 CR3: 00000001e2cb5000 CR4: 00000000003406e0 [ 1005.633625][T23825] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1005.641568][T23825] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1005.649512][T23825] Call Trace: [ 1005.652782][T23825] loop_add+0x554/0x710 [ 1005.656912][T23825] loop_control_ioctl+0x468/0x680 [ 1005.661909][T23825] ? xor_init+0x60/0x60 [ 1005.666035][T23825] do_vfs_ioctl+0x6fb/0x15b0 [ 1005.670595][T23825] __x64_sys_ioctl+0xd4/0x110 [ 1005.675241][T23825] do_syscall_64+0xcb/0x1e0 [ 1005.679716][T23825] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.685586][T23825] RIP: 0033:0x7fddc0dc7e99 [ 1005.689970][T23825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.709544][T23825] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1005.717925][T23825] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1005.725865][T23825] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1005.733807][T23825] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.741747][T23825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:13 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 61) 17:31:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x6000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x7400}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a0000000600000000dc1eab6ebe801c0000070000000000000000000061"], &(0x7f00000004c0)=""/232, 0x2e, 0x145, 0x1}, 0x20) syz_io_uring_setup(0x62c7, &(0x7f0000000100)={0x0, 0xb344, 0x8, 0x1, 0x139}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000006c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/242, 0xf2}, {&(0x7f00000005c0)=""/220, 0xdc}], 0x4}, 0x0, 0x30002, 0x1}, 0x4) ioctl$HIDIOCSFEATURE(0xffffffffffffffff, 0xc0404806, &(0x7f0000000000)="8098928a73593138d59b259fcb98c6d924c360b595c44f3b4e86151480cccddb17626ee681a62129e03813f74ccdf224c609172c11f7772b82eb5b60372549546abc47c90f2c335aa01fddf556d8f0a8445b2d3741827fbea179ecd0558e9b80ac909ab715656e1d6a969522a9") r1 = syz_open_dev$hidraw(&(0x7f0000000300), 0x0, 0x20080) ioctl$HIDIOCGRAWPHYS(r1, 0x80404805, &(0x7f0000000700)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a0000000600000000dc1eab6ebe801c0000070000000000000000000061"], &(0x7f00000004c0)=""/232, 0x2e, 0x145, 0x1}, 0x20) (async) syz_io_uring_setup(0x62c7, &(0x7f0000000100)={0x0, 0xb344, 0x8, 0x1, 0x139}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) (async) syz_io_uring_submit(0x0, r0, &(0x7f00000006c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/242, 0xf2}, {&(0x7f00000005c0)=""/220, 0xdc}], 0x4}, 0x0, 0x30002, 0x1}, 0x4) (async) ioctl$HIDIOCSFEATURE(0xffffffffffffffff, 0xc0404806, &(0x7f0000000000)="8098928a73593138d59b259fcb98c6d924c360b595c44f3b4e86151480cccddb17626ee681a62129e03813f74ccdf224c609172c11f7772b82eb5b60372549546abc47c90f2c335aa01fddf556d8f0a8445b2d3741827fbea179ecd0558e9b80ac909ab715656e1d6a969522a9") (async) syz_open_dev$hidraw(&(0x7f0000000300), 0x0, 0x20080) (async) ioctl$HIDIOCGRAWPHYS(r1, 0x80404805, &(0x7f0000000700)) (async) 17:31:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x7000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x7a00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.749711][T23825] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1005.757665][T23825] ---[ end trace 8d4e5fe33cce546e ]--- 17:31:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x8000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1005.830062][T24051] FAULT_INJECTION: forcing a failure. [ 1005.830062][T24051] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.842744][T24051] CPU: 0 PID: 24051 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1005.854346][T24051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.864373][T24051] Call Trace: [ 1005.867643][T24051] dump_stack+0x18e/0x1de [ 1005.871944][T24051] should_fail+0x5d8/0x740 [ 1005.876334][T24051] ? __kernfs_new_node+0x8b/0x630 [ 1005.881332][T24051] should_failslab+0x5/0x20 [ 1005.885805][T24051] kmem_cache_alloc+0x36/0x290 [ 1005.890625][T24051] ? security_kernfs_init_security+0x9a/0xb0 [ 1005.896572][T24051] __kernfs_new_node+0x8b/0x630 [ 1005.901395][T24051] ? mutex_lock+0x6c/0xc0 [ 1005.905693][T24051] ? kernfs_activate+0x3fc/0x420 [ 1005.910596][T24051] ? mutex_unlock+0x19/0x40 [ 1005.915067][T24051] kernfs_create_dir_ns+0x90/0x220 [ 1005.920145][T24051] internal_create_group+0x20e/0xd70 [ 1005.925401][T24051] dpm_sysfs_add+0x59/0x260 [ 1005.929875][T24051] device_add+0xcec/0x1820 [ 1005.934260][T24051] device_create_vargs+0x1b8/0x210 [ 1005.939342][T24051] device_create+0x86/0xb0 [ 1005.943727][T24051] ? vsnprintf+0x1a07/0x1aa0 [ 1005.948288][T24051] bdi_register_va+0x89/0x5e0 [ 1005.952937][T24051] bdi_register+0x80/0xa0 [ 1005.957233][T24051] ? __device_add_disk+0x50a/0x1220 [ 1005.962400][T24051] bdi_register_owner+0x56/0xf0 [ 1005.967279][T24051] __device_add_disk+0x583/0x1220 [ 1005.972274][T24051] loop_add+0x554/0x710 [ 1005.976396][T24051] loop_control_ioctl+0x468/0x680 [ 1005.981385][T24051] ? xor_init+0x60/0x60 [ 1005.985507][T24051] do_vfs_ioctl+0x6fb/0x15b0 [ 1005.990125][T24051] __x64_sys_ioctl+0xd4/0x110 [ 1005.994770][T24051] do_syscall_64+0xcb/0x1e0 [ 1005.999251][T24051] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.005111][T24051] RIP: 0033:0x7fddc0dc7e99 [ 1006.009496][T24051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1006.029068][T24051] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1006.037444][T24051] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1006.045385][T24051] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1006.053323][T24051] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.061263][T24051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1006.069204][T24051] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1006.079318][T24051] ------------[ cut here ]------------ [ 1006.084780][T24051] WARNING: CPU: 0 PID: 24051 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1006.093970][T24051] Modules linked in: [ 1006.097834][T24051] CPU: 0 PID: 24051 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1006.109427][T24051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.119455][T24051] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1006.125226][T24051] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1006.144797][T24051] RSP: 0018:ffff8881e732fce8 EFLAGS: 00010246 [ 1006.150848][T24051] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1006.158792][T24051] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1006.166747][T24051] RBP: ffff8881ef55de88 R08: ffffffff82147f7e R09: 0000000000000010 [ 1006.174689][T24051] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1006.182630][T24051] R13: 1ffff1103dd46601 R14: 1ffff1103dd4669d R15: ffff8881eea33000 [ 1006.190572][T24051] FS: 00007fddbff3e700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1006.199467][T24051] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1006.206017][T24051] CR2: 00007fddbff3dff8 CR3: 00000001cc19a000 CR4: 00000000003406f0 [ 1006.213963][T24051] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1006.221909][T24051] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1006.229849][T24051] Call Trace: [ 1006.233113][T24051] loop_add+0x554/0x710 [ 1006.237239][T24051] loop_control_ioctl+0x468/0x680 [ 1006.242235][T24051] ? xor_init+0x60/0x60 [ 1006.246362][T24051] do_vfs_ioctl+0x6fb/0x15b0 [ 1006.250923][T24051] __x64_sys_ioctl+0xd4/0x110 [ 1006.255570][T24051] do_syscall_64+0xcb/0x1e0 [ 1006.260041][T24051] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.265899][T24051] RIP: 0033:0x7fddc0dc7e99 [ 1006.270288][T24051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1006.289863][T24051] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1006.298244][T24051] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1006.306184][T24051] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1006.314126][T24051] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.322082][T24051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:13 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 62) 17:31:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000a0000000600000000dc1eab6ebe801c0000070000000000000000000061"], &(0x7f00000004c0)=""/232, 0x2e, 0x145, 0x1}, 0x20) (async) syz_io_uring_setup(0x62c7, &(0x7f0000000100)={0x0, 0xb344, 0x8, 0x1, 0x139}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000006c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)=""/95, 0x5f}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/242, 0xf2}, {&(0x7f00000005c0)=""/220, 0xdc}], 0x4}, 0x0, 0x30002, 0x1}, 0x4) (async) ioctl$HIDIOCSFEATURE(0xffffffffffffffff, 0xc0404806, &(0x7f0000000000)="8098928a73593138d59b259fcb98c6d924c360b595c44f3b4e86151480cccddb17626ee681a62129e03813f74ccdf224c609172c11f7772b82eb5b60372549546abc47c90f2c335aa01fddf556d8f0a8445b2d3741827fbea179ecd0558e9b80ac909ab715656e1d6a969522a9") (async, rerun: 32) r1 = syz_open_dev$hidraw(&(0x7f0000000300), 0x0, 0x20080) (rerun: 32) ioctl$HIDIOCGRAWPHYS(r1, 0x80404805, &(0x7f0000000700)) 17:31:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xe700}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x9000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xfffff}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xa000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xb000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000440)=""/240, 0x2e, 0xf0}, 0x20) [ 1006.330022][T24051] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1006.337964][T24051] ---[ end trace 8d4e5fe33cce546f ]--- [ 1006.400286][T24170] FAULT_INJECTION: forcing a failure. [ 1006.400286][T24170] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.414638][T24170] CPU: 1 PID: 24170 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1006.426259][T24170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.436300][T24170] Call Trace: [ 1006.439570][T24170] dump_stack+0x18e/0x1de [ 1006.443872][T24170] should_fail+0x5d8/0x740 [ 1006.448265][T24170] ? __kernfs_new_node+0x8b/0x630 [ 1006.453265][T24170] should_failslab+0x5/0x20 [ 1006.457737][T24170] kmem_cache_alloc+0x36/0x290 [ 1006.462474][T24170] ? selinux_kernfs_init_security+0x12d/0x720 [ 1006.468521][T24170] __kernfs_new_node+0x8b/0x630 [ 1006.473342][T24170] ? mutex_lock+0x6c/0xc0 [ 1006.477645][T24170] kernfs_new_node+0x95/0x160 [ 1006.482300][T24170] __kernfs_create_file+0x45/0x260 [ 1006.487392][T24170] sysfs_add_file_mode_ns+0x293/0x340 [ 1006.492737][T24170] sysfs_merge_group+0x19b/0x320 [ 1006.497645][T24170] dpm_sysfs_add+0xbd/0x260 [ 1006.502209][T24170] device_add+0xcec/0x1820 [ 1006.506600][T24170] device_create_vargs+0x1b8/0x210 [ 1006.511707][T24170] device_create+0x86/0xb0 [ 1006.516098][T24170] ? vsnprintf+0x1a07/0x1aa0 [ 1006.520660][T24170] bdi_register_va+0x89/0x5e0 [ 1006.525311][T24170] bdi_register+0x80/0xa0 [ 1006.529618][T24170] ? __device_add_disk+0x50a/0x1220 [ 1006.534787][T24170] bdi_register_owner+0x56/0xf0 [ 1006.539704][T24170] __device_add_disk+0x583/0x1220 [ 1006.544703][T24170] loop_add+0x554/0x710 [ 1006.548830][T24170] loop_control_ioctl+0x468/0x680 [ 1006.553825][T24170] ? xor_init+0x60/0x60 [ 1006.557954][T24170] do_vfs_ioctl+0x6fb/0x15b0 [ 1006.562573][T24170] __x64_sys_ioctl+0xd4/0x110 [ 1006.567223][T24170] do_syscall_64+0xcb/0x1e0 [ 1006.571697][T24170] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.577572][T24170] RIP: 0033:0x7fddc0dc7e99 [ 1006.581974][T24170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1006.601547][T24170] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1006.609940][T24170] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1006.617884][T24170] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1006.625828][T24170] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.633770][T24170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1006.641809][T24170] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1006.650672][T24170] ------------[ cut here ]------------ [ 1006.656128][T24170] WARNING: CPU: 1 PID: 24170 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1006.665195][T24170] Modules linked in: [ 1006.669068][T24170] CPU: 1 PID: 24170 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1006.680662][T24170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.690703][T24170] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1006.696483][T24170] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1006.716058][T24170] RSP: 0018:ffff8881e7cffce8 EFLAGS: 00010246 [ 1006.722094][T24170] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1006.730045][T24170] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1006.737986][T24170] RBP: ffff8881f04108e8 R08: ffffffff82147f7e R09: 0000000000000010 [ 1006.745932][T24170] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1006.753871][T24170] R13: 1ffff1103dea7801 R14: 1ffff1103dea789d R15: ffff8881ef53c000 [ 1006.761816][T24170] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1006.770714][T24170] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1006.777266][T24170] CR2: 00007fddbff3dff8 CR3: 00000001cc19a000 CR4: 00000000003406e0 [ 1006.785215][T24170] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1006.793173][T24170] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1006.801115][T24170] Call Trace: [ 1006.804380][T24170] loop_add+0x554/0x710 [ 1006.808505][T24170] loop_control_ioctl+0x468/0x680 [ 1006.813500][T24170] ? xor_init+0x60/0x60 [ 1006.817631][T24170] do_vfs_ioctl+0x6fb/0x15b0 [ 1006.822193][T24170] __x64_sys_ioctl+0xd4/0x110 [ 1006.826857][T24170] do_syscall_64+0xcb/0x1e0 [ 1006.831333][T24170] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.837198][T24170] RIP: 0033:0x7fddc0dc7e99 [ 1006.841589][T24170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1006.861163][T24170] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1006.869543][T24170] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1006.877488][T24170] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1006.885429][T24170] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.893464][T24170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:14 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 63) 17:31:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x1000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xc000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000440)=""/240, 0x2e, 0xf0}, 0x20) 17:31:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x2000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7107, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xd000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x3000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1006.901407][T24170] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1006.909352][T24170] ---[ end trace 8d4e5fe33cce5470 ]--- [ 1006.977868][T24394] FAULT_INJECTION: forcing a failure. [ 1006.977868][T24394] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.990886][T24394] CPU: 0 PID: 24394 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1007.002494][T24394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.012526][T24394] Call Trace: [ 1007.015790][T24394] dump_stack+0x18e/0x1de [ 1007.020095][T24394] should_fail+0x5d8/0x740 [ 1007.024482][T24394] ? __kernfs_new_node+0x8b/0x630 [ 1007.029477][T24394] should_failslab+0x5/0x20 [ 1007.033960][T24394] kmem_cache_alloc+0x36/0x290 [ 1007.038696][T24394] __kernfs_new_node+0x8b/0x630 [ 1007.043520][T24394] ? mutex_lock+0x6c/0xc0 [ 1007.047828][T24394] ? kernfs_activate+0x3fc/0x420 [ 1007.052738][T24394] kernfs_new_node+0x95/0x160 [ 1007.057408][T24394] __kernfs_create_file+0x45/0x260 [ 1007.062489][T24394] sysfs_add_file_mode_ns+0x293/0x340 [ 1007.068187][T24394] sysfs_merge_group+0x19b/0x320 [ 1007.073095][T24394] dpm_sysfs_add+0xbd/0x260 [ 1007.077566][T24394] device_add+0xcec/0x1820 [ 1007.081952][T24394] device_create_vargs+0x1b8/0x210 [ 1007.087118][T24394] device_create+0x86/0xb0 [ 1007.091504][T24394] ? vsnprintf+0x1a07/0x1aa0 [ 1007.096064][T24394] bdi_register_va+0x89/0x5e0 [ 1007.100715][T24394] bdi_register+0x80/0xa0 [ 1007.105015][T24394] ? __device_add_disk+0x50a/0x1220 [ 1007.110180][T24394] bdi_register_owner+0x56/0xf0 [ 1007.114999][T24394] __device_add_disk+0x583/0x1220 [ 1007.119992][T24394] loop_add+0x554/0x710 [ 1007.124122][T24394] loop_control_ioctl+0x468/0x680 [ 1007.129293][T24394] ? xor_init+0x60/0x60 [ 1007.133417][T24394] do_vfs_ioctl+0x6fb/0x15b0 [ 1007.137976][T24394] __x64_sys_ioctl+0xd4/0x110 [ 1007.142626][T24394] do_syscall_64+0xcb/0x1e0 [ 1007.147101][T24394] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1007.152961][T24394] RIP: 0033:0x7fddc0dc7e99 [ 1007.157345][T24394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1007.176923][T24394] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1007.185301][T24394] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1007.193341][T24394] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1007.201457][T24394] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1007.209413][T24394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1007.217358][T24394] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1007.226924][T24394] ------------[ cut here ]------------ [ 1007.232384][T24394] WARNING: CPU: 0 PID: 24394 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1007.241457][T24394] Modules linked in: [ 1007.245414][T24394] CPU: 0 PID: 24394 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1007.256999][T24394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.267032][T24394] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1007.272823][T24394] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1007.292396][T24394] RSP: 0018:ffff8881eab4fce8 EFLAGS: 00010246 [ 1007.298433][T24394] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1007.306377][T24394] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1007.314316][T24394] RBP: ffff8881ef558058 R08: ffffffff82147f7e R09: 0000000000000010 [ 1007.322255][T24394] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1007.330192][T24394] R13: 1ffff1103a127401 R14: 1ffff1103a12749d R15: ffff8881d093a000 [ 1007.338152][T24394] FS: 00007fddbff3e700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1007.347060][T24394] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1007.353629][T24394] CR2: 00007fddbff3dff8 CR3: 00000001e4677000 CR4: 00000000003406f0 [ 1007.361576][T24394] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1007.369574][T24394] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1007.377513][T24394] Call Trace: [ 1007.380778][T24394] loop_add+0x554/0x710 [ 1007.384904][T24394] loop_control_ioctl+0x468/0x680 [ 1007.389896][T24394] ? xor_init+0x60/0x60 [ 1007.394022][T24394] do_vfs_ioctl+0x6fb/0x15b0 [ 1007.398583][T24394] __x64_sys_ioctl+0xd4/0x110 [ 1007.403227][T24394] do_syscall_64+0xcb/0x1e0 [ 1007.407701][T24394] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1007.413573][T24394] RIP: 0033:0x7fddc0dc7e99 [ 1007.417961][T24394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1007.437627][T24394] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1007.446011][T24394] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1007.453967][T24394] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1007.461911][T24394] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1007.469855][T24394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:14 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 64) 17:31:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x4000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xe000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000440)=""/240, 0x2e, 0xf0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000440)=""/240, 0x2e, 0xf0}, 0x20) (async) 17:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x10000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x11000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1007.477807][T24394] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1007.485764][T24394] ---[ end trace 8d4e5fe33cce5471 ]--- 17:31:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x5000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1007.569864][T24581] FAULT_INJECTION: forcing a failure. [ 1007.569864][T24581] name failslab, interval 1, probability 0, space 0, times 0 [ 1007.582722][T24581] CPU: 1 PID: 24581 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1007.594319][T24581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.604403][T24581] Call Trace: [ 1007.607677][T24581] dump_stack+0x18e/0x1de [ 1007.611983][T24581] should_fail+0x5d8/0x740 [ 1007.616382][T24581] ? __kernfs_new_node+0x8b/0x630 [ 1007.621381][T24581] should_failslab+0x5/0x20 [ 1007.625861][T24581] kmem_cache_alloc+0x36/0x290 [ 1007.630613][T24581] __kernfs_new_node+0x8b/0x630 [ 1007.635443][T24581] ? mutex_lock+0x6c/0xc0 [ 1007.643391][T24581] ? kernfs_activate+0x3fc/0x420 [ 1007.648298][T24581] kernfs_new_node+0x95/0x160 [ 1007.652953][T24581] __kernfs_create_file+0x45/0x260 [ 1007.658038][T24581] sysfs_add_file_mode_ns+0x293/0x340 [ 1007.663422][T24581] sysfs_merge_group+0x19b/0x320 [ 1007.668333][T24581] dpm_sysfs_add+0xbd/0x260 [ 1007.672815][T24581] device_add+0xcec/0x1820 [ 1007.677207][T24581] device_create_vargs+0x1b8/0x210 [ 1007.682291][T24581] device_create+0x86/0xb0 [ 1007.686838][T24581] ? vsnprintf+0x1a07/0x1aa0 [ 1007.691404][T24581] bdi_register_va+0x89/0x5e0 [ 1007.696048][T24581] bdi_register+0x80/0xa0 [ 1007.700352][T24581] ? __device_add_disk+0x50a/0x1220 [ 1007.705546][T24581] bdi_register_owner+0x56/0xf0 [ 1007.710523][T24581] __device_add_disk+0x583/0x1220 [ 1007.715522][T24581] loop_add+0x554/0x710 [ 1007.719653][T24581] loop_control_ioctl+0x468/0x680 [ 1007.724651][T24581] ? xor_init+0x60/0x60 [ 1007.728787][T24581] do_vfs_ioctl+0x6fb/0x15b0 [ 1007.733351][T24581] __x64_sys_ioctl+0xd4/0x110 [ 1007.738041][T24581] do_syscall_64+0xcb/0x1e0 [ 1007.742522][T24581] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1007.748449][T24581] RIP: 0033:0x7fddc0dc7e99 [ 1007.752837][T24581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1007.772410][T24581] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1007.780828][T24581] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1007.788769][T24581] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1007.796709][T24581] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1007.804651][T24581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1007.812596][T24581] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1007.821633][T24581] ------------[ cut here ]------------ [ 1007.827099][T24581] WARNING: CPU: 1 PID: 24581 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1007.836231][T24581] Modules linked in: [ 1007.840100][T24581] CPU: 1 PID: 24581 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1007.851689][T24581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.861744][T24581] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1007.867520][T24581] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1007.887131][T24581] RSP: 0018:ffff8881ef26fce8 EFLAGS: 00010246 [ 1007.893166][T24581] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1007.901109][T24581] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1007.909052][T24581] RBP: ffff8881f04133b8 R08: ffffffff82147f7e R09: 0000000000000010 [ 1007.916992][T24581] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1007.924955][T24581] R13: 1ffff1103c6b2c01 R14: 1ffff1103c6b2c9d R15: ffff8881e3596000 [ 1007.932905][T24581] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1007.941887][T24581] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1007.948710][T24581] CR2: 00007fddbff3dff8 CR3: 00000001e54e4000 CR4: 00000000003406e0 [ 1007.956654][T24581] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1007.964597][T24581] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1007.972535][T24581] Call Trace: [ 1007.975801][T24581] loop_add+0x554/0x710 [ 1007.979927][T24581] loop_control_ioctl+0x468/0x680 [ 1007.984919][T24581] ? xor_init+0x60/0x60 [ 1007.989044][T24581] do_vfs_ioctl+0x6fb/0x15b0 [ 1007.993604][T24581] __x64_sys_ioctl+0xd4/0x110 [ 1007.998248][T24581] do_syscall_64+0xcb/0x1e0 [ 1008.002718][T24581] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1008.008583][T24581] RIP: 0033:0x7fddc0dc7e99 [ 1008.012966][T24581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1008.032540][T24581] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1008.040928][T24581] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1008.048868][T24581] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1008.056815][T24581] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1008.064774][T24581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 65) 17:31:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000a5ef409428b568c0de3c774f02b0da05000000000c0000000c0000000b000000000061001e00"], &(0x7f00000001c0)=""/225, 0x2e, 0xe1, 0x1}, 0x20) r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0xc6, 0x0) write$hidraw(r0, 0x0, 0x0) timerfd_create(0x2, 0x80000) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f00000002c0)="41c98b5784ac327f495d07e4a78a0a515d67cd77ddc2979adfdee24f88ce18216d578ecaef39d0f500398563c6380427e738b0f77f9f1e10c0615a3b27857b42a63663e1908bd2c7c8b30ab339370efb59073472ce88a62ec3daff277ccce691c62aeccc4bbf962e9408eb636c32d3b2a68836bd9b259b27e8a8cab11bbe5431de9ffb5fc68e2e1223b97a65a6c9c09842d360225bedb795cc3d3a774f856ad5279014d19532f270c1c2809b364d51e458589738621a0bb941a9188bedcdda4177260689bfd9e73fb1d664116b17f478d1806dcc362f8305cd57b5573d") ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000040)) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) 17:31:15 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf04000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe700, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x12000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x6000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:15 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x7000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x18000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000a5ef409428b568c0de3c774f02b0da05000000000c0000000c0000000b000000000061001e00"], &(0x7f00000001c0)=""/225, 0x2e, 0xe1, 0x1}, 0x20) r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0xc6, 0x0) write$hidraw(r0, 0x0, 0x0) timerfd_create(0x2, 0x80000) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f00000002c0)="41c98b5784ac327f495d07e4a78a0a515d67cd77ddc2979adfdee24f88ce18216d578ecaef39d0f500398563c6380427e738b0f77f9f1e10c0615a3b27857b42a63663e1908bd2c7c8b30ab339370efb59073472ce88a62ec3daff277ccce691c62aeccc4bbf962e9408eb636c32d3b2a68836bd9b259b27e8a8cab11bbe5431de9ffb5fc68e2e1223b97a65a6c9c09842d360225bedb795cc3d3a774f856ad5279014d19532f270c1c2809b364d51e458589738621a0bb941a9188bedcdda4177260689bfd9e73fb1d664116b17f478d1806dcc362f8305cd57b5573d") ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000040)) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000a5ef409428b568c0de3c774f02b0da05000000000c0000000c0000000b000000000061001e00"], &(0x7f00000001c0)=""/225, 0x2e, 0xe1, 0x1}, 0x20) (async) syz_open_dev$hidraw(&(0x7f00000000c0), 0xc6, 0x0) (async) write$hidraw(r0, 0x0, 0x0) (async) timerfd_create(0x2, 0x80000) (async) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f00000002c0)="41c98b5784ac327f495d07e4a78a0a515d67cd77ddc2979adfdee24f88ce18216d578ecaef39d0f500398563c6380427e738b0f77f9f1e10c0615a3b27857b42a63663e1908bd2c7c8b30ab339370efb59073472ce88a62ec3daff277ccce691c62aeccc4bbf962e9408eb636c32d3b2a68836bd9b259b27e8a8cab11bbe5431de9ffb5fc68e2e1223b97a65a6c9c09842d360225bedb795cc3d3a774f856ad5279014d19532f270c1c2809b364d51e458589738621a0bb941a9188bedcdda4177260689bfd9e73fb1d664116b17f478d1806dcc362f8305cd57b5573d") (async) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000040)) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) (async) 17:31:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x8000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1008.072715][T24581] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1008.080751][T24581] ---[ end trace 8d4e5fe33cce5472 ]--- [ 1008.143302][T24638] FAULT_INJECTION: forcing a failure. [ 1008.143302][T24638] name failslab, interval 1, probability 0, space 0, times 0 [ 1008.155949][T24638] CPU: 0 PID: 24638 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1008.167666][T24638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.177707][T24638] Call Trace: [ 1008.180974][T24638] dump_stack+0x18e/0x1de [ 1008.185277][T24638] should_fail+0x5d8/0x740 [ 1008.189707][T24638] ? kobject_uevent_env+0x252/0x1000 [ 1008.194967][T24638] should_failslab+0x5/0x20 [ 1008.199441][T24638] kmem_cache_alloc_trace+0x39/0x2b0 [ 1008.204695][T24638] ? sysfs_add_file_mode_ns+0x2b4/0x340 [ 1008.210212][T24638] kobject_uevent_env+0x252/0x1000 [ 1008.215294][T24638] ? mutex_lock+0x6c/0xc0 [ 1008.219615][T24638] device_add+0xecf/0x1820 [ 1008.224000][T24638] device_create_vargs+0x1b8/0x210 [ 1008.229083][T24638] device_create+0x86/0xb0 [ 1008.233465][T24638] ? vsnprintf+0x1a07/0x1aa0 [ 1008.238034][T24638] bdi_register_va+0x89/0x5e0 [ 1008.242688][T24638] bdi_register+0x80/0xa0 [ 1008.246986][T24638] ? __device_add_disk+0x50a/0x1220 [ 1008.252152][T24638] bdi_register_owner+0x56/0xf0 [ 1008.256972][T24638] __device_add_disk+0x583/0x1220 [ 1008.261967][T24638] loop_add+0x554/0x710 [ 1008.266098][T24638] loop_control_ioctl+0x468/0x680 [ 1008.271136][T24638] ? xor_init+0x60/0x60 [ 1008.275437][T24638] do_vfs_ioctl+0x6fb/0x15b0 [ 1008.279998][T24638] __x64_sys_ioctl+0xd4/0x110 [ 1008.284647][T24638] do_syscall_64+0xcb/0x1e0 [ 1008.289124][T24638] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1008.294983][T24638] RIP: 0033:0x7fddc0dc7e99 [ 1008.299367][T24638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1008.318941][T24638] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1008.327316][T24638] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1008.335257][T24638] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 17:31:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 66) 17:31:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x20000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:15 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd001000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x9000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000a5ef409428b568c0de3c774f02b0da05000000000c0000000c0000000b000000000061001e00"], &(0x7f00000001c0)=""/225, 0x2e, 0xe1, 0x1}, 0x20) (async) r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0xc6, 0x0) write$hidraw(r0, 0x0, 0x0) (async) timerfd_create(0x2, 0x80000) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f00000002c0)="41c98b5784ac327f495d07e4a78a0a515d67cd77ddc2979adfdee24f88ce18216d578ecaef39d0f500398563c6380427e738b0f77f9f1e10c0615a3b27857b42a63663e1908bd2c7c8b30ab339370efb59073472ce88a62ec3daff277ccce691c62aeccc4bbf962e9408eb636c32d3b2a68836bd9b259b27e8a8cab11bbe5431de9ffb5fc68e2e1223b97a65a6c9c09842d360225bedb795cc3d3a774f856ad5279014d19532f270c1c2809b364d51e458589738621a0bb941a9188bedcdda4177260689bfd9e73fb1d664116b17f478d1806dcc362f8305cd57b5573d") (async) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000040)) (async, rerun: 64) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) (rerun: 64) 17:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x80ffff, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xa000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:15 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd002000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.343198][T24638] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1008.351228][T24638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1008.359178][T24638] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x25000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1008.429331][T24857] FAULT_INJECTION: forcing a failure. [ 1008.429331][T24857] name failslab, interval 1, probability 0, space 0, times 0 [ 1008.442705][T24857] CPU: 1 PID: 24857 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1008.454323][T24857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.464366][T24857] Call Trace: [ 1008.467639][T24857] dump_stack+0x18e/0x1de [ 1008.471943][T24857] should_fail+0x5d8/0x740 [ 1008.476330][T24857] ? __kernfs_new_node+0x8b/0x630 [ 1008.481461][T24857] should_failslab+0x5/0x20 [ 1008.485963][T24857] kmem_cache_alloc+0x36/0x290 [ 1008.490703][T24857] __kernfs_new_node+0x8b/0x630 [ 1008.495523][T24857] ? mutex_lock+0x6c/0xc0 [ 1008.499821][T24857] ? kernfs_activate+0x3fc/0x420 [ 1008.504726][T24857] kernfs_new_node+0x95/0x160 [ 1008.509371][T24857] __kernfs_create_file+0x45/0x260 [ 1008.514449][T24857] sysfs_add_file_mode_ns+0x293/0x340 [ 1008.519790][T24857] sysfs_merge_group+0x19b/0x320 [ 1008.524699][T24857] dpm_sysfs_add+0xbd/0x260 [ 1008.529267][T24857] device_add+0xcec/0x1820 [ 1008.533665][T24857] device_create_vargs+0x1b8/0x210 [ 1008.538741][T24857] device_create+0x86/0xb0 [ 1008.543125][T24857] ? vsnprintf+0x1a07/0x1aa0 [ 1008.547685][T24857] bdi_register_va+0x89/0x5e0 [ 1008.552332][T24857] bdi_register+0x80/0xa0 [ 1008.556630][T24857] ? __device_add_disk+0x50a/0x1220 [ 1008.561797][T24857] bdi_register_owner+0x56/0xf0 [ 1008.566704][T24857] __device_add_disk+0x583/0x1220 [ 1008.571699][T24857] loop_add+0x554/0x710 [ 1008.575827][T24857] loop_control_ioctl+0x468/0x680 [ 1008.580828][T24857] ? xor_init+0x60/0x60 [ 1008.584956][T24857] do_vfs_ioctl+0x6fb/0x15b0 [ 1008.589600][T24857] __x64_sys_ioctl+0xd4/0x110 [ 1008.594431][T24857] do_syscall_64+0xcb/0x1e0 [ 1008.598924][T24857] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1008.604885][T24857] RIP: 0033:0x7fddc0dc7e99 [ 1008.609272][T24857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1008.628846][T24857] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1008.637323][T24857] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1008.645315][T24857] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1008.653273][T24857] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1008.661305][T24857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1008.669255][T24857] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1008.678862][T24857] ------------[ cut here ]------------ [ 1008.684413][T24857] WARNING: CPU: 1 PID: 24857 at block/genhd.c:742 __device_add_disk+0xe90/0x1220 [ 1008.693486][T24857] Modules linked in: [ 1008.697350][T24857] CPU: 1 PID: 24857 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1008.708942][T24857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.718980][T24857] RIP: 0010:__device_add_disk+0xe90/0x1220 [ 1008.724765][T24857] Code: ff e8 64 48 4c ff 0f 0b e9 6b fe ff ff e8 58 48 4c ff 0f 0b e9 a1 f2 ff ff e8 4c 48 4c ff 0f 0b e9 5d f8 ff ff e8 40 48 4c ff <0f> 0b e9 04 f7 ff ff e8 34 48 4c ff 43 80 3c 26 00 0f 85 4f fd ff [ 1008.744349][T24857] RSP: 0018:ffff8881e5547ce8 EFLAGS: 00010246 [ 1008.750389][T24857] RAX: ffffffff82148880 RBX: 00000000fffffff4 RCX: 0000000000040000 [ 1008.758337][T24857] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1008.766278][T24857] RBP: ffff8881eed79a08 R08: ffffffff82147f7e R09: 0000000000000010 [ 1008.774261][T24857] R10: ffffffff84600000 R11: 0000000000000000 R12: dffffc0000000000 [ 1008.782253][T24857] R13: 1ffff1103de39e01 R14: 1ffff1103de39e9d R15: ffff8881ef1cf000 [ 1008.790202][T24857] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1008.799108][T24857] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1008.805661][T24857] CR2: 0000001b2ed21000 CR3: 00000001eb25d000 CR4: 00000000003406e0 [ 1008.813604][T24857] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1008.821637][T24857] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1008.829576][T24857] Call Trace: [ 1008.832845][T24857] loop_add+0x554/0x710 [ 1008.836979][T24857] loop_control_ioctl+0x468/0x680 [ 1008.841981][T24857] ? xor_init+0x60/0x60 [ 1008.846107][T24857] do_vfs_ioctl+0x6fb/0x15b0 [ 1008.850689][T24857] __x64_sys_ioctl+0xd4/0x110 [ 1008.855335][T24857] do_syscall_64+0xcb/0x1e0 [ 1008.859808][T24857] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1008.865674][T24857] RIP: 0033:0x7fddc0dc7e99 [ 1008.870056][T24857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1008.889631][T24857] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1008.898008][T24857] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1008.905948][T24857] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1008.913889][T24857] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1008.921828][T24857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:16 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 67) 17:31:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xb000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x26000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80091204}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x4b}]}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x1001) 17:31:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xc000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x40000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd004000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x43000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80091204}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x4b}]}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x1001) [ 1008.929767][T24857] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1008.937719][T24857] ---[ end trace 8d4e5fe33cce5473 ]--- [ 1009.003073][T25016] FAULT_INJECTION: forcing a failure. [ 1009.003073][T25016] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.020025][T25016] CPU: 0 PID: 25016 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1009.031644][T25016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.041676][T25016] Call Trace: [ 1009.044942][T25016] dump_stack+0x18e/0x1de [ 1009.049249][T25016] should_fail+0x5d8/0x740 [ 1009.053635][T25016] ? kzalloc+0x1d/0x30 [ 1009.057673][T25016] should_failslab+0x5/0x20 [ 1009.062144][T25016] __kmalloc+0x5f/0x2f0 [ 1009.066308][T25016] ? kobject_uevent_env+0x252/0x1000 [ 1009.071562][T25016] kzalloc+0x1d/0x30 [ 1009.075445][T25016] kobject_get_path+0xb3/0x190 [ 1009.080178][T25016] kobject_uevent_env+0x269/0x1000 [ 1009.085256][T25016] ? mutex_lock+0x6c/0xc0 [ 1009.089556][T25016] device_add+0xecf/0x1820 [ 1009.093942][T25016] device_create_vargs+0x1b8/0x210 [ 1009.099050][T25016] device_create+0x86/0xb0 [ 1009.103605][T25016] ? vsnprintf+0x1a07/0x1aa0 [ 1009.108165][T25016] bdi_register_va+0x89/0x5e0 [ 1009.112807][T25016] bdi_register+0x80/0xa0 [ 1009.117104][T25016] ? __device_add_disk+0x50a/0x1220 [ 1009.122270][T25016] bdi_register_owner+0x56/0xf0 [ 1009.127088][T25016] __device_add_disk+0x583/0x1220 [ 1009.132082][T25016] loop_add+0x554/0x710 [ 1009.136204][T25016] loop_control_ioctl+0x468/0x680 [ 1009.141194][T25016] ? xor_init+0x60/0x60 [ 1009.145322][T25016] do_vfs_ioctl+0x6fb/0x15b0 [ 1009.149882][T25016] __x64_sys_ioctl+0xd4/0x110 [ 1009.154524][T25016] do_syscall_64+0xcb/0x1e0 [ 1009.158997][T25016] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1009.164857][T25016] RIP: 0033:0x7fddc0dc7e99 [ 1009.169242][T25016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1009.188817][T25016] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:16 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 68) 17:31:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xd000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x48000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80091204}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x4b}]}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x1001) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80091204}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x4b}]}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x1001) (async) 17:31:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd101000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xe000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x4c000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x10000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1009.197196][T25016] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1009.205134][T25016] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1009.213073][T25016] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1009.221010][T25016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1009.228948][T25016] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1009.310181][T25205] FAULT_INJECTION: forcing a failure. [ 1009.310181][T25205] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.323196][T25205] CPU: 0 PID: 25205 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1009.334791][T25205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.344834][T25205] Call Trace: [ 1009.348097][T25205] dump_stack+0x18e/0x1de [ 1009.352402][T25205] should_fail+0x5d8/0x740 [ 1009.356788][T25205] ? alloc_uevent_skb+0x73/0x220 [ 1009.361697][T25205] should_failslab+0x5/0x20 [ 1009.366169][T25205] __kmalloc_track_caller+0x5d/0x2e0 [ 1009.371424][T25205] ? kmem_cache_alloc+0x115/0x290 [ 1009.376414][T25205] ? alloc_uevent_skb+0x73/0x220 [ 1009.381320][T25205] __alloc_skb+0xaf/0x4d0 [ 1009.385618][T25205] ? mutex_lock+0x6c/0xc0 [ 1009.389917][T25205] alloc_uevent_skb+0x73/0x220 [ 1009.394648][T25205] kobject_uevent_env+0xaee/0x1000 [ 1009.399731][T25205] device_add+0xecf/0x1820 [ 1009.404118][T25205] device_create_vargs+0x1b8/0x210 [ 1009.409196][T25205] device_create+0x86/0xb0 [ 1009.413584][T25205] ? vsnprintf+0x1a07/0x1aa0 [ 1009.418149][T25205] bdi_register_va+0x89/0x5e0 [ 1009.422803][T25205] bdi_register+0x80/0xa0 [ 1009.427108][T25205] ? __device_add_disk+0x50a/0x1220 [ 1009.432275][T25205] bdi_register_owner+0x56/0xf0 [ 1009.437105][T25205] __device_add_disk+0x583/0x1220 [ 1009.442114][T25205] loop_add+0x554/0x710 [ 1009.446246][T25205] loop_control_ioctl+0x468/0x680 [ 1009.451239][T25205] ? xor_init+0x60/0x60 [ 1009.455379][T25205] do_vfs_ioctl+0x6fb/0x15b0 [ 1009.460024][T25205] __x64_sys_ioctl+0xd4/0x110 [ 1009.464702][T25205] do_syscall_64+0xcb/0x1e0 [ 1009.469180][T25205] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1009.475041][T25205] RIP: 0033:0x7fddc0dc7e99 [ 1009.479441][T25205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1009.499116][T25205] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:16 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 69) 17:31:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xd}, {0x0, [0x0, 0x5f, 0x0, 0x0, 0x2e, 0x61, 0x30, 0x2e, 0x30, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x25, 0xe8, 0x1}, 0x20) 17:31:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd102000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x68000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x11000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x12000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xd}, {0x0, [0x0, 0x5f, 0x0, 0x0, 0x2e, 0x61, 0x30, 0x2e, 0x30, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x25, 0xe8, 0x1}, 0x20) 17:31:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x6c000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd103000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.507497][T25205] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1009.515454][T25205] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1009.523393][T25205] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1009.531330][T25205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1009.539271][T25205] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1009.611966][T25326] FAULT_INJECTION: forcing a failure. [ 1009.611966][T25326] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.624840][T25326] CPU: 1 PID: 25326 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1009.636450][T25326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.646480][T25326] Call Trace: [ 1009.649743][T25326] dump_stack+0x18e/0x1de [ 1009.654041][T25326] should_fail+0x5d8/0x740 [ 1009.658428][T25326] ? skb_clone+0x1b2/0x360 [ 1009.662812][T25326] should_failslab+0x5/0x20 [ 1009.667283][T25326] kmem_cache_alloc+0x36/0x290 [ 1009.672013][T25326] ? string+0x280/0x2c0 [ 1009.676268][T25326] skb_clone+0x1b2/0x360 [ 1009.680558][T25326] netlink_broadcast_filtered+0x5e1/0x10b0 [ 1009.686334][T25326] ? skb_put+0x101/0x1e0 [ 1009.690544][T25326] netlink_broadcast+0x35/0x50 [ 1009.695277][T25326] kobject_uevent_env+0xb1f/0x1000 [ 1009.700364][T25326] device_add+0xecf/0x1820 [ 1009.704754][T25326] device_create_vargs+0x1b8/0x210 [ 1009.709831][T25326] device_create+0x86/0xb0 [ 1009.714214][T25326] ? vsnprintf+0x1a07/0x1aa0 [ 1009.718770][T25326] bdi_register_va+0x89/0x5e0 [ 1009.723414][T25326] bdi_register+0x80/0xa0 [ 1009.727713][T25326] ? __device_add_disk+0x50a/0x1220 [ 1009.732885][T25326] bdi_register_owner+0x56/0xf0 [ 1009.737703][T25326] __device_add_disk+0x583/0x1220 [ 1009.742721][T25326] loop_add+0x554/0x710 [ 1009.746844][T25326] loop_control_ioctl+0x468/0x680 [ 1009.751832][T25326] ? xor_init+0x60/0x60 [ 1009.755961][T25326] do_vfs_ioctl+0x6fb/0x15b0 [ 1009.760520][T25326] __x64_sys_ioctl+0xd4/0x110 [ 1009.765170][T25326] do_syscall_64+0xcb/0x1e0 [ 1009.769642][T25326] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1009.775517][T25326] RIP: 0033:0x7fddc0dc7e99 [ 1009.779902][T25326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1009.799479][T25326] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:17 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 70) 17:31:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x25000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd104000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x74000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xd}, {0x0, [0x0, 0x5f, 0x0, 0x0, 0x2e, 0x61, 0x30, 0x2e, 0x30, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x25, 0xe8, 0x1}, 0x20) 17:31:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x26000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.807856][T25326] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1009.815798][T25326] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1009.823760][T25326] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1009.831705][T25326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1009.839646][T25326] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x7a000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) 17:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1009.914065][T25555] FAULT_INJECTION: forcing a failure. [ 1009.914065][T25555] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.936844][T25555] CPU: 0 PID: 25555 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1009.948654][T25555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.958707][T25555] Call Trace: [ 1009.961991][T25555] dump_stack+0x18e/0x1de [ 1009.966314][T25555] should_fail+0x5d8/0x740 [ 1009.970741][T25555] ? __d_alloc+0x2a/0x6a0 [ 1009.975067][T25555] should_failslab+0x5/0x20 [ 1009.979556][T25555] kmem_cache_alloc+0x36/0x290 [ 1009.984304][T25555] __d_alloc+0x2a/0x6a0 [ 1009.988447][T25555] ? kobject_uevent_env+0xbb2/0x1000 [ 1009.993720][T25555] d_alloc_parallel+0x7d/0x12b0 [ 1009.998558][T25555] ? avc_has_perm_noaudit+0x2fc/0x380 [ 1010.003920][T25555] ? avc_has_perm_noaudit+0x2b0/0x380 [ 1010.009287][T25555] ? __d_lookup+0x4b8/0x510 [ 1010.013782][T25555] __lookup_slow+0xef/0x3b0 [ 1010.018273][T25555] lookup_one_len+0x11d/0x210 [ 1010.022941][T25555] start_creating+0xec/0x270 [ 1010.027610][T25555] debugfs_create_dir+0x24/0x3f0 [ 1010.032534][T25555] bdi_register_va+0x232/0x5e0 [ 1010.037290][T25555] bdi_register+0x80/0xa0 [ 1010.041695][T25555] ? __device_add_disk+0x50a/0x1220 [ 1010.046881][T25555] bdi_register_owner+0x56/0xf0 [ 1010.051720][T25555] __device_add_disk+0x583/0x1220 [ 1010.056734][T25555] loop_add+0x554/0x710 [ 1010.060880][T25555] loop_control_ioctl+0x468/0x680 [ 1010.065901][T25555] ? xor_init+0x60/0x60 [ 1010.070045][T25555] do_vfs_ioctl+0x6fb/0x15b0 [ 1010.074626][T25555] __x64_sys_ioctl+0xd4/0x110 [ 1010.079294][T25555] do_syscall_64+0xcb/0x1e0 [ 1010.083785][T25555] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1010.089662][T25555] RIP: 0033:0x7fddc0dc7e99 [ 1010.094060][T25555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:31:17 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 71) 17:31:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x40000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xec000000}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd201000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.113671][T25555] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1010.122073][T25555] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1010.130032][T25555] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1010.137991][T25555] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1010.145952][T25555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1010.154600][T25555] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) 17:31:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd202000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x43000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0xffff0f00}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x48000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1010.261991][T25771] FAULT_INJECTION: forcing a failure. [ 1010.261991][T25771] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.280727][T25771] CPU: 1 PID: 25771 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1010.292350][T25771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.302390][T25771] Call Trace: [ 1010.305671][T25771] dump_stack+0x18e/0x1de [ 1010.310082][T25771] should_fail+0x5d8/0x740 [ 1010.314492][T25771] ? new_inode_pseudo+0x79/0x220 [ 1010.319420][T25771] should_failslab+0x5/0x20 [ 1010.323914][T25771] kmem_cache_alloc+0x36/0x290 [ 1010.328671][T25771] new_inode_pseudo+0x79/0x220 [ 1010.333428][T25771] new_inode+0x25/0x1d0 [ 1010.337585][T25771] ? start_creating+0x183/0x270 [ 1010.342425][T25771] debugfs_create_dir+0x68/0x3f0 [ 1010.347353][T25771] bdi_register_va+0x232/0x5e0 [ 1010.352104][T25771] bdi_register+0x80/0xa0 [ 1010.356419][T25771] ? __device_add_disk+0x50a/0x1220 [ 1010.361605][T25771] bdi_register_owner+0x56/0xf0 [ 1010.366443][T25771] __device_add_disk+0x583/0x1220 [ 1010.371458][T25771] loop_add+0x554/0x710 [ 1010.375603][T25771] loop_control_ioctl+0x468/0x680 [ 1010.380613][T25771] ? xor_init+0x60/0x60 [ 1010.384759][T25771] do_vfs_ioctl+0x6fb/0x15b0 [ 1010.389341][T25771] __x64_sys_ioctl+0xd4/0x110 [ 1010.394008][T25771] do_syscall_64+0xcb/0x1e0 [ 1010.398497][T25771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1010.404382][T25771] RIP: 0033:0x7fddc0dc7e99 [ 1010.408790][T25771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1010.428383][T25771] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1010.436786][T25771] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1010.444752][T25771] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1010.452712][T25771] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 17:31:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd203000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x4c000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:17 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 72) 17:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) [ 1010.460677][T25771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1010.468642][T25771] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1010.477623][T25771] debugfs: out of free dentries, can not create directory '7:0' 17:31:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x68000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x3, 0x0, 0x0, 0x7}]}}, &(0x7f00000004c0)=""/232, 0x26, 0xe8}, 0x20) 17:31:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd204000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x6c000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.552492][T25895] FAULT_INJECTION: forcing a failure. [ 1010.552492][T25895] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.584088][T25895] CPU: 1 PID: 25895 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1010.595718][T25895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.605762][T25895] Call Trace: [ 1010.609050][T25895] dump_stack+0x18e/0x1de [ 1010.613380][T25895] should_fail+0x5d8/0x740 [ 1010.617790][T25895] ? security_inode_alloc+0x32/0x1d0 [ 1010.623069][T25895] should_failslab+0x5/0x20 [ 1010.627560][T25895] kmem_cache_alloc+0x36/0x290 [ 1010.632319][T25895] security_inode_alloc+0x32/0x1d0 [ 1010.637422][T25895] inode_init_always+0x387/0x810 [ 1010.642480][T25895] new_inode_pseudo+0x90/0x220 [ 1010.647237][T25895] new_inode+0x25/0x1d0 [ 1010.651387][T25895] ? start_creating+0x183/0x270 [ 1010.656231][T25895] debugfs_create_dir+0x68/0x3f0 [ 1010.661155][T25895] bdi_register_va+0x232/0x5e0 [ 1010.665909][T25895] bdi_register+0x80/0xa0 [ 1010.670232][T25895] ? __device_add_disk+0x50a/0x1220 [ 1010.675415][T25895] bdi_register_owner+0x56/0xf0 [ 1010.680256][T25895] __device_add_disk+0x583/0x1220 [ 1010.685271][T25895] loop_add+0x554/0x710 [ 1010.689413][T25895] loop_control_ioctl+0x468/0x680 [ 1010.694421][T25895] ? xor_init+0x60/0x60 [ 1010.698564][T25895] do_vfs_ioctl+0x6fb/0x15b0 [ 1010.703144][T25895] __x64_sys_ioctl+0xd4/0x110 [ 1010.707810][T25895] do_syscall_64+0xcb/0x1e0 [ 1010.712301][T25895] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1010.718181][T25895] RIP: 0033:0x7fddc0dc7e99 [ 1010.722584][T25895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1010.742172][T25895] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 73) 17:31:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x3, 0x0, 0x0, 0x7}]}}, &(0x7f00000004c0)=""/232, 0x26, 0xe8}, 0x20) 17:31:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd301000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x74000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1010.750573][T25895] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1010.758705][T25895] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1010.766759][T25895] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1010.774726][T25895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1010.782684][T25895] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1010.795209][T25895] debugfs: out of free dentries, can not create directory '7:0' 17:31:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd302000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0x7a000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x3, 0x0, 0x0, 0x7}]}}, &(0x7f00000004c0)=""/232, 0x26, 0xe8}, 0x20) 17:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd303000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.875245][T26146] FAULT_INJECTION: forcing a failure. [ 1010.875245][T26146] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1010.894890][T26146] CPU: 1 PID: 26146 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1010.906524][T26146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.916653][T26146] Call Trace: [ 1010.919933][T26146] dump_stack+0x18e/0x1de [ 1010.924257][T26146] should_fail+0x5d8/0x740 [ 1010.928667][T26146] __alloc_pages_nodemask+0x12e/0x740 [ 1010.934027][T26146] __get_free_pages+0xa/0x30 [ 1010.938604][T26146] inode_doinit_with_dentry+0x8d4/0x1170 [ 1010.944228][T26146] security_d_instantiate+0xa5/0x100 [ 1010.949500][T26146] d_instantiate+0x51/0x90 [ 1010.953909][T26146] debugfs_create_dir+0x1bc/0x3f0 [ 1010.958924][T26146] bdi_register_va+0x232/0x5e0 [ 1010.963675][T26146] bdi_register+0x80/0xa0 [ 1010.967992][T26146] ? __device_add_disk+0x50a/0x1220 [ 1010.973182][T26146] bdi_register_owner+0x56/0xf0 [ 1010.978019][T26146] __device_add_disk+0x583/0x1220 [ 1010.983027][T26146] loop_add+0x554/0x710 [ 1010.987174][T26146] loop_control_ioctl+0x468/0x680 [ 1010.992184][T26146] ? xor_init+0x60/0x60 [ 1010.996355][T26146] do_vfs_ioctl+0x6fb/0x15b0 [ 1011.000936][T26146] __x64_sys_ioctl+0xd4/0x110 [ 1011.005604][T26146] do_syscall_64+0xcb/0x1e0 [ 1011.010106][T26146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.016067][T26146] RIP: 0033:0x7fddc0dc7e99 [ 1011.020469][T26146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1011.040198][T26146] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1011.048684][T26146] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1011.056646][T26146] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1011.064605][T26146] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 17:31:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 74) 17:31:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xe7000000}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd304000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)=""/35, &(0x7f00000000c0)=0x23) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x30, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3069, &(0x7f0000000100)={0x0, 0xfa90, 0xc, 0x0, 0x119}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd_index=0x5, 0x80000000, 0x707, 0x50, 0xc}, 0x101) write$hidraw(0xffffffffffffffff, &(0x7f0000000000)="d17928542dd848db7e98f3d03d", 0xd) 17:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6, 0x0, 0x0, 0x7, 0xffff0f00}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1011.072562][T26146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1011.080610][T26146] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x6}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x7}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)=""/35, &(0x7f00000000c0)=0x23) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x30, 0xffffffffffffffff, 0x0) (async) syz_io_uring_setup(0x3069, &(0x7f0000000100)={0x0, 0xfa90, 0xc, 0x0, 0x119}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd_index=0x5, 0x80000000, 0x707, 0x50, 0xc}, 0x101) (async, rerun: 32) write$hidraw(0xffffffffffffffff, &(0x7f0000000000)="d17928542dd848db7e98f3d03d", 0xd) (rerun: 32) [ 1011.163346][T26337] FAULT_INJECTION: forcing a failure. [ 1011.163346][T26337] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.198821][T26337] CPU: 0 PID: 26337 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1011.210454][T26337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.220496][T26337] Call Trace: [ 1011.223779][T26337] dump_stack+0x18e/0x1de [ 1011.228187][T26337] should_fail+0x5d8/0x740 [ 1011.232606][T26337] ? __d_alloc+0x2a/0x6a0 [ 1011.237098][T26337] should_failslab+0x5/0x20 [ 1011.241591][T26337] kmem_cache_alloc+0x36/0x290 [ 1011.246347][T26337] ? stack_trace_save+0xc4/0x160 [ 1011.251277][T26337] __d_alloc+0x2a/0x6a0 [ 1011.255416][T26337] ? save_stack+0x107/0x170 [ 1011.259905][T26337] d_alloc_parallel+0x7d/0x12b0 [ 1011.264745][T26337] ? avc_has_perm_noaudit+0x2fc/0x380 [ 1011.270106][T26337] ? avc_has_perm_noaudit+0x2b0/0x380 [ 1011.275468][T26337] ? __d_lookup+0x4b8/0x510 [ 1011.279955][T26337] __lookup_slow+0xef/0x3b0 [ 1011.284446][T26337] lookup_one_len+0x11d/0x210 [ 1011.289197][T26337] start_creating+0xec/0x270 [ 1011.293777][T26337] __debugfs_create_file+0x74/0x460 [ 1011.298964][T26337] ? debugfs_create_dir+0x302/0x3f0 [ 1011.304148][T26337] bdi_register_va+0x274/0x5e0 [ 1011.308894][T26337] bdi_register+0x80/0xa0 [ 1011.313211][T26337] ? __device_add_disk+0x50a/0x1220 [ 1011.318397][T26337] bdi_register_owner+0x56/0xf0 [ 1011.323237][T26337] __device_add_disk+0x583/0x1220 [ 1011.328338][T26337] loop_add+0x554/0x710 [ 1011.332488][T26337] loop_control_ioctl+0x468/0x680 [ 1011.337496][T26337] ? xor_init+0x60/0x60 [ 1011.341640][T26337] do_vfs_ioctl+0x6fb/0x15b0 [ 1011.346217][T26337] __x64_sys_ioctl+0xd4/0x110 [ 1011.350876][T26337] do_syscall_64+0xcb/0x1e0 [ 1011.355364][T26337] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.361306][T26337] RIP: 0033:0x7fddc0dc7e99 [ 1011.365706][T26337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1011.385303][T26337] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1011.393792][T26337] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1011.401751][T26337] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 17:31:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 75) 17:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd401000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)=""/35, &(0x7f00000000c0)=0x23) (async) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x30, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3069, &(0x7f0000000100)={0x0, 0xfa90, 0xc, 0x0, 0x119}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd_index=0x5, 0x80000000, 0x707, 0x50, 0xc}, 0x101) (async) write$hidraw(0xffffffffffffffff, &(0x7f0000000000)="d17928542dd848db7e98f3d03d", 0xd) [ 1011.409706][T26337] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1011.417665][T26337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1011.425623][T26337] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd402000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0xa}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1011.511026][T26562] FAULT_INJECTION: forcing a failure. [ 1011.511026][T26562] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.544109][T26562] CPU: 1 PID: 26562 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1011.555728][T26562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.565762][T26562] Call Trace: [ 1011.569042][T26562] dump_stack+0x18e/0x1de [ 1011.573372][T26562] should_fail+0x5d8/0x740 [ 1011.577783][T26562] ? new_inode_pseudo+0x79/0x220 [ 1011.582706][T26562] should_failslab+0x5/0x20 [ 1011.587196][T26562] kmem_cache_alloc+0x36/0x290 [ 1011.591945][T26562] new_inode_pseudo+0x79/0x220 [ 1011.596690][T26562] new_inode+0x25/0x1d0 [ 1011.600880][T26562] ? start_creating+0x183/0x270 [ 1011.605738][T26562] __debugfs_create_file+0xb5/0x460 [ 1011.610929][T26562] ? debugfs_create_dir+0x302/0x3f0 [ 1011.616120][T26562] bdi_register_va+0x274/0x5e0 [ 1011.620883][T26562] bdi_register+0x80/0xa0 [ 1011.625294][T26562] ? __device_add_disk+0x50a/0x1220 [ 1011.630476][T26562] bdi_register_owner+0x56/0xf0 [ 1011.635407][T26562] __device_add_disk+0x583/0x1220 [ 1011.640420][T26562] loop_add+0x554/0x710 [ 1011.644566][T26562] loop_control_ioctl+0x468/0x680 [ 1011.649573][T26562] ? xor_init+0x60/0x60 [ 1011.653803][T26562] do_vfs_ioctl+0x6fb/0x15b0 [ 1011.658383][T26562] __x64_sys_ioctl+0xd4/0x110 [ 1011.663043][T26562] do_syscall_64+0xcb/0x1e0 [ 1011.667538][T26562] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.673417][T26562] RIP: 0033:0x7fddc0dc7e99 [ 1011.677825][T26562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1011.697425][T26562] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:31:19 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 76) 17:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:19 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) io_uring_setup(0x4e65, &(0x7f00000002c0)={0x0, 0x345b, 0x1, 0x2, 0x309, 0x0, r0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe7, 0xe7, 0x4, [@var={0xe, 0x0, 0x0, 0xe, 0x5}, @datasec={0x5, 0x2, 0x0, 0xf, 0x3, [{0x4, 0x2, 0x3}, {0x3, 0x3ff, 0x7}], "32886b"}, @union={0x6, 0x7, 0x0, 0x5, 0x1, 0xfff, [{0x0, 0x0, 0x80000001}, {0x6, 0x2, 0x3}, {0x8, 0x1, 0x8}, {0x2, 0x0, 0x2}, {0x5, 0x4, 0xb8}, {0x0, 0x1, 0x4}, {0xa, 0x4, 0x205c}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x4, 0x5}, {0xf, 0x3}, {0x6, 0x4}, {0x4, 0x5}, {0xb, 0x3}]}, @typedef={0x7}, @var={0xf, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000200)=""/147, 0x104, 0x93}, 0x20) 17:31:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd403000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0xb}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1011.705830][T26562] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1011.713790][T26562] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1011.721751][T26562] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1011.729710][T26562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1011.737927][T26562] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1011.746454][T26562] debugfs: out of free dentries, can not create file 'stats' 17:31:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd404000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:19 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) io_uring_setup(0x4e65, &(0x7f00000002c0)={0x0, 0x345b, 0x1, 0x2, 0x309, 0x0, r0}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe7, 0xe7, 0x4, [@var={0xe, 0x0, 0x0, 0xe, 0x5}, @datasec={0x5, 0x2, 0x0, 0xf, 0x3, [{0x4, 0x2, 0x3}, {0x3, 0x3ff, 0x7}], "32886b"}, @union={0x6, 0x7, 0x0, 0x5, 0x1, 0xfff, [{0x0, 0x0, 0x80000001}, {0x6, 0x2, 0x3}, {0x8, 0x1, 0x8}, {0x2, 0x0, 0x2}, {0x5, 0x4, 0xb8}, {0x0, 0x1, 0x4}, {0xa, 0x4, 0x205c}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x4, 0x5}, {0xf, 0x3}, {0x6, 0x4}, {0x4, 0x5}, {0xb, 0x3}]}, @typedef={0x7}, @var={0xf, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000200)=""/147, 0x104, 0x93}, 0x20) 17:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x71070000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1011.814762][T26688] FAULT_INJECTION: forcing a failure. [ 1011.814762][T26688] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.849116][T26688] CPU: 0 PID: 26688 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1011.860749][T26688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.870790][T26688] Call Trace: [ 1011.874070][T26688] dump_stack+0x18e/0x1de [ 1011.878396][T26688] should_fail+0x5d8/0x740 [ 1011.882806][T26688] ? security_inode_alloc+0x32/0x1d0 [ 1011.888183][T26688] should_failslab+0x5/0x20 [ 1011.892676][T26688] kmem_cache_alloc+0x36/0x290 [ 1011.897428][T26688] security_inode_alloc+0x32/0x1d0 [ 1011.902528][T26688] inode_init_always+0x387/0x810 [ 1011.907453][T26688] new_inode_pseudo+0x90/0x220 [ 1011.912201][T26688] new_inode+0x25/0x1d0 [ 1011.916342][T26688] ? start_creating+0x183/0x270 [ 1011.921182][T26688] __debugfs_create_file+0xb5/0x460 [ 1011.926385][T26688] ? debugfs_create_dir+0x302/0x3f0 [ 1011.931570][T26688] bdi_register_va+0x274/0x5e0 [ 1011.936324][T26688] bdi_register+0x80/0xa0 [ 1011.940641][T26688] ? __device_add_disk+0x50a/0x1220 [ 1011.945831][T26688] bdi_register_owner+0x56/0xf0 [ 1011.950681][T26688] __device_add_disk+0x583/0x1220 [ 1011.955702][T26688] loop_add+0x554/0x710 [ 1011.959854][T26688] loop_control_ioctl+0x468/0x680 [ 1011.964873][T26688] ? xor_init+0x60/0x60 [ 1011.969017][T26688] do_vfs_ioctl+0x6fb/0x15b0 [ 1011.973600][T26688] __x64_sys_ioctl+0xd4/0x110 [ 1011.978268][T26688] do_syscall_64+0xcb/0x1e0 [ 1011.982761][T26688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.988638][T26688] RIP: 0033:0x7fddc0dc7e99 [ 1011.993040][T26688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.012633][T26688] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1012.021036][T26688] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1012.028995][T26688] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1012.036962][T26688] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.045007][T26688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.052967][T26688] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:19 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 77) 17:31:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd501000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0xd}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:19 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async, rerun: 64) io_uring_setup(0x4e65, &(0x7f00000002c0)={0x0, 0x345b, 0x1, 0x2, 0x309, 0x0, r0}) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe7, 0xe7, 0x4, [@var={0xe, 0x0, 0x0, 0xe, 0x5}, @datasec={0x5, 0x2, 0x0, 0xf, 0x3, [{0x4, 0x2, 0x3}, {0x3, 0x3ff, 0x7}], "32886b"}, @union={0x6, 0x7, 0x0, 0x5, 0x1, 0xfff, [{0x0, 0x0, 0x80000001}, {0x6, 0x2, 0x3}, {0x8, 0x1, 0x8}, {0x2, 0x0, 0x2}, {0x5, 0x4, 0xb8}, {0x0, 0x1, 0x4}, {0xa, 0x4, 0x205c}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x4, 0x5}, {0xf, 0x3}, {0x6, 0x4}, {0x4, 0x5}, {0xb, 0x3}]}, @typedef={0x7}, @var={0xf, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000200)=""/147, 0x104, 0x93}, 0x20) 17:31:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd502000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1012.066338][T26688] debugfs: out of free dentries, can not create file 'stats' 17:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0xe}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000020000000000008700a2260a1320000000000000000022563061302e00f9c197b4e5a8918d90fd1842586ad64becd4eb10349ab539b854302f59492e4b4b92a05149cab42982090000000000003fed11849ab67a91e0da674e8579a05e98f900000000d7ca29048da56fe6b1043627d370f89010fab2a18f9ff54dfc4e"], &(0x7f00000004c0)=""/227, 0x2e, 0xe3, 0x1}, 0x20) clock_gettime(0x0, &(0x7f0000004900)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/180, 0xb4}, {&(0x7f0000000280)=""/49, 0x31}, {&(0x7f0000004a00)=""/162, 0xa2}], 0x3, &(0x7f0000000380)=""/3, 0x3}, 0x15e7}, {{&(0x7f00000003c0)=@x25, 0x80, &(0x7f0000001880)=[{&(0x7f00000005c0)=""/194, 0xc2}, {&(0x7f0000004ac0)=""/169, 0xa9}, {&(0x7f0000000780)=""/176, 0xb0}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000440)=""/6, 0x6}, {&(0x7f0000000480)=""/40, 0x28}, {&(0x7f0000001840)=""/64, 0x40}], 0x7, &(0x7f0000001900)=""/4096, 0x1000}, 0x2e7a}, {{&(0x7f0000002900)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002980)=""/194, 0xc2}, {&(0x7f0000002a80)=""/17, 0x11}, {&(0x7f0000002ac0)=""/166, 0xa6}, {&(0x7f0000002b80)=""/187, 0xbb}, {&(0x7f0000002c40)=""/156, 0x9c}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/87, 0x57}, {&(0x7f0000003d80)=""/248, 0xf8}], 0x8, &(0x7f0000003f00)=""/65, 0x41}, 0x1000}, {{&(0x7f0000003f80)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004000)=""/227, 0xe3}, {&(0x7f0000004100)=""/255, 0xff}, {&(0x7f0000004200)=""/242, 0xf2}], 0x3, &(0x7f0000004340)=""/46, 0x2e}, 0x9}, {{&(0x7f0000004380)=@ethernet={0x0, @random}, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004400)=""/122, 0x7a}, {&(0x7f0000004480)=""/138, 0xffffffffffffffd8}, {&(0x7f0000004540)=""/225, 0xe1}, {&(0x7f0000004640)=""/38, 0x26}, {&(0x7f0000004680)=""/41, 0x29}], 0x5, &(0x7f0000004740)=""/108, 0x6c}, 0x3}], 0x5, 0x42, &(0x7f0000004940)={r0, r1+10000000}) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000004980), &(0x7f00000049c0)=0x4) accept4(r2, &(0x7f00000006c0)=@phonet, &(0x7f0000000340)=0x80, 0x800) r4 = accept4$vsock_stream(r3, &(0x7f0000000740)={0x28, 0x0, 0x2710, @host}, 0x10, 0x800) connect$vsock_stream(r4, &(0x7f0000004b80)={0x28, 0x0, 0x2711, @hyper}, 0x10) r5 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3}}, @typedef={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/196, 0x41, 0xc4, 0x1}, 0x20) write$cgroup_pressure(r5, &(0x7f0000000300)={'full', 0x20, 0x7, 0x20, 0x100000001}, 0x2f) 17:31:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1012.178008][T27020] FAULT_INJECTION: forcing a failure. [ 1012.178008][T27020] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.193732][T27020] CPU: 0 PID: 27020 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1012.205353][T27020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.215400][T27020] Call Trace: [ 1012.218697][T27020] dump_stack+0x18e/0x1de [ 1012.223015][T27020] should_fail+0x5d8/0x740 [ 1012.227425][T27020] ? security_inode_alloc+0x32/0x1d0 [ 1012.232704][T27020] should_failslab+0x5/0x20 [ 1012.237197][T27020] kmem_cache_alloc+0x36/0x290 [ 1012.241955][T27020] security_inode_alloc+0x32/0x1d0 [ 1012.247057][T27020] inode_init_always+0x387/0x810 [ 1012.251985][T27020] new_inode_pseudo+0x90/0x220 [ 1012.256735][T27020] new_inode+0x25/0x1d0 [ 1012.260876][T27020] ? start_creating+0x183/0x270 [ 1012.265724][T27020] __debugfs_create_file+0xb5/0x460 [ 1012.270912][T27020] ? debugfs_create_dir+0x302/0x3f0 [ 1012.276106][T27020] bdi_register_va+0x274/0x5e0 [ 1012.280858][T27020] bdi_register+0x80/0xa0 [ 1012.285175][T27020] ? __device_add_disk+0x50a/0x1220 [ 1012.290362][T27020] bdi_register_owner+0x56/0xf0 [ 1012.295201][T27020] __device_add_disk+0x583/0x1220 [ 1012.300214][T27020] loop_add+0x554/0x710 [ 1012.304359][T27020] loop_control_ioctl+0x468/0x680 [ 1012.310845][T27020] ? xor_init+0x60/0x60 [ 1012.314991][T27020] do_vfs_ioctl+0x6fb/0x15b0 [ 1012.319569][T27020] __x64_sys_ioctl+0xd4/0x110 [ 1012.324234][T27020] do_syscall_64+0xcb/0x1e0 [ 1012.328813][T27020] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1012.334695][T27020] RIP: 0033:0x7fddc0dc7e99 [ 1012.339098][T27020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.358691][T27020] RSP: 002b:00007fddbff1d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1012.367095][T27020] RAX: ffffffffffffffda RBX: 00007fddc0edb030 RCX: 00007fddc0dc7e99 17:31:19 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 78) 17:31:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd503000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x10}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe7000000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000020000000000008700a2260a1320000000000000000022563061302e00f9c197b4e5a8918d90fd1842586ad64becd4eb10349ab539b854302f59492e4b4b92a05149cab42982090000000000003fed11849ab67a91e0da674e8579a05e98f900000000d7ca29048da56fe6b1043627d370f89010fab2a18f9ff54dfc4e"], &(0x7f00000004c0)=""/227, 0x2e, 0xe3, 0x1}, 0x20) clock_gettime(0x0, &(0x7f0000004900)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/180, 0xb4}, {&(0x7f0000000280)=""/49, 0x31}, {&(0x7f0000004a00)=""/162, 0xa2}], 0x3, &(0x7f0000000380)=""/3, 0x3}, 0x15e7}, {{&(0x7f00000003c0)=@x25, 0x80, &(0x7f0000001880)=[{&(0x7f00000005c0)=""/194, 0xc2}, {&(0x7f0000004ac0)=""/169, 0xa9}, {&(0x7f0000000780)=""/176, 0xb0}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000440)=""/6, 0x6}, {&(0x7f0000000480)=""/40, 0x28}, {&(0x7f0000001840)=""/64, 0x40}], 0x7, &(0x7f0000001900)=""/4096, 0x1000}, 0x2e7a}, {{&(0x7f0000002900)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002980)=""/194, 0xc2}, {&(0x7f0000002a80)=""/17, 0x11}, {&(0x7f0000002ac0)=""/166, 0xa6}, {&(0x7f0000002b80)=""/187, 0xbb}, {&(0x7f0000002c40)=""/156, 0x9c}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/87, 0x57}, {&(0x7f0000003d80)=""/248, 0xf8}], 0x8, &(0x7f0000003f00)=""/65, 0x41}, 0x1000}, {{&(0x7f0000003f80)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004000)=""/227, 0xe3}, {&(0x7f0000004100)=""/255, 0xff}, {&(0x7f0000004200)=""/242, 0xf2}], 0x3, &(0x7f0000004340)=""/46, 0x2e}, 0x9}, {{&(0x7f0000004380)=@ethernet={0x0, @random}, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004400)=""/122, 0x7a}, {&(0x7f0000004480)=""/138, 0xffffffffffffffd8}, {&(0x7f0000004540)=""/225, 0xe1}, {&(0x7f0000004640)=""/38, 0x26}, {&(0x7f0000004680)=""/41, 0x29}], 0x5, &(0x7f0000004740)=""/108, 0x6c}, 0x3}], 0x5, 0x42, &(0x7f0000004940)={r0, r1+10000000}) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000004980), &(0x7f00000049c0)=0x4) (async) accept4(r2, &(0x7f00000006c0)=@phonet, &(0x7f0000000340)=0x80, 0x800) r4 = accept4$vsock_stream(r3, &(0x7f0000000740)={0x28, 0x0, 0x2710, @host}, 0x10, 0x800) connect$vsock_stream(r4, &(0x7f0000004b80)={0x28, 0x0, 0x2711, @hyper}, 0x10) (async) r5 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3}}, @typedef={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/196, 0x41, 0xc4, 0x1}, 0x20) (async) write$cgroup_pressure(r5, &(0x7f0000000300)={'full', 0x20, 0x7, 0x20, 0x100000001}, 0x2f) 17:31:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd504000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) [ 1012.375057][T27020] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1012.383014][T27020] RBP: 00007fddbff1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.390982][T27020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.398940][T27020] R13: 00007fff671e8a3f R14: 00007fddbff1d300 R15: 0000000000022000 [ 1012.410506][T27020] debugfs: out of free dentries, can not create file 'stats' 17:31:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x11}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000020000000000008700a2260a1320000000000000000022563061302e00f9c197b4e5a8918d90fd1842586ad64becd4eb10349ab539b854302f59492e4b4b92a05149cab42982090000000000003fed11849ab67a91e0da674e8579a05e98f900000000d7ca29048da56fe6b1043627d370f89010fab2a18f9ff54dfc4e"], &(0x7f00000004c0)=""/227, 0x2e, 0xe3, 0x1}, 0x20) clock_gettime(0x0, &(0x7f0000004900)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/180, 0xb4}, {&(0x7f0000000280)=""/49, 0x31}, {&(0x7f0000004a00)=""/162, 0xa2}], 0x3, &(0x7f0000000380)=""/3, 0x3}, 0x15e7}, {{&(0x7f00000003c0)=@x25, 0x80, &(0x7f0000001880)=[{&(0x7f00000005c0)=""/194, 0xc2}, {&(0x7f0000004ac0)=""/169, 0xa9}, {&(0x7f0000000780)=""/176, 0xb0}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000440)=""/6, 0x6}, {&(0x7f0000000480)=""/40, 0x28}, {&(0x7f0000001840)=""/64, 0x40}], 0x7, &(0x7f0000001900)=""/4096, 0x1000}, 0x2e7a}, {{&(0x7f0000002900)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002980)=""/194, 0xc2}, {&(0x7f0000002a80)=""/17, 0x11}, {&(0x7f0000002ac0)=""/166, 0xa6}, {&(0x7f0000002b80)=""/187, 0xbb}, {&(0x7f0000002c40)=""/156, 0x9c}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/87, 0x57}, {&(0x7f0000003d80)=""/248, 0xf8}], 0x8, &(0x7f0000003f00)=""/65, 0x41}, 0x1000}, {{&(0x7f0000003f80)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004000)=""/227, 0xe3}, {&(0x7f0000004100)=""/255, 0xff}, {&(0x7f0000004200)=""/242, 0xf2}], 0x3, &(0x7f0000004340)=""/46, 0x2e}, 0x9}, {{&(0x7f0000004380)=@ethernet={0x0, @random}, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004400)=""/122, 0x7a}, {&(0x7f0000004480)=""/138, 0xffffffffffffffd8}, {&(0x7f0000004540)=""/225, 0xe1}, {&(0x7f0000004640)=""/38, 0x26}, {&(0x7f0000004680)=""/41, 0x29}], 0x5, &(0x7f0000004740)=""/108, 0x6c}, 0x3}], 0x5, 0x42, &(0x7f0000004940)={r0, r1+10000000}) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000004980), &(0x7f00000049c0)=0x4) accept4(r2, &(0x7f00000006c0)=@phonet, &(0x7f0000000340)=0x80, 0x800) r4 = accept4$vsock_stream(r3, &(0x7f0000000740)={0x28, 0x0, 0x2710, @host}, 0x10, 0x800) connect$vsock_stream(r4, &(0x7f0000004b80)={0x28, 0x0, 0x2711, @hyper}, 0x10) r5 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3}}, @typedef={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/196, 0x41, 0xc4, 0x1}, 0x20) write$cgroup_pressure(r5, &(0x7f0000000300)={'full', 0x20, 0x7, 0x20, 0x100000001}, 0x2f) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000020000000000008700a2260a1320000000000000000022563061302e00f9c197b4e5a8918d90fd1842586ad64becd4eb10349ab539b854302f59492e4b4b92a05149cab42982090000000000003fed11849ab67a91e0da674e8579a05e98f900000000d7ca29048da56fe6b1043627d370f89010fab2a18f9ff54dfc4e"], &(0x7f00000004c0)=""/227, 0x2e, 0xe3, 0x1}, 0x20) (async) clock_gettime(0x0, &(0x7f0000004900)) (async) recvmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/180, 0xb4}, {&(0x7f0000000280)=""/49, 0x31}, {&(0x7f0000004a00)=""/162, 0xa2}], 0x3, &(0x7f0000000380)=""/3, 0x3}, 0x15e7}, {{&(0x7f00000003c0)=@x25, 0x80, &(0x7f0000001880)=[{&(0x7f00000005c0)=""/194, 0xc2}, {&(0x7f0000004ac0)=""/169, 0xa9}, {&(0x7f0000000780)=""/176, 0xb0}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000440)=""/6, 0x6}, {&(0x7f0000000480)=""/40, 0x28}, {&(0x7f0000001840)=""/64, 0x40}], 0x7, &(0x7f0000001900)=""/4096, 0x1000}, 0x2e7a}, {{&(0x7f0000002900)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002980)=""/194, 0xc2}, {&(0x7f0000002a80)=""/17, 0x11}, {&(0x7f0000002ac0)=""/166, 0xa6}, {&(0x7f0000002b80)=""/187, 0xbb}, {&(0x7f0000002c40)=""/156, 0x9c}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/87, 0x57}, {&(0x7f0000003d80)=""/248, 0xf8}], 0x8, &(0x7f0000003f00)=""/65, 0x41}, 0x1000}, {{&(0x7f0000003f80)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004000)=""/227, 0xe3}, {&(0x7f0000004100)=""/255, 0xff}, {&(0x7f0000004200)=""/242, 0xf2}], 0x3, &(0x7f0000004340)=""/46, 0x2e}, 0x9}, {{&(0x7f0000004380)=@ethernet={0x0, @random}, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004400)=""/122, 0x7a}, {&(0x7f0000004480)=""/138, 0xffffffffffffffd8}, {&(0x7f0000004540)=""/225, 0xe1}, {&(0x7f0000004640)=""/38, 0x26}, {&(0x7f0000004680)=""/41, 0x29}], 0x5, &(0x7f0000004740)=""/108, 0x6c}, 0x3}], 0x5, 0x42, &(0x7f0000004940)={r0, r1+10000000}) (async) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000004980), &(0x7f00000049c0)=0x4) (async) accept4(r2, &(0x7f00000006c0)=@phonet, &(0x7f0000000340)=0x80, 0x800) (async) accept4$vsock_stream(r3, &(0x7f0000000740)={0x28, 0x0, 0x2710, @host}, 0x10, 0x800) (async) connect$vsock_stream(r4, &(0x7f0000004b80)={0x28, 0x0, 0x2711, @hyper}, 0x10) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000002c0)='memory.pressure\x00', 0x2, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3}}, @typedef={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/196, 0x41, 0xc4, 0x1}, 0x20) (async) write$cgroup_pressure(r5, &(0x7f0000000300)={'full', 0x20, 0x7, 0x20, 0x100000001}, 0x2f) (async) 17:31:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1012.465050][T27130] FAULT_INJECTION: forcing a failure. [ 1012.465050][T27130] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1012.506323][T27130] CPU: 0 PID: 27130 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1012.517956][T27130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.527999][T27130] Call Trace: [ 1012.531287][T27130] dump_stack+0x18e/0x1de [ 1012.535609][T27130] should_fail+0x5d8/0x740 [ 1012.540022][T27130] __alloc_pages_nodemask+0x12e/0x740 [ 1012.545388][T27130] __get_free_pages+0xa/0x30 [ 1012.549971][T27130] inode_doinit_with_dentry+0x8d4/0x1170 [ 1012.555593][T27130] security_d_instantiate+0xa5/0x100 [ 1012.560861][T27130] d_instantiate+0x51/0x90 [ 1012.565269][T27130] __debugfs_create_file+0x256/0x460 [ 1012.570572][T27130] bdi_register_va+0x274/0x5e0 [ 1012.575323][T27130] bdi_register+0x80/0xa0 [ 1012.579641][T27130] ? __device_add_disk+0x50a/0x1220 [ 1012.584825][T27130] bdi_register_owner+0x56/0xf0 [ 1012.589661][T27130] __device_add_disk+0x583/0x1220 [ 1012.594681][T27130] loop_add+0x554/0x710 [ 1012.598828][T27130] loop_control_ioctl+0x468/0x680 [ 1012.603838][T27130] ? xor_init+0x60/0x60 [ 1012.607984][T27130] do_vfs_ioctl+0x6fb/0x15b0 [ 1012.612569][T27130] __x64_sys_ioctl+0xd4/0x110 [ 1012.617232][T27130] do_syscall_64+0xcb/0x1e0 [ 1012.621723][T27130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1012.627604][T27130] RIP: 0033:0x7fddc0dc7e99 [ 1012.632009][T27130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:31:20 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 79) 17:31:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0xb, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x12}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff8000, 0xc, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) write$tun(r0, 0x0, 0x0) write$tcp_congestion(r0, &(0x7f0000000000)='scalable\x00', 0x9) 17:31:20 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd601000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1012.651607][T27130] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1012.660105][T27130] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1012.668067][T27130] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1012.676120][T27130] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.684173][T27130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.692260][T27130] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x18}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:20 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd602000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) (async) write$tun(r0, 0x0, 0x0) (async) write$tcp_congestion(r0, &(0x7f0000000000)='scalable\x00', 0x9) 17:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x25}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1012.805445][T27368] FAULT_INJECTION: forcing a failure. [ 1012.805445][T27368] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.820966][T27368] CPU: 1 PID: 27368 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1012.832593][T27368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.842728][T27368] Call Trace: [ 1012.846008][T27368] dump_stack+0x18e/0x1de [ 1012.850335][T27368] should_fail+0x5d8/0x740 [ 1012.854745][T27368] ? kobj_map+0x70/0x650 [ 1012.858981][T27368] should_failslab+0x5/0x20 [ 1012.863474][T27368] __kmalloc+0x5f/0x2f0 [ 1012.867620][T27368] kobj_map+0x70/0x650 [ 1012.871684][T27368] ? exact_match+0x10/0x10 [ 1012.876090][T27368] ? refcount_inc_checked+0x1a/0x50 [ 1012.881275][T27368] ? disk_check_events+0x580/0x580 [ 1012.886374][T27368] __device_add_disk+0x5ff/0x1220 [ 1012.891391][T27368] loop_add+0x554/0x710 [ 1012.895530][T27368] loop_control_ioctl+0x468/0x680 [ 1012.900541][T27368] ? xor_init+0x60/0x60 [ 1012.904772][T27368] do_vfs_ioctl+0x6fb/0x15b0 [ 1012.909349][T27368] __x64_sys_ioctl+0xd4/0x110 [ 1012.914020][T27368] do_syscall_64+0xcb/0x1e0 [ 1012.918518][T27368] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1012.924402][T27368] RIP: 0033:0x7fddc0dc7e99 [ 1012.928807][T27368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:31:20 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 80) 17:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:20 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd603000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x26}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) (async) write$tun(r0, 0x0, 0x0) (async) write$tcp_congestion(r0, &(0x7f0000000000)='scalable\x00', 0x9) 17:31:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x43}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) [ 1012.948401][T27368] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1012.956812][T27368] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1012.964770][T27368] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1012.972732][T27368] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.980698][T27368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.988657][T27368] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 17:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:20 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd604000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1013.073296][T27576] FAULT_INJECTION: forcing a failure. [ 1013.073296][T27576] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.095867][T27576] CPU: 0 PID: 27576 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1013.107500][T27576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.117543][T27576] Call Trace: [ 1013.120825][T27576] dump_stack+0x18e/0x1de [ 1013.125153][T27576] should_fail+0x5d8/0x740 [ 1013.129558][T27576] ? kobject_set_name_vargs+0x5d/0x110 [ 1013.135192][T27576] should_failslab+0x5/0x20 [ 1013.139687][T27576] __kmalloc_track_caller+0x5d/0x2e0 [ 1013.144968][T27576] kstrdup_const+0x51/0x90 [ 1013.149375][T27576] kobject_set_name_vargs+0x5d/0x110 [ 1013.154661][T27576] dev_set_name+0x80/0xa0 [ 1013.158979][T27576] ? kobj_map+0x61e/0x650 [ 1013.163321][T27576] __device_add_disk+0x678/0x1220 [ 1013.168337][T27576] loop_add+0x554/0x710 [ 1013.172484][T27576] loop_control_ioctl+0x468/0x680 [ 1013.177495][T27576] ? xor_init+0x60/0x60 [ 1013.181641][T27576] do_vfs_ioctl+0x6fb/0x15b0 [ 1013.186227][T27576] __x64_sys_ioctl+0xd4/0x110 [ 1013.190897][T27576] do_syscall_64+0xcb/0x1e0 [ 1013.195387][T27576] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1013.201266][T27576] RIP: 0033:0x7fddc0dc7e99 17:31:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:20 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1013.205673][T27576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1013.225267][T27576] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1013.233673][T27576] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1013.241633][T27576] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1013.249597][T27576] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1013.257556][T27576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1013.265518][T27576] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1013.282753][T27576] kobject_add_internal failed for queue (error: -2 parent: (null)) [ 1013.291060][T27576] ------------[ cut here ]------------ [ 1013.296522][T27576] WARNING: CPU: 0 PID: 27576 at fs/sysfs/file.c:328 sysfs_create_files+0x1ef/0x380 [ 1013.305778][T27576] Modules linked in: [ 1013.309667][T27576] CPU: 0 PID: 27576 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1013.321267][T27576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.331323][T27576] RIP: 0010:sysfs_create_files+0x1ef/0x380 [ 1013.337119][T27576] Code: 85 ed 0f 84 a4 00 00 00 e8 9e 92 ae ff 89 eb 48 8b 6c 24 10 4c 8b 7c 24 28 e9 ad fe ff ff e8 88 92 ae ff eb 05 e8 81 92 ae ff <0f> 0b 41 bc ea ff ff ff eb 8d 3c 03 0f 8f a1 fe ff ff 48 8d 7c 24 [ 1013.356708][T27576] RSP: 0018:ffff8881ed77fc68 EFLAGS: 00010246 [ 1013.362764][T27576] RAX: ffffffff81b23e3f RBX: 0000000000000000 RCX: 0000000000040000 [ 1013.370811][T27576] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1013.378767][T27576] RBP: ffff8881d017b0a0 R08: ffffffff821b2d0c R09: ffffed103daeff8b [ 1013.386722][T27576] R10: ffffed103daeff8b R11: 0000000000000000 R12: dffffc0000000000 [ 1013.394680][T27576] R13: ffffffff84e29540 R14: dffffc0000000000 R15: ffff8881d017b070 [ 1013.402644][T27576] FS: 00007fddbff3e700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1013.411557][T27576] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1013.418123][T27576] CR2: 00007f218a6fd090 CR3: 00000001e3e6a000 CR4: 00000000003406f0 [ 1013.426086][T27576] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1013.434046][T27576] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1013.442000][T27576] Call Trace: [ 1013.445285][T27576] __device_add_disk+0xced/0x1220 [ 1013.450303][T27576] loop_add+0x554/0x710 [ 1013.454449][T27576] loop_control_ioctl+0x468/0x680 [ 1013.459470][T27576] ? xor_init+0x60/0x60 [ 1013.463620][T27576] do_vfs_ioctl+0x6fb/0x15b0 [ 1013.468207][T27576] __x64_sys_ioctl+0xd4/0x110 [ 1013.472874][T27576] do_syscall_64+0xcb/0x1e0 [ 1013.477368][T27576] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1013.483248][T27576] RIP: 0033:0x7fddc0dc7e99 [ 1013.487657][T27576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1013.507256][T27576] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1013.515660][T27576] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1013.523630][T27576] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1013.531596][T27576] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1013.539562][T27576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1013.547526][T27576] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1013.555495][T27576] ---[ end trace 8d4e5fe33cce5474 ]--- [ 1013.562951][T27576] ------------[ cut here ]------------ [ 1013.569043][T27576] kernfs: can not remove 'events', no directory [ 1013.575470][T27576] WARNING: CPU: 0 PID: 27576 at fs/kernfs/dir.c:1504 kernfs_remove_by_name_ns+0x61/0x90 [ 1013.585162][T27576] Modules linked in: [ 1013.589052][T27576] CPU: 0 PID: 27576 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1013.600663][T27576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.610723][T27576] RIP: 0010:kernfs_remove_by_name_ns+0x61/0x90 [ 1013.616861][T27576] Code: 48 89 c3 e8 41 ee ae ff 48 89 df e8 b9 f0 ff ff 31 db eb 29 e8 30 ee ae ff 48 c7 c7 c0 c1 cb 84 4c 89 fe 31 c0 e8 9f 73 88 ff <0f> 0b bb fe ff ff ff eb 16 e8 11 ee ae ff bb fe ff ff ff 48 c7 c7 [ 1013.636461][T27576] RSP: 0018:ffff8881ed77fc48 EFLAGS: 00010246 [ 1013.642517][T27576] RAX: 0e0973d4f619a800 RBX: 0000000000000000 RCX: 0000000000040000 [ 1013.650710][T27576] RDX: ffffc90000f4b000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1013.658679][T27576] RBP: ffffffff84e29540 R08: ffffffff814b2bac R09: ffffed103edc3eb2 [ 1013.666644][T27576] R10: ffffed103edc3eb2 R11: 0000000000000000 R12: 00000000ffffffea [ 1013.674608][T27576] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff84e29600 [ 1013.682574][T27576] FS: 00007fddbff3e700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1013.691487][T27576] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1013.698057][T27576] CR2: 00007f218a6fd090 CR3: 00000001e3e6a000 CR4: 00000000003406f0 [ 1013.706020][T27576] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1013.713987][T27576] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1013.721945][T27576] Call Trace: [ 1013.725228][T27576] sysfs_create_files+0x321/0x380 [ 1013.730248][T27576] __device_add_disk+0xced/0x1220 [ 1013.735269][T27576] loop_add+0x554/0x710 [ 1013.739417][T27576] loop_control_ioctl+0x468/0x680 [ 1013.744445][T27576] ? xor_init+0x60/0x60 [ 1013.748590][T27576] do_vfs_ioctl+0x6fb/0x15b0 [ 1013.753189][T27576] __x64_sys_ioctl+0xd4/0x110 [ 1013.757863][T27576] do_syscall_64+0xcb/0x1e0 [ 1013.762360][T27576] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1013.768240][T27576] RIP: 0033:0x7fddc0dc7e99 [ 1013.772647][T27576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1013.792242][T27576] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1013.800642][T27576] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1013.808608][T27576] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1013.816568][T27576] RBP: 00007fddbff3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1013.824529][T27576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:31:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 17:31:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1000, 0x238d, 0x4, 0x442, r0, 0x4, '\x00', 0x0, r1, 0x0, 0x0, 0x4}, 0x40) 17:31:21 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd701000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x48}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) 17:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9e, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x0, 0x4c}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f00000000c0)=""/237, 0x3e, 0xed, 0x1}, 0x20) [ 1013.832485][T27576] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1013.840447][T27576] ---[ end trace 8d4e5fe33cce5475 ]--- [ 1013.848085][T27576] loop0: failed to create sysfs files for events 17:31:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async, rerun: 64) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) (rerun: 64) write$tun(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1000, 0x238d, 0x4, 0x442, r0, 0x4, '\x00', 0x0, r1, 0x0, 0x0, 0x4}, 0x40) 17:31:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@fwd={0x6}, @int={0x11, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x2d}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x3e, 0xe8, 0x1}, 0x20) 17:31:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb7, 0xc, 0x6, [@union={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/232, 0x2a, 0xe8, 0x1000001}, 0x20) 17:31:21 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd702000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:31:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x6, 0x0, 0x0, 0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f00000004c0)=""/232, 0x2e, 0xe8, 0x1}, 0x20) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r0, 0x0, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) write$tun(r1, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1000, 0x238d, 0x4, 0x442, r0, 0x4, '\x00', 0x0, r1, 0x0, 0x0, 0x4}, 0x40) [ 1013.897902][T27723] ------------[ cut here ]------------ [ 1013.936137][T27723] kernfs: can not remove 'events', no directory [ 1013.976581][T27723] WARNING: CPU: 1 PID: 27723 at fs/kernfs/dir.c:1504 kernfs_remove_by_name_ns+0x61/0x90 [ 1013.986305][T27723] Modules linked in: [ 1013.990209][T27723] CPU: 1 PID: 27723 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1014.001815][T27723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.011879][T27723] RIP: 0010:kernfs_remove_by_name_ns+0x61/0x90 [ 1014.018020][T27723] Code: 48 89 c3 e8 41 ee ae ff 48 89 df e8 b9 f0 ff ff 31 db eb 29 e8 30 ee ae ff 48 c7 c7 c0 c1 cb 84 4c 89 fe 31 c0 e8 9f 73 88 ff <0f> 0b bb fe ff ff ff eb 16 e8 11 ee ae ff bb fe ff ff ff 48 c7 c7 [ 1014.037706][T27723] RSP: 0018:ffff8881e940fcf8 EFLAGS: 00010246 [ 1014.043764][T27723] RAX: 31de94aa7e26b200 RBX: 0000000000000000 RCX: ffff8881ccde0fc0 [ 1014.051730][T27723] RDX: 0000000000000003 RSI: 000000000001b01d RDI: 0000000000000000 [ 1014.059691][T27723] RBP: ffffffff85e469a0 R08: ffffffff814b2bac R09: 0000000000006c08 [ 1014.067657][T27723] R10: ffffc90000f4b000 R11: 0000000000000000 R12: 0000000000000000 [ 1014.075619][T27723] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffffff84e29600 [ 1014.083586][T27723] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1014.092505][T27723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1014.099167][T27723] CR2: 0000555556fdaaf8 CR3: 00000001cf1b4000 CR4: 00000000003406e0 [ 1014.107128][T27723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1014.115098][T27723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1014.123064][T27723] Call Trace: [ 1014.126344][T27723] sysfs_remove_files+0x99/0xf0 [ 1014.131186][T27723] del_gendisk+0x259/0xb70 [ 1014.135599][T27723] ? radix_tree_delete_item+0x22a/0x320 [ 1014.141134][T27723] loop_control_ioctl+0x563/0x680 [ 1014.146183][T27723] ? xor_init+0x60/0x60 [ 1014.150333][T27723] do_vfs_ioctl+0x6fb/0x15b0 [ 1014.154918][T27723] __x64_sys_ioctl+0xd4/0x110 [ 1014.159591][T27723] do_syscall_64+0xcb/0x1e0 [ 1014.164139][T27723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1014.170020][T27723] RIP: 0033:0x7fddc0dc7e99 [ 1014.174434][T27723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.194026][T27723] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1014.202434][T27723] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1014.210399][T27723] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 1014.218369][T27723] RBP: 00007fddc0e21ff1 R08: 0000000000000000 R09: 0000000000000000 [ 1014.226340][T27723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1014.234304][T27723] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1014.242271][T27723] ---[ end trace 8d4e5fe33cce5476 ]--- [ 1014.268959][T27723] ------------[ cut here ]------------ [ 1014.274540][T27723] kernfs: can not remove 'events_async', no directory [ 1014.281524][T27723] WARNING: CPU: 1 PID: 27723 at fs/kernfs/dir.c:1504 kernfs_remove_by_name_ns+0x61/0x90 [ 1014.291228][T27723] Modules linked in: [ 1014.295117][T27723] CPU: 1 PID: 27723 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1014.306723][T27723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.316781][T27723] RIP: 0010:kernfs_remove_by_name_ns+0x61/0x90 [ 1014.322920][T27723] Code: 48 89 c3 e8 41 ee ae ff 48 89 df e8 b9 f0 ff ff 31 db eb 29 e8 30 ee ae ff 48 c7 c7 c0 c1 cb 84 4c 89 fe 31 c0 e8 9f 73 88 ff <0f> 0b bb fe ff ff ff eb 16 e8 11 ee ae ff bb fe ff ff ff 48 c7 c7 [ 1014.342512][T27723] RSP: 0018:ffff8881e940fcf8 EFLAGS: 00010246 [ 1014.348568][T27723] RAX: 31de94aa7e26b200 RBX: 0000000000000000 RCX: ffff8881ccde0fc0 [ 1014.356528][T27723] RDX: 0000000000000003 RSI: 0000000080000000 RDI: 0000000000000000 [ 1014.364488][T27723] RBP: ffffffff85e469a0 R08: ffffffff814b2bac R09: 000000000000ffff [ 1014.372446][T27723] R10: ffffc90000f4b000 R11: 0000000000000000 R12: 0000000000000000 [ 1014.380410][T27723] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffffff84e29740 [ 1014.388375][T27723] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1014.397379][T27723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1014.403947][T27723] CR2: 0000555556fdaaf8 CR3: 00000001cf1b4000 CR4: 00000000003406e0 [ 1014.411907][T27723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1014.419867][T27723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1014.427822][T27723] Call Trace: [ 1014.431107][T27723] sysfs_remove_files+0x99/0xf0 [ 1014.435946][T27723] del_gendisk+0x259/0xb70 [ 1014.440440][T27723] ? radix_tree_delete_item+0x22a/0x320 [ 1014.445980][T27723] loop_control_ioctl+0x563/0x680 [ 1014.450992][T27723] ? xor_init+0x60/0x60 [ 1014.455140][T27723] do_vfs_ioctl+0x6fb/0x15b0 [ 1014.459721][T27723] __x64_sys_ioctl+0xd4/0x110 [ 1014.464388][T27723] do_syscall_64+0xcb/0x1e0 [ 1014.468883][T27723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1014.474764][T27723] RIP: 0033:0x7fddc0dc7e99 [ 1014.479166][T27723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.498760][T27723] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1014.507250][T27723] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1014.515209][T27723] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 1014.523259][T27723] RBP: 00007fddc0e21ff1 R08: 0000000000000000 R09: 0000000000000000 [ 1014.531222][T27723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1014.539184][T27723] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1014.547147][T27723] ---[ end trace 8d4e5fe33cce5477 ]--- [ 1014.555410][T27723] ------------[ cut here ]------------ [ 1014.561219][T27723] kernfs: can not remove 'events_poll_msecs', no directory [ 1014.568873][T27723] WARNING: CPU: 1 PID: 27723 at fs/kernfs/dir.c:1504 kernfs_remove_by_name_ns+0x61/0x90 [ 1014.578574][T27723] Modules linked in: [ 1014.582465][T27723] CPU: 1 PID: 27723 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1014.594073][T27723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.604132][T27723] RIP: 0010:kernfs_remove_by_name_ns+0x61/0x90 [ 1014.610372][T27723] Code: 48 89 c3 e8 41 ee ae ff 48 89 df e8 b9 f0 ff ff 31 db eb 29 e8 30 ee ae ff 48 c7 c7 c0 c1 cb 84 4c 89 fe 31 c0 e8 9f 73 88 ff <0f> 0b bb fe ff ff ff eb 16 e8 11 ee ae ff bb fe ff ff ff 48 c7 c7 [ 1014.629967][T27723] RSP: 0018:ffff8881e940fcf8 EFLAGS: 00010246 [ 1014.636024][T27723] RAX: 31de94aa7e26b200 RBX: 0000000000000000 RCX: ffff8881ccde0fc0 [ 1014.643985][T27723] RDX: 0000000000000003 RSI: 0000000080000000 RDI: 0000000000000000 [ 1014.651945][T27723] RBP: ffffffff85e469a0 R08: ffffffff814b2bac R09: 000000000000ffff [ 1014.659910][T27723] R10: ffffc90000f4b000 R11: 0000000000000000 R12: 0000000000000000 [ 1014.667875][T27723] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffffff84e29780 [ 1014.675844][T27723] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1014.684764][T27723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1014.691340][T27723] CR2: 0000555556fdaaf8 CR3: 00000001cf1b4000 CR4: 00000000003406e0 [ 1014.699305][T27723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1014.707272][T27723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1014.715228][T27723] Call Trace: [ 1014.718524][T27723] sysfs_remove_files+0x99/0xf0 [ 1014.723459][T27723] del_gendisk+0x259/0xb70 [ 1014.727865][T27723] ? radix_tree_delete_item+0x22a/0x320 [ 1014.733407][T27723] loop_control_ioctl+0x563/0x680 [ 1014.738423][T27723] ? xor_init+0x60/0x60 [ 1014.742594][T27723] do_vfs_ioctl+0x6fb/0x15b0 [ 1014.747176][T27723] __x64_sys_ioctl+0xd4/0x110 [ 1014.751840][T27723] do_syscall_64+0xcb/0x1e0 [ 1014.756338][T27723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1014.762222][T27723] RIP: 0033:0x7fddc0dc7e99 [ 1014.766625][T27723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.786222][T27723] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1014.794624][T27723] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1014.802587][T27723] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 1014.810551][T27723] RBP: 00007fddc0e21ff1 R08: 0000000000000000 R09: 0000000000000000 [ 1014.818512][T27723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1014.826475][T27723] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1014.834527][T27723] ---[ end trace 8d4e5fe33cce5478 ]--- [ 1014.849083][T27723] ------------[ cut here ]------------ [ 1014.854722][T27723] kernfs: can not remove 'bdi', no directory [ 1014.861249][T27723] WARNING: CPU: 1 PID: 27723 at fs/kernfs/dir.c:1504 kernfs_remove_by_name_ns+0x61/0x90 [ 1014.870951][T27723] Modules linked in: [ 1014.874839][T27723] CPU: 1 PID: 27723 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1014.886440][T27723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.896498][T27723] RIP: 0010:kernfs_remove_by_name_ns+0x61/0x90 [ 1014.902639][T27723] Code: 48 89 c3 e8 41 ee ae ff 48 89 df e8 b9 f0 ff ff 31 db eb 29 e8 30 ee ae ff 48 c7 c7 c0 c1 cb 84 4c 89 fe 31 c0 e8 9f 73 88 ff <0f> 0b bb fe ff ff ff eb 16 e8 11 ee ae ff bb fe ff ff ff 48 c7 c7 [ 1014.922233][T27723] RSP: 0018:ffff8881e940fd38 EFLAGS: 00010246 [ 1014.928291][T27723] RAX: 31de94aa7e26b200 RBX: 0000000000000000 RCX: ffff8881ccde0fc0 [ 1014.936251][T27723] RDX: 0000000000000003 RSI: 0000000080000000 RDI: 0000000000000000 [ 1014.944214][T27723] RBP: 0000000000000000 R08: ffffffff814b2bac R09: 000000000000ffff [ 1014.952180][T27723] R10: ffffc90000f4b000 R11: 0000000000000000 R12: 1ffff1103a02f600 [ 1014.960140][T27723] R13: ffff8881d017b4e8 R14: 0000000000000000 R15: ffffffff84e29020 [ 1014.968236][T27723] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1014.977163][T27723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1014.983739][T27723] CR2: 0000001b2ed34000 CR3: 00000001cf1b4000 CR4: 00000000003406e0 [ 1014.991702][T27723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1014.999670][T27723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1015.007729][T27723] Call Trace: [ 1015.011193][T27723] del_gendisk+0x543/0xb70 [ 1015.015604][T27723] loop_control_ioctl+0x563/0x680 [ 1015.020619][T27723] ? xor_init+0x60/0x60 [ 1015.024766][T27723] do_vfs_ioctl+0x6fb/0x15b0 [ 1015.029350][T27723] __x64_sys_ioctl+0xd4/0x110 [ 1015.034156][T27723] do_syscall_64+0xcb/0x1e0 [ 1015.038736][T27723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1015.044618][T27723] RIP: 0033:0x7fddc0dc7e99 [ 1015.049108][T27723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1015.068728][T27723] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1015.077133][T27723] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1015.085093][T27723] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 1015.093052][T27723] RBP: 00007fddc0e21ff1 R08: 0000000000000000 R09: 0000000000000000 [ 1015.101029][T27723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1015.108994][T27723] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1015.116963][T27723] ---[ end trace 8d4e5fe33cce5479 ]--- [ 1015.125371][T27723] kasan: CONFIG_KASAN_INLINE enabled [ 1015.130858][T27723] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1015.139453][T27723] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1015.146382][T27723] CPU: 1 PID: 27723 Comm: syz-executor.1 Tainted: G W 5.4.147-syzkaller-00015-g5b673be0c6b0 #0 [ 1015.157983][T27723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.168042][T27723] RIP: 0010:strlen+0x27/0x60 [ 1015.172617][T27723] Code: 0f 1f 00 41 57 41 56 53 49 89 fe 49 bf 00 00 00 00 00 fc ff df 48 89 f8 66 66 2e 0f 1f 84 00 00 00 00 00 48 89 c3 48 c1 e8 03 <42> 0f b6 04 38 84 c0 75 0b 48 8d 43 01 80 3b 00 75 e7 eb 13 89 d9 [ 1015.192231][T27723] RSP: 0018:ffff8881e940fcd0 EFLAGS: 00010246 [ 1015.198284][T27723] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000200001 [ 1015.206243][T27723] RDX: 0000000000200000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1015.214202][T27723] RBP: 0000000000000000 R08: ffffffff81b1b57b R09: 000000000000ffff [ 1015.222161][T27723] R10: ffffc90000f4b000 R11: 0000000000000000 R12: ffff8881f18e4ed8 [ 1015.230125][T27723] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 1015.238085][T27723] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1015.247002][T27723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1015.253573][T27723] CR2: 0000001b2ed34000 CR3: 00000001cf1b4000 CR4: 00000000003406e0 [ 1015.261534][T27723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1015.269491][T27723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1015.277447][T27723] Call Trace: [ 1015.280728][T27723] kernfs_find_ns+0x83/0x430 [ 1015.285304][T27723] ? mutex_lock+0x6c/0xc0 [ 1015.289624][T27723] kernfs_remove_by_name_ns+0x32/0x90 [ 1015.294981][T27723] del_gendisk+0x93d/0xb70 [ 1015.299392][T27723] loop_control_ioctl+0x563/0x680 [ 1015.304406][T27723] ? xor_init+0x60/0x60 [ 1015.308545][T27723] do_vfs_ioctl+0x6fb/0x15b0 [ 1015.313124][T27723] __x64_sys_ioctl+0xd4/0x110 [ 1015.317786][T27723] do_syscall_64+0xcb/0x1e0 [ 1015.322280][T27723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1015.328158][T27723] RIP: 0033:0x7fddc0dc7e99 [ 1015.332557][T27723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1015.352150][T27723] RSP: 002b:00007fddbff3e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1015.360551][T27723] RAX: ffffffffffffffda RBX: 00007fddc0edaf60 RCX: 00007fddc0dc7e99 [ 1015.368515][T27723] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 1015.376475][T27723] RBP: 00007fddc0e21ff1 R08: 0000000000000000 R09: 0000000000000000 [ 1015.384433][T27723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1015.392396][T27723] R13: 00007fff671e8a3f R14: 00007fddbff3e300 R15: 0000000000022000 [ 1015.400352][T27723] Modules linked in: [ 1015.408065][T27723] ---[ end trace 8d4e5fe33cce547a ]--- [ 1015.413700][T27723] RIP: 0010:strlen+0x27/0x60 [ 1015.418773][T27723] Code: 0f 1f 00 41 57 41 56 53 49 89 fe 49 bf 00 00 00 00 00 fc ff df 48 89 f8 66 66 2e 0f 1f 84 00 00 00 00 00 48 89 c3 48 c1 e8 03 <42> 0f b6 04 38 84 c0 75 0b 48 8d 43 01 80 3b 00 75 e7 eb 13 89 d9 [ 1015.438732][T27723] RSP: 0018:ffff8881e940fcd0 EFLAGS: 00010246 [ 1015.444920][T27723] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000200001 [ 1015.453329][T27723] RDX: 0000000000200000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1015.462486][T27723] RBP: 0000000000000000 R08: ffffffff81b1b57b R09: 000000000000ffff [ 1015.470825][T27723] R10: ffffc90000f4b000 R11: 0000000000000000 R12: ffff8881f18e4ed8 [ 1015.479775][T27723] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 1015.487860][T27723] FS: 00007fddbff3e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1015.497267][T27723] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1015.504363][T27723] CR2: 0000001b2ed34000 CR3: 00000001cf1b4000 CR4: 00000000003406e0 [ 1015.512871][T27723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1015.521291][T27723] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1015.529623][T27723] Kernel panic - not syncing: Fatal exception [ 1015.535912][T27723] Kernel Offset: disabled [ 1015.540230][T27723] Rebooting in 86400 seconds..